Hardening Network Security - John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren

Hardening Network Security

Buch | Softcover
608 Seiten
2005
McGraw-Hill Professional (Verlag)
978-0-07-225703-8 (ISBN)
31,15 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Provides details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. This book features a checklist of immediate steps to take to lockdown your system from further attack, and an ongoing monitoring and assessment plan to keep your network secure.
Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.

Features a four-part hardening methodology:



Do This Now!--Checklist of immediate steps to take to lockdown your system from further attackTake It From The Top--Systematic approach to hardening your enterprise from the top downOnce Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditingHow to Succeed--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program

John Mallery is a Managing Consultant at BKD, LLP, and a veteran security specialist. Previously, he was CTO of Clarence M. Kelley and Associates, Inc, a private investigation and security consulting company founded by the former director of the FBI. John is a nationally recognized public speaker and trainer in the area of computer forensics and computer security. He has developed continuing legal education programs for the legal community and POST accredited programs for law enforcement. His presentations always receive excellent evaluations at national conferences. John draws upon his unique experiences as an investigator, network security consultant, and comedian to provide presentations that are both informative and entertaining. John is a member of the Information Technology Security Council for ASIS International, a member of the High Technology Crime Investigation Association, Infragard, and a contributing editor for Security Technology and Design magazine. Jason Zann, CISSP, is currently an Information Security Consultant for DST Systems, Inc. With over nine years as an information security professional, he has been responsible for management, operational, and technical developments for information security products, systems, networks, and processes on a global scale. He has worked for corporate, product, and consulting organizations delivering a range of information security concepts and solutions. Patrick W. Kelly, CISSP, CCSE, MCSE, MCP+I, currently serves as Information Assurance Engineer for ComGlobal Systems, Inc. Patrick has more than 15 years of combined application development and network security experience. In his current position he is responsible for Enterprise Security Awareness Programs, Vulnerability and Risk Assessment, and Security Component Design and Build. Throughout his career, Patrick has been responsible for implementation and development of network security programs. Some of these projects include: Intrusion Detection and Reaction Systems, Firewall Technology Design and Implementation Wesley J. Noonan (Houston, TX), MCSE, CCNA, CCDA, NNCSS, Security +, has been working in the computer industry for more than 11 years, specializing in Windows-based networks and network infrastructure design and implementation. He is a Senior Network Consultant for Collective Technologies, LLC (http://www.colltech.com), a company that specializes in storage, server and network design, architecture, implementation, and security. Wes got his start in the United States Marine Corps working on its Banyan VINES network, and has since worked on building and designing secure networks ranging in size from 25 to 25,000 users. Wes prreviously worked in R&D for BMC Software, Inc., on their PATROL management solutions, architecting and testing their network and application management products. Wes is also an active trainer, developing and teaching his own custom, Cisco-based routing and switching curriculum. He has spoken at a number of technical conferences and user groups and is a member of the Ask the Experts panel at http://searchwindowssecutiry.techtarget.com. Wes is also the author of Hardening Network Infrastructure (McGraw-Hill/Osbourne, 2004). Eric S. Seagren,(Missouri City, TX), CISSP, ISSAP, SCNP, CCNA, CNE, MCP+I, MCSE, has nine years of experience in the computer industry, with the last eight years spent in the financial services industry working for a fortune 100 company. Eric started his computer career working on Novell servers and performing general network troubleshooting for a small Houston-based company. While working in the financial services industry, his duties have included server administration, disaster recovery responsibilities, business continuity coordinator, and Y2K remediation responsibilities. He has spent the last four years as an IT architect, designing secure, scalable, and redundant networks. His design experience includes the implementation of intrusion detection systems, and the security evaluation of network designs and network device configurations. Paul Love, CISSP, CISA, CISM, Security +, is a Security Manager for a large financial institution and has been in the IT field for 15 years. Paul holds a master of science degree in network security and a bachelors degree in information systems. He is a coauthor of the book Hardening Linux (McGraw-Hill/Osborne, 2004) and has been the technical editor for over ten best-selling Linux and Unix books. Paul ran a successful Linux portal site during the dot com era. Rob Kraft is the director of software development for KCX, Inc. Rob spent two years as a Microsoft Certified Trainer teaching classes on SQL Server and Visual Basic. He is also certified by IBM to teach DB2 and WebSphere. In addition to teaching, Rob spent 15 years developing applications on a range of platforms, development languages, and database management systems. Rob coauthored books on Microsoft SQL Server and has presented SQL Server, Internet Security, and Visual Basic at conferences and seminars. In his spare time, Rob assists local nonprofits with IT and other needs. You may contact Rob at http://www.RobKraft.org. Mark ONeill is the principal author of Web Services Security (McGraw-Hill/Osborne, 2003). Mark has written on the topic of XML and web services security in magazines such as Web Services Journal, XML Journal, Java Pro, Enterprise Architect, Infoconomy, and Technology for Finance. As Chief Technical Officer at Vordel, a pioneering vendor of XML security products, Mark has met many early adopters of XML, gathering and synthesizing their security requirements. Mark regularly presents training courses on web services security in London, California, and on the U.S. East Coast. For the past four years, he has been chosen as a speaker on the topic of XML security at the RSA Conference, the infosec industrys largest annual conference. Mark lives in an old house in Bostons up-and-coming Roslindale neighborhood, with Kristen and their two-year-old son Ben.

Part I: Do This Now!Chapter 1: Do These 7 Things Before You Do Anything Else Part II: Take it From the Top. Systematically Hardening Your Enterprise Chapter 2: Break the Network into Areas of Common Functionality Chapter 3: Hardening with Identity Management Systems Chapter 4: Hardening Cross Platform Authentication Chapter 5: Implement Secure Centralized Authentication MechanismsChapter 6: Mobile Authentication Considerations Chapter 7: Beyond Access Controls - Protecting Stored DataChapter 8: Hardening Database Access Chapter 9: Hardening Cross Platform Access Controls Chapter 10: Hardening Data Transport Using Encryption Chapter 11: Hardening Remote Clients (Windows, Mac, *nix) Chapter 12: Hardening Wireless Chapter 13: Hardening a Mixed Unix NetworkChapter 14: Intrusion Detection and Response Chapter 15: Managing Malicious CodeChapter 16: Hardening Wetware Part III: Once is Never EnoughChapter 17: Auditing and Testing Security Chapter 18: Change Management Chapter 19: Security Patching Chapter 20: Security Review Part IV: How to Succeed at Hardening Chapter 21: Politics of Security Management Chapter 22: Security Agnostics

Erscheint lt. Verlag 16.2.2005
Zusatzinfo 100 Illustrations
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 0-07-225703-2 / 0072257032
ISBN-13 978-0-07-225703-8 / 9780072257038
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich