Catálogo de publicaciones - libros

Compartir en
redes sociales


Practical Internet Security

John R. Vacca

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-0-387-40533-9

ISBN electrónico

978-0-387-29844-3

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer Science+Business Media, LLC 2007

Tabla de contenidos

Firewall Topologies

John R. Vacca

This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!

Part XIII - Firewalls and Firewall Topologies | Pp. 399-410

Selecting Firewall Security Topology Policy

John R. Vacca

This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!

Part XIII - Firewalls and Firewall Topologies | Pp. 411-430

Identifying and Responding to Security Violations

John R. Vacca

The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.

Part XIV - Security Management Solutions and Future Directions | Pp. 433-438

Real-Time Monitoring and Auditing

John R. Vacca

The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.

Part XIV - Security Management Solutions and Future Directions | Pp. 439-443

Limiting Damage

John R. Vacca

The U.S. and China take cyber surveillance very seriously. Therefore, let the U.S. get on with it. Finally, that’s the only way of becoming a superpower.

Part XIV - Security Management Solutions and Future Directions | Pp. 445-448

Keeping Up to Date on New Threats

John R. Vacca

This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!

Part XIV - Security Management Solutions and Future Directions | Pp. 449-451

Emerging Technologies

John R. Vacca

This chapter’s message to you is this: Fear of the Internet is unfounded if proper security measures are implemented as part of a well-designed security strategy. Firewalls have their place in the security design, but enterprise trade secrets and sensitive government data need to be encrypted at a high level of security. To avoid the threat of destruction of data by hackers, make regular and periodic backups and store copies off site. That might sound pretty basic; but today, there are still many major federal agencies and large enterprises that don’t backup critical data files on a regular basis. To put it mildly, they are playing with cyber fire!

Part XIV - Security Management Solutions and Future Directions | Pp. 453-455

Summary, Conclusions and Recommendations

John R. Vacca

This chapter provided a methodology for the steps you must take now to rapidly develop a risk profile for your enterprise; and, the enterprise requirements you must adhere to in developing an Internet security policy. The chapter also explained the major services provided by Internet connectivity. Finally, it also mapped the security controls available to the services the enterprise can help protect.

Part XIV - Security Management Solutions and Future Directions | Pp. 457-468