1. Trang chủ
  2. » Công Nghệ Thông Tin

network security illustrated

450 457 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 450
Dung lượng 11,6 MB

Nội dung

www.GetPedia.com [...]... foundation of the house represents the network design A network built with security in mind makes every other aspect of security much easier A poorly built network can collapse on itself, and is very hard to secure afterthe-fact The house itself represents the information that moves around the network That’s why the bulk of the book deals with information security • The security systems on the house are... tools to enable centralized control and analysis of network systems Copyright 2004 by J a s on Alba ne s e a nd We s S onne nre ich Click He re for Te rms of Us e 2 Network Security Illustrated Introduction to Managing Security Information security has little to do with technology; it’s a business problem If a business needs security, it needs to build security into its very core—its mission and vision... secure than the middle The security philosophy for the middle is to avoid getting burnt or cut by the flaming knives you’re juggling If you’re already stuck here, at least you’re in good company Part I Managing Security 8 Network Security Illustrated The Security Policy Your security philosophy will have to be interpreted for each business process These interpretations are known as security policies Some... used to manage security Key Points • Information security is a business problem, not a technology problem • Total security is impossible A trade-off has always existed between security and usability • Some amount of security is possible, but this can only be achieved after an organization identifies its security philosophy and integrates that philosophy into its business processes • Security policies... Hardening Networks: Network Address Translation 229 Technology Overview 229 How NAT Works 232 Security Considerations 234 Making the Connection 235 Best Practices 236 Final Thoughts 236 20 Hardening Networks: Virtual Private Networks 237 Technology Overview 237 How VPNs Work 238 IPSec Protocols 240 Security Considerations 241 Making the Connection 241 Best Practices 242 Final Thoughts 243 21 Hardening Networks:... PART 6 Connecting Networks 169 Summary 169 Key Points 169 Connecting the Chapters 169 Introduction to Connecting Networks 170 One Computer, Two Computer, Red Computer 170 Specialized Networks Need Specialized Hardware 171 Networks: Power and Peril 173 Connecting Correctly 174 Final Thoughts 177 15 Connecting Networks: Networking Hardware 179 Technology Overview 179 How Routers Work 185 Security Considerations... Overly restricting access to resources can negatively affect company morale You do not want to gain productivity or security at the cost of treating your employees like children If you need prohibitively high levels of Part I Managing Security 10 Network Security Illustrated security on the network, you might want to consider providing a separate, easily monitored system for unrestricted online access.2... way in which the technology or concept works in practice Security Considerations: This is where we talk about the security problems caused by the technology or concept In chapters that describe networking topics, we focus on security issues inherent in whatever’s being covered In security topic chapters, we look at the limitations of the given security technology/concept and how they can be overcome... “Managing Security, ” and Part 5, “Preserving Privacy”) • How will people access/exchange information? (Part 10, “Accessing Information”) • What happens when the tools needed pose direct threats to the security of the business process? (Part 12, “Detecting Intrusions”) • What happens when people need technical support? (Part 2, “Outsourcing Options”) 3 Part I Managing Security 4 Network Security Illustrated. .. the “low-hanging fruit,” making their system significantly more secure 6 Network Security Illustrated guidelines or dictate requirements for security Part of the risk-management process involves becoming compliant with the accepted security practices within the industry Some industries are behind the eight ball when it comes to security Their regulations and recommendations are either outdated or flawed . Managing Security 1 Summary 1 Key Points 1 Connecting the Chapters 1 Introduction to Managing Security 2 Security and Business Processes 2 The Harsh Truth 4 The Security Philosophy 6 The Security. 11 1 Managing Security: The Security Assessment 13 Technology Overview 13 How the Security Assessment Works 14 Best Practices 18 Final Thoughts 18 2 Managing Security: Systems and Network Monitoring. Connecting Networks: Networking Hardware 179 Technology Overview 179 How Routers Work 185 Security Considerations 186 Making the Connection 186 Best Practices 187 Final Thoughts 188 16 Connecting Networks:

Ngày đăng: 25/03/2014, 11:53

TỪ KHÓA LIÊN QUAN

w