Inside network security assessment: guarding your IT infrastructure
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
SAMS
2005
|
Ausgabe: | 1. printing |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index. - "CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover |
Beschreibung: | x, 293 p. graph. Darst. 23 cm 1 CD-ROM (12 cm) |
ISBN: | 0672328097 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035880198 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 091211s2005 d||| |||| 00||| eng d | ||
020 | |a 0672328097 |9 0-672-32809-7 | ||
035 | |a (OCoLC)475088459 | ||
035 | |a (DE-599)GBV500669724 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-M347 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Gregg, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Inside network security assessment |b guarding your IT infrastructure |c Michael Gregg ; David Kim |
250 | |a 1. printing | ||
264 | 1 | |a Indianapolis, Ind. |b SAMS |c 2005 | |
300 | |a x, 293 p. |b graph. Darst. |c 23 cm |e 1 CD-ROM (12 cm) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - "CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover | ||
650 | 0 | |a Computer security / Evaluation / Methodology | |
650 | 0 | |a Computer networks / Security measures | |
650 | 4 | |a datanet | |
650 | 4 | |a datasikkerhed | |
650 | 4 | |a netværk | |
650 | 4 | |a sikkerhed | |
650 | 4 | |a vejledninger | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security / Evaluation / Methodology | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kim, David |e Verfasser |4 aut | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9780672328091.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018737790 |
Datensatz im Suchindex
_version_ | 1804140859341406208 |
---|---|
adam_text | IMAGE 1
INTRODUCTION
INTRODUCTION TO ASSESSING NETWORK VULNERABILITIES WHAT SECURITY IS AND
ISN T PROCESS FOR ASSESSING RISK FOUR WAYS IN WHICH YOU CAN RESPOND TO
RISK NETWORK VULNERABILITY ASSESSMENT TYPES OF NETWORK VULNERABILITY
ASSESSMENTS WHAT PROCEDURES GOVERN THE VULNERABILITY ASSESSMENT? THE
ROLE OF POLICIES IN THE VULNERABILITY ASSESSMENT WHAT DRIVES THE
ASSESSMENT? MANAGING A VULNERABILITY ASSESSMENT BUILDING COOPERATION
WITH OTHER DEPARTMENTS IMPORTANCE OF SETTING AND MAINTAINING A SCHEDULE
FOR ASSESSMENTS SUMMARY KEY TERMS FOUNDATIONS AND PRINCIPLES OF SECURITY
BASIC SECURITY PRINCIPLES SECURITY REQUIRES INFORMATION CLASSIFICATION
GOVERNMENTAL INFORMATION CLASSIFICATION SYSTEM COMMERCIAL INFORMATION
CLASSIFICATION SYSTEM CLASSIFICATION CRITERIA THE POLICY FRAMEWORK TYPES
OF POLICIES DEFINING APPROPRIATE POLICY DEPLOYING POLICY POLICY LIFE
CYCLE THE ROLE AUTHENTICATION, AUTHORIZATION, AND ACCOUNTABILITY PLAY IN
A SECURE ORGANIZATION
AUTHENTICATION
AUTHORIZATION ACCOUNTABILITY ENCRYPTION.SECURITY AND THE EMPLOYEE
(SOCIAL ENGINEERING) SUMMARY KEY TERMS WHY RISK ASSESSMENT RISK
TERMINOLOGY LAWS, MANDATES, AND REGULATIONS HEALTH INSURANCE PORTABILITY
AND ACCOUNTABILITY ACT (HIPAA) GRAMM-LEACH-BLILEY-ACT (GLBA) FEDERAL
INFORMATION SECURITY MANAGEMENT ACT (FISMA) SARBANES-OXLEY ACT (SOX)
RISK ASSESSMENT BEST PRACTICES
IMAGE 2
UNDERSTANDING THE IT SECURITY PROCESS
THE GOALS AND OBJECTIVES OF A RISK ASSESSMENT SECURITY PROCESS
DEFINITION GOALS AND OBJECTIVES OF A RISK AND VULNERABILITY ASSESSMENT
SUMMARY KEY TERMS RISK-ASSESSMENT METHODOLOGIES RISK-ASSESSMENT
TERMINOLOGY RISK-MANAGEMENT AND RISK-ASSESSMENT REQUIREMENTS
DEFENSE-IN-DEPTH APPROACH FOR RISK ASSESSMENTS RISK ANALYSIS APPROACH
FOR RISK ASSESSMENTS ASSET VALUATION APPROACH FOR RISK ASSESSMENTS
QUANTITATIVE AND QUALITATIVE RISK-ASSESSMENT APPROACHES QUANTITATIVE
RISK-ASSESSMENT APPROACH QUALITATIVE RISK-ASSESSMENT APPROACH BEST
PRACTICES FOR QUANTITATIVE AND QUALITATIVE RISK ASSESSMENT QUANTITATIVE
RISK-ASSESSMENT BEST PRACTICES QUALITATIVE RISK-ASSESSMENT BEST
PRACTICES CHOOSING THE BEST RISK-ASSESSMENT APPROACH COMMON
RISK-ASSESSMENT METHODOLOGIES AND TEMPLATES SUMMARY KEY TERMS SCOPING
THE PROJECT DEFINING THE SCOPE OF THE ASSESSMENT DRIVING EVENTS INITIAL
MEETING BECOMING THE PROJECT MANAGER STAFFING THE ASSESSMENT TEAM
KICKOFF MEETING BUILDING THE ASSESSMENT TIMELINE REVIEWING CRITICAL
SYSTEMS AND INFORMATION INFORMATION CRITICALITY MATRIX SYSTEMS
CRITICALITY MATRIX COMPILING THE NEEDED DOCUMENTATION MAKING SURE YOU
ARE READY TO BEGIN SUMMARY KEY TERMS UNDERSTANDING THE ATTACKER WHO ARE
THE ATTACKERS? ATTACKER TYPES AND THEIR CHARACTERISTICS WHO ARE THE
GREATEST THREAT?
IMAGE 3
INSECURE COMPUTING HABITS ARE A THREAT
DISGRUNTLED EMPLOYEES ARE A THREAT WHAT DO ATTACKERS DO? FOUR KINDS OF
ATTACKS THINGS THAT ATTACKERS ATTACK GOALS AND MOTIVATIONS OF THE
ATTACKER ATTACKERS CONDUCT THEIR OWN RISK ANALYSIS HOW DO ATTACKERS
ATTACK? TOOLS THAT ATTACKERS USE DURING THE STAGES OF AN ATTACK REDUCING
THE RISK OF AN ATTACK HOW TO RESPOND TO AN ATTACK SUMMARY KEY TERMS
PERFORMING THE ASSESSMENT INTRODUCING THE ASSESSMENT PROCESS LEVEL I
ASSESSMENTS REVIE TABLE OF CONTENTS PROVIDED BY BLACKWELL S BOOK
SERVICES AND R.R. BOWKER. USED WITH PERMISSION.
|
any_adam_object | 1 |
author | Gregg, Michael Kim, David |
author_facet | Gregg, Michael Kim, David |
author_role | aut aut |
author_sort | Gregg, Michael |
author_variant | m g mg d k dk |
building | Verbundindex |
bvnumber | BV035880198 |
classification_rvk | ST 200 ST 277 |
ctrlnum | (OCoLC)475088459 (DE-599)GBV500669724 |
discipline | Informatik |
edition | 1. printing |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02085nam a2200505 c 4500</leader><controlfield tag="001">BV035880198</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">091211s2005 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0672328097</subfield><subfield code="9">0-672-32809-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)475088459</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV500669724</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gregg, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Inside network security assessment</subfield><subfield code="b">guarding your IT infrastructure</subfield><subfield code="c">Michael Gregg ; David Kim</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. printing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">SAMS</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 293 p.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">23 cm</subfield><subfield code="e">1 CD-ROM (12 cm)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - "CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security / Evaluation / Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">datanet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">datasikkerhed</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">netværk</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">sikkerhed</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">vejledninger</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Evaluation / Methodology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9780672328091.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018737790</subfield></datafield></record></collection> |
id | DE-604.BV035880198 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:06:40Z |
institution | BVB |
isbn | 0672328097 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018737790 |
oclc_num | 475088459 |
open_access_boolean | |
owner | DE-M347 |
owner_facet | DE-M347 |
physical | x, 293 p. graph. Darst. 23 cm 1 CD-ROM (12 cm) |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | SAMS |
record_format | marc |
spelling | Gregg, Michael Verfasser aut Inside network security assessment guarding your IT infrastructure Michael Gregg ; David Kim 1. printing Indianapolis, Ind. SAMS 2005 x, 293 p. graph. Darst. 23 cm 1 CD-ROM (12 cm) txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index. - "CD-ROM includes a variety of assessment tools, along with worksheets, checklists and templates"--back cover Computer security / Evaluation / Methodology Computer networks / Security measures datanet datasikkerhed netværk sikkerhed vejledninger Rechnernetz (DE-588)4070085-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 Kim, David Verfasser aut DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9780672328091.pdf Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Gregg, Michael Kim, David Inside network security assessment guarding your IT infrastructure Computer security / Evaluation / Methodology Computer networks / Security measures datanet datasikkerhed netværk sikkerhed vejledninger Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4293034-0 |
title | Inside network security assessment guarding your IT infrastructure |
title_auth | Inside network security assessment guarding your IT infrastructure |
title_exact_search | Inside network security assessment guarding your IT infrastructure |
title_full | Inside network security assessment guarding your IT infrastructure Michael Gregg ; David Kim |
title_fullStr | Inside network security assessment guarding your IT infrastructure Michael Gregg ; David Kim |
title_full_unstemmed | Inside network security assessment guarding your IT infrastructure Michael Gregg ; David Kim |
title_short | Inside network security assessment |
title_sort | inside network security assessment guarding your it infrastructure |
title_sub | guarding your IT infrastructure |
topic | Computer security / Evaluation / Methodology Computer networks / Security measures datanet datasikkerhed netværk sikkerhed vejledninger Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Computer security / Evaluation / Methodology Computer networks / Security measures datanet datasikkerhed netværk sikkerhed vejledninger Rechnernetz Zugriffskontrolle |
url | http://www.gbv.de/dms/bowker/toc/9780672328091.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018737790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT greggmichael insidenetworksecurityassessmentguardingyouritinfrastructure AT kimdavid insidenetworksecurityassessmentguardingyouritinfrastructure |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis