Internet security a jumpstart for systems administrators and IT managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major losses. This book provides the...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam ; London :
Digital Press
c2003.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627707306719 |
Tabla de Contenidos:
- Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; I. I The history of the Internet; 1.2 TCP/IP the nails of the Internet; Chapter 2. The Security Review Process; 2.1 Introduction; 2.2 Review the state of the business; 2.3 Analyze the technology being used; 2.4 Risk analysis; 2.5 Plans and policies; 2.6 Implementation; Chapter 3. Cryptography; 3.1 The history; 3.2 Key types; 3.3 RSA: public and private key; 3.4 PKI and business solutions
- Chapter 4. Secure Networks4.1 TCP/IP and OSI; 4.2 Denial-of-service attacks; 4.3 Virtual private networks; 4.4 Secure sockets layer; Chapter 5. Protecting Your Intranet from the Extranet and Internet; 5.1 So many choices!; 5.2 Firewall product functional summaries; 5.3 Firewall buyer's assessment form; 5.4 Firewall vendors: Picking the products that are right for you; 5.5 SSL network appliance overview; 5.6 Secure access-SSL based extranet appliances; 5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications
- Chapter 6. Authentication and Authorization6. I The basics; 6.2 Authentication; 6.3 Authorization; 6.4 Smart cards; Chapter 7. E-Commerce. Public Key Infrastructure; 7.1 PKI and you; 7.2 X.509; 7.3 Certificate authority; 7.4 Certification practice statement; 7.5 Certificate revocation list; 7.6 Key recovery; 7.7 Lightweight directory access protocol; 7.8 Public key cryptography standards; 7.9 Public key infrastructure (X.509) standards; Chapter 8. Messaging Security; 8.1 Safe communication Messaging; 8.2 Junk mail; 8.3 Keep it running; Chapter 9. What Are We Doing Here?; 9.1 Risk analysis
- 9.2 The threats9.3 Technology security review; 9.4 Control directory and environment risk table; 9.5 Competitive asset; Chapter 10. Disaster Recovery; 10.1 Introduction; 10.2 Incident handling requirements; 10.3 Incident handling processes; 10.4 Incident handling procedures; 10.5 Incident handling team implementation; 10.6 Disaster recovery and business continuity; Appendix 1. Security Tools; Appendix 2. The CERT Report; Glossary; References; Index