The practice of network security monitoring understanding incident detection and response

Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to in...

Descripción completa

Detalles Bibliográficos
Autor principal: Bejtlich, Richard (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: San Francisco : No Starch Press 2013.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628913206719
Tabla de Contenidos:
  • Foreword / by Todd Heberlein
  • Preface
  • Part I. Getting Started
  • The Rationale
  • Collecting Traffic
  • Part II. Security Onion Deployment
  • Standalone Deployment
  • Distributed Deployment
  • Housekeeping
  • Part III. Tools
  • Command Line Packet Analysis Tools
  • Graphical Packet Analysis Tools
  • Consoles
  • Part III. NSM in Action
  • Collection, Analysis, Escalation, and Resolution
  • Server-Side Compromise
  • Client-Side Compromise
  • Extending SO
  • Proxies and Checksums
  • Conclusion
  • Appendix A: Security Onion Scripts and Configuration / by Doug Burks.