Catálogo de publicaciones - libros
Practical Internet Security
John R. Vacca
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
| Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
|---|---|---|---|---|
| No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-0-387-40533-9
ISBN electrónico
978-0-387-29844-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer Science+Business Media, LLC 2007
Cobertura temática
Tabla de contenidos
Impersonating Users
John R. Vacca
This chapter provided a methodology for the steps you must take now to rapidly develop a risk profile for your enterprise; and, the enterprise requirements you must adhere to in developing an Internet security policy. The chapter also explained the major services provided by Internet connectivity. Finally, it also mapped the security controls available to the services the enterprise can help protect.
Part VI - Deterring Masqueraders and Ensuring Authenticity | Pp. 205-209
How Masqueraders Infiltrate a System
John R. Vacca
The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.
Part VI - Deterring Masqueraders and Ensuring Authenticity | Pp. 211-224
Holding Your Defensive Line
John R. Vacca
The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.
Part VI - Deterring Masqueraders and Ensuring Authenticity | Pp. 225-231
Unauthorized Listening and Looking
John R. Vacca
This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!
Part VII - Preventing Eavesdropping to Protect Your Privacy | Pp. 235-241
Countering or not Countering the Eavesdropper: That’s the Question?
John R. Vacca
This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!
Part VII - Preventing Eavesdropping to Protect Your Privacy | Pp. 243-254
The Forger’s Arsenal
John R. Vacca
The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.
Part VIII - Thwarting Counterfeiters and Forgery to Retain Integrity | Pp. 257-267
Shielding your Assets
John R. Vacca
The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.
Part VIII - Thwarting Counterfeiters and Forgery to Retain Integrity | Pp. 269-274
Denial-of-Service Attacks
John R. Vacca
This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!
Part IX - Avoiding Disruption of Service to Maintain Availability | Pp. 277-279
Constructing Your Bastions
John R. Vacca
This chapter provided a methodology for the steps you must take now to rapidly develop a risk profile for your enterprise; and, the enterprise requirements you must adhere to in developing an Internet security policy. The chapter also explained the major services provided by Internet connectivity. Finally, it also mapped the security controls available to the services the enterprise can help protect.
Part IX - Avoiding Disruption of Service to Maintain Availability | Pp. 281-284
The Importance of Firewalls
John R. Vacca
This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!
Part IX - Avoiding Disruption of Service to Maintain Availability | Pp. 285-292