登入選單
返回Google圖書搜尋
Practical Network Security
註釋

Prepare yourself for any type of audit and minimise security findings


DESCRIPTION

This book is a guide for Network professionals to understand real-world information security scenarios. It offers a systematic approach to prepare for security assessments including process security audits, technical security audits and Penetration tests. This book aims at training pre-emptive security to network professionals in order to improve their understanding of security infrastructure and policies.

Ê

With our network being exposed to a whole plethora of security threats, all technical and non-technical people are expected to be aware of security processes. Every security assessment (technical/ non-technical) leads to new findings and the cycle continues after every audit. This book explains the auditorÕs process and expectations.


KEY FEATURES

It follows a lifecycle approach to information security by understanding:


Why we need Information security

How we can implementÊ

How to operate securely and maintain a secure posture

How to face audits


WHAT WILL YOU LEARN

This book is solely focused on aspects of Information security that Network professionals (Network engineer, manager and trainee) need to deal with, for different types of Audits.

Information Security Basics, security concepts in detail, threat

Securing the Network focuses on network security design aspects and how policies influence network design decisions.

Secure Operations is all about incorporating security in Network operations.

Managing Audits is the real test.


WHO THIS BOOK IS FOR

IT Heads, Network managers, Network planning engineers, Network Operation engineer or anybody interested in understanding holistic network security.


Table of Contents

_1. Ê Ê Basics of Information Security

2. Ê Ê Threat Paradigm

3. Ê Ê Information Security Controls

4. Ê Ê Decoding Policies Standards Procedures & Guidelines

5. Ê Ê Network security design

6. Ê Ê Know your assets

7. Ê Ê Implementing Network Security

8. Ê Ê Secure Change Management

9. Ê Ê Vulnerability and Risk Management

10. Ê Access Control

11. Ê Capacity Management

12. Ê Log Management

13. Ê Network Monitoring

14. Ê Information Security Audit

15. Ê Technical Compliance Audit

16.Ê Penetration Testing