Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment.
Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.
Sprache
Verlagsort
Verlagsgruppe
Elsevier Science & Technology
Zielgruppe
Für Beruf und Forschung
Security management, security practitioners, government security operations teams.
Maße
Höhe: 254 mm
Breite: 178 mm
Gewicht
ISBN-13
978-1-55558-306-4 (9781555583064)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. William M. Hancock, PhD, CISSP, CISM, is VP of Security and Chief Security Officer of Cable & Wireless, one of the largest telecom and hosting companies in the world. He has over 30 years of experience in networking, security and related technologies and is the author of many books and articles on security, networking and technology strategy.
Autor*in
SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX, USA
VP of Security and Chief Security Officer, Cable & Wireless, one of the largest telecom and hosting companies in the world.
Why worry about Security?; Network Security Management Basics; Security Foundations; Firewalls and Perimeters; VPNs and Remote Access; Intrusion Detection in Depth; Securing Communications; Keys, Signatures, Certificates, and PKI; Hacker Exploits; Incident Handling Basics; Forensics, Investigation, and Response; Security Diligence; Business Continuity Planning; Auditing Fundamentals; Security-Management Issues; Outsourcing and Security; Security Service Level Agreements; Future Trends in Security; Sample Policy Documents
Appendices: Audit Program for Networks; Useful URLs; Non-Disclosure Agreement; Professional Services Agreement; Physical Security Guidelines; NRIC Preventative Best Practices for Cybersecurity; NRIC Cybersecurity Recovery Best Practices; NRIC Physical Security Best