Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
E-book details
Log in, If you're interested in the contents of the item.
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
Ebook
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.Enterprise Security: A Data-Centric Approach to Securing the Enterprise will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD. Enterprise Security: A Data-Centric Approach to Securing the Enterprise will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security. This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.
- Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Table of Contents
- Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Credits
- About the Author
- About the Reviewers
- www.packtpub.com
- Support files, e-books, discount offers, and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, e-books, discount offers, and more
- Preface
- What this book covers
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Enterprise Security Overview
- The façade of enterprise security
- The history and making of the façade
- Our current approach to security
- Security architecture 101
- A new approach to security
- Enterprise security pitfalls
- Shortcomings of the current security architecture
- Communicating information security
- The cost of information security
- The conflicting message of enterprise security
- Proving a negative
- The road map to securing the enterprise
- Road map components
- Defining users
- Defining applications
- Defining data
- Defining roles
- Defining processes
- Defining policies and standards
- Defining network infrastructure
- Defining application security architecture
- Road map components
- Summary
- The façade of enterprise security
- 2. Security Architectures
- Redefining the network edge
- Drivers for redefinition
- Feature-rich web applications
- Business partner access
- Miscellaneous third-party services
- Cloud initiatives
- Drivers for redefinition
- Security architecture models
- Defining the building blocks of trust models
- Defining data in a trust model
- Data locations
- Data types
- Defining processes in a trust model
- Defining applications in a trust model
- Defining users in a trust model
- Defining roles in a trust model
- Defining policies and standards
- Defining data in a trust model
- Enterprise trust models
- Application user (external)
- Application owner (business partner)
- System owner (contractor)
- Data owner (internal)
- Automation
- Micro architectures
- Data risk-centric architectures
- BYOD initiatives
- Bring your own mobile device
- Bring your own PC
- Defining the building blocks of trust models
- Summary
- Redefining the network edge
- 3. Security As a Process
- Risk analysis
- What is risk analysis?
- Assessing threats
- Assessing impact
- Assessing probability
- Assessing risk
- Qualitative risk analysis
- Qualitative risk analysis exercise
- Quantitative risk analysis
- Quantitative risk analysis exercise
- Qualitative risk analysis
- Applying risk analysis to trust models
- Deciding on a risk analysis methodology
- Other thoughts on risk and new enterprise endeavors
- What is risk analysis?
- Security policies and standards
- Policy versus standard
- A quick note on wording
- Understanding security policy development
- Common IT security policies
- Information security policy
- Acceptable use policy
- Technology use policy
- Remote access policy
- Data classification policy
- Data handling policy
- Data retention policy
- Data destruction policy
- Policies for emerging technologies
- Policy considerations
- Emerging technology challenges
- Developing enterprise security standards
- Common IT security standards
- Wireless network security standard
- Trust model building block for wireless network security standard
- Applying trust models to develop standards
- Enterprise monitoring standard
- Enterprise encryption standard
- System hardening standard
- Wireless network security standard
- Common IT security standards
- Policy versus standard
- Security exceptions
- Security review of changes
- Perimeter security changes
- Data access changes
- Network architectural changes
- Summary
- Risk analysis
- 4. Securing the Network
- Overview
- Next generation firewalls
- Benefits of NGFW technology
- Application awareness
- Intrusion prevention
- Advanced malware mitigation
- Benefits of NGFW technology
- Intrusion detection and prevention
- Intrusion detection
- Intrusion prevention
- Detection methods
- Behavioral analysis
- Anomaly detection
- Signature-based detection
- Advanced persistent threat detection and mitigation
- Securing network services
- DNS
- DNS resolution
- DNS zone transfer
- DNS records
- DNSSEC
- E-mail
- SPAM filtering
- SPAM filtering in the cloud
- Local SPAM filtering
- SPAM relaying
- SPAM filtering
- File transfer
- Implementation considerations
- Secure file transfer protocols
- User authentication
- Implementation considerations
- User Internet access
- Websites
- Secure coding
- Next generation firewalls
- IPS
- Web application firewall
- DNS
- Network segmentation
- Network segmentation strategy
- Asset identification
- Security mechanisms
- Network segmentation strategy
- Applying security architecture to the network
- Security architecture in the DMZ
- Security architecture in the internal network
- Security architecture and internal segmentation
- Summary
- 5. Securing Systems
- System classification
- Implementation considerations
- System management
- Asset inventory labels
- System patching
- File integrity monitoring
- Implementation considerations
- Implementing FIM
- Real-time FIM
- Manual mode FIM
- Application whitelisting
- Implementation considerations
- Host-based intrusion prevention system
- Implementation considerations
- Host firewall
- Implementation considerations
- Anti-virus
- Signature-based anti-virus
- Heuristic anti-virus
- Implementation considerations
- User account management
- User roles and permissions
- User account auditing
- Policy enforcement
- Summary
- System classification
- 6. Securing Enterprise Data
- Data classification
- Identifying enterprise data
- Data types
- Data locations
- Automating discovery
- Assign data owners
- Assign data classification
- Identifying enterprise data
- Data Loss Prevention
- Data in storage
- Data in use
- Data in transit
- DLP implementation
- DLP Network
- DLP E-mail and Web
- DLP Discover
- DLP Endpoint
- Encryption and hashing
- Encryption and hashing explained
- Encryption
- Encrypting data at rest
- Database encryption
- The need for database encryption
- Methods of database encryption
- Application encryption
- Selective database encryption
- Complete database encryption
- Tokenization
- File share encryption
- Encrypting data in use
- Encrypting data in transit
- Encryption and hashing explained
- Tokenization
- Data masking
- Authorization
- Developing supporting processes
- Summary
- Data classification
- 7. Wireless Network Security
- Security and wireless networks
- Securing wireless networks
- A quick note on SSID cloaking and MAC filtering
- Wireless authentication
- Using shared key
- Caveats of shared key implementation
- Using IEEE 802.1X
- Caveats of 802.1X implementation
- Using shared key
- Wireless encryption
- WEP
- WPA
- WPA2
- Wireless network implementation
- Wireless signal considerations
- End system configuration
- Wireless encryption and authentication recommendations
- Encryption
- Authentication
- Client-side certificates
- EAP-TLS
- Unique system check
- Wireless segmentation
- Wireless network integration
- Wireless network intrusion prevention
- Summary
- 8. The Human Element of Security
- Social engineering
- Electronic communication methods
- Spam e-mail
- Key indicators of a spam e-mail
- Mitigating spam and e-mail threats
- Social media
- Mitigating social media threats
- Spam e-mail
- In-person methods
- Mitigating in-person social engineering
- Phone methods
- Mitigating phone methods
- Business networking sites
- Mitigating business networking site attacks
- Job posting sites
- Mitigating job posting-based attacks
- Electronic communication methods
- Security awareness training
- Training materials
- Computer-based training
- Classroom training
- Associate surveys
- Common knowledge
- Specialized material
- Effective training
- Continued education and checks
- Training materials
- Access denied enforcing least privilege
- Administrator access
- System administrator
- Data administrator
- Application administrator
- Administrator access
- Physical security
- Summary
- Social engineering
- 9. Security Monitoring
- Monitoring strategies
- Monitoring based on trust models
- Data monitoring
- Process monitoring
- Application monitoring
- User monitoring
- Monitoring based on network boundary
- Monitoring based on network segment
- Monitoring based on trust models
- Privileged user access
- Privileged data access
- Privileged system access
- Privileged application access
- Systems monitoring
- Operating system monitoring
- Host-based intrusion detection system
- Network security monitoring
- Next-generation firewalls
- Data loss prevention
- Malware detection and analysis
- Intrusion prevention
- Security Information and Event Management
- Predictive behavioral analysis
- Summary
- Monitoring strategies
- 10. Managing Security Incidents
- Defining a security incident
- Security event versus security incident
- Developing supporting processes
- Security incident detection and determination
- Physical security incidents
- Network-based security incidents
- Incident management
- Security incident detection and determination
- Getting enterprise support
- Building the incident response team
- Roles
- Desktop support
- Systems support
- Applications support
- Database support
- Network support
- Information security
- HR, legal, and public relations
- Responsibilities
- Expected response times
- Incident response contacts
- Supporting procedures
- A quick note on forensics
- Roles
- Developing the incident response plan
- Taking action
- Incident reporting
- Incident response
- In-house incident response
- Contracted incident response
- Summary
- Defining a security incident
- A. Applying Trust Models to Develop a Security Architectuture
- Encrypted file transfer (external)
- External user
- Internal user
- Data owner
- Automation
- Encrypted file transfer (external)
- B. Risk Analysis, Policy and Standard, and System Hardening Resources
- Risk analysis resources
- Policy and standard resources
- System hardening resources
- C. Security Tools List
- Tools for securing the network
- Tools for securing systems
- Tools for securing data
- Tools for security monitoring
- Tools for testing security
- Tools for vulnerability scanning
- D. Security Awareness Resources
- General presentation and training
- Social engineering
- Security awareness materials
- Safe and secure computing resources
- E. Security Incident Response Resources
- Building a CSIRT team
- Incident response process
- An example of incident response process flow
- A sample incident response report form
- A sample incident response form
- Index
- Title: Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- Author: Aaron Woody
- Original title: Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- ISBN: 9781849685979, 9781849685979
- Date of issue: 2013-02-22
- Format: Ebook
- Item ID: e_3ass
- Publisher: Packt Publishing