Protecting Information on Local Area Networks -  James A Schweitzer

Protecting Information on Local Area Networks (eBook)

eBook Download: PDF
2014 | 1. Auflage
152 Seiten
Elsevier Science (Verlag)
978-1-4831-9264-2 (ISBN)
Systemvoraussetzungen
24,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available. Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rationale for network information security and explain the development of a company information network security policy. This book discusses as well security or network-connected personal computers. The final chapter deals with a number of major vulnerabilities of information when communicated or processed on network-connected personal computers. This book is a valuable resource for research scientists, technical security specialists, information systems specialists, and systems administrators.
Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available. Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rationale for network information security and explain the development of a company information network security policy. This book discusses as well security or network-connected personal computers. The final chapter deals with a number of major vulnerabilities of information when communicated or processed on network-connected personal computers. This book is a valuable resource for research scientists, technical security specialists, information systems specialists, and systems administrators.

Front Cover 1
Protecting Information on Local Area Networks 4
Copyright Page 5
Table of Contents 8
Dedication 6
Introduction 10
PART I: Background 16
CHAPTER ONE. Understanding Today's Computer Networks 18
COMMUNICATIONS BRINGS ADDED VALUE TO COMPUTING 19
TYPES OF COMPUTERS 20
BENEFITS FROM NETWORKING COMPUTERS 21
NETWORK TECHNOLOGY AND APPLICATIONS 22
CONSIDERING A LOCAL AREA NETWORK 23
NETWORK VULNERABILITIES 29
NETWORK RISKS AND SECURITY MEASURES 31
THE PERSONAL COMPUTER AND NETWORKS 35
SOME SECURITY CASES INVOLVING NETWORKS 36
CHAPTER TWO. A Management Responsibility: Protecting Information on Networks 38
A CRITICAL BUSINESS REQUIREMENT: INFORMATION QUALITY 39
MANAGEMENT ACTION 1: MANAGEMENT OF THE INFORMATION RESOURCE 40
SUMMARY 46
PURPOSE 46
SCOPE 46
POLICY 46
REFERENCES 47
CORPORATE PUBLICATIONS 47
MANAGEMENT ACTION 2: GOOD SYSTEM DESIGN 48
MANAGEMENT ACTION 3: EFFECTIVE OPERATIONAL MANAGEMENT AND CONTROL 48
MANAGEMENT ACTION 4: NETWORK AND WORKSTATION SECURITY 49
PART II: Planning and Implementing Network Security 50
CHAPTER THREE. Planning for Security in a Local Area Network 52
A NEW KIND OF NETWORK 52
PLANNING A SECURE LOCAL AREA NETWORK 54
RISK AND COUNTERMEASURES ANALYSIS 61
CHAPTER FOUR. Selecting Appropriate Security Elements 64
A NETWORK IS NOT A DATA CENTER 64
DETAILS OF IMPLEMENTATION 66
ENCRYPTION: THE ULTIMATE PROTECTION 79
PART III: Achieving Network Security 86
CHAPTER FIVE. Keys to Secure Network Operations 88
CHARACTERISTICS OF EFFECTIVE SECURITY STANDARDS 88
SPREADING THE WORD 93
SUMMARY 93
CHAPTER SIX. Security Standards for Modern Networks 96
NETWORK SECURITY STANDARDS 97
THE GENERAL SECTION 97
NETWORK ACCESS MANAGEMENT CONTROL SYSTEMS 100
INFORMATION PROTECTION REGULATIONS 101
NONCOMPANY AND OUTSIDE SERVICES AND CONNECTIONS 102
INFORMATION PROCESSING AND TELECOMMUNICATIONS 104
DISTRIBUTED COMPUTING, INCLUDING PERSONAL, OFFICE, RESEARCH, AND SCIENTIFIC 105
EXCEPTIONS TO POLICY 107
CHAPTER SEVEN. Handling the Personal Computer Risk 110
AN EXAMPLE 110
WHAT IS A PERSONAL COMPUTER? 110
THE POWER OF THE PERSONAL COMPUTER 111
THREATS TO INFORMATION 112
PROTECTING THE NETWORK-CONNECTED PERSONAL COMPUTER 113
PLANNING FOR SECURE USE OF PERSONAL COMPUTERS 114
SUMMARY 120
References 122
APPENDIX A: A Management Task List 124
APPENDIX B: An Automated Logical Access Control Standard 134
APPENDIX C: A Problem Reporting and Resolution Procedure 146
Index 149

Erscheint lt. Verlag 12.5.2014
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
ISBN-10 1-4831-9264-4 / 1483192644
ISBN-13 978-1-4831-9264-2 / 9781483192642
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 9,0 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
25,19