Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI
Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Business Case for Network Security: Advocacy, Governance, and ROI

Авторы: Paquet W, Saxe W.

Аннотация:

The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.


Язык: en

Рубрика: Экономика и финансы/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 408

Добавлена в каталог: 22.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
IM (Infosec Management) quotient      2nd
IM (Infosec management) quotient surveys      
IM (Infosec Management) survey      
Imperatives      
Impersonation      2nd
impersonation attacks      
implementation      
implementation issues      
Implementing      2nd
importance of      
improve component      2nd
in-band management      2nd 3rd
inbound dialing      
incident reporting      2nd 3rd 4th
incidents      
incorrect use      2nd 3rd
increases in      
Information Security (i)      
Information Security Breaches Survey 2002, Technical Report      
Information Security Breaches Survey 2004, Executive Summary      
Information Security Breaches Survey 2004, Technical Report      
Infosec Management (IM) quotient      2nd
Infosec management (IM) quotient surveys      
Infosec Management (IM) survey      
Infosec operational (IO) quotient surveys      
Infosec Operational (IO) survey      [See IO (Infosec Operational) survey]
initiatives      
Installation      
instilling      2nd 3rd
Integrity      
Integrity issues      
Interactivity      
interdepartmental firewalls      2nd
internal attacks      
internal hackers      2nd 3rd 4th 5th 6th 7th 8th
internal hacking      2nd 3rd 4th 5th 6th 7th 8th
internal threats      
Internet access control      
Internet Requests for Comments (RFCs)      
intitiatives      
intrusion-detection systems (IDSs)      [See IDSs (intrusion detection systems)]
intrusion-prevention systems (IPSs)      [See IPSs (intrusion-prevention systems)]
Inventory control      2nd
investments      
investor relations department      
involving in      2nd 3rd
IO (Infosec operational) quotient surveys      
IO (Infosec Operational) survey      
IO quotient      
IO survey      
IP spoofing      
IP Telephony Security in Depth (SAFE      
IP Telephony)      
IPS sensors      
IPsec      
IPSs      2nd 3rd 4th 5th
IPSs (intrusion-prevention systems)      
IRR (Internal Rate of Return)      2nd
ISDS      
IT management      
IT security      2nd 3rd 4th 5th 6th 7th
job categories      
Jurisprudence      
Keys      
Kirkpatrick, David      
LANs      
laptop computers      
Law of diminishing returns      
leakage scenarios      2nd
legal ramifications      2nd 3rd
legislation regarding      2nd
legislations      
licensing      
Lifetimes      
lobbying      
lobbying support      
log analysis      2nd
logging      
logistics department      
long-term risks      
lowering      2nd 3rd 4th 5th
MAC addresses      2nd
mail bombs      2nd 3rd
maintaining      
man-in-the middle attacks      
man-in-the-middle attacks      
managaing      2nd 3rd
management server consoles      
Managers      
Managing      2nd 3rd
mandates      
mandates and directives      
Mapping      2nd
marketing department      
mitigating      
mitigation      
mobile access      
mobile employees      
mobile employess      
modest network security topology      2nd
modest network topology      2nd
modest network topology (SAFE)      2nd
Monitor      
monitor component      2nd
Monitoring      
motivations      2nd 3rd 4th 5th
multiple brands      
Mydoom worm      
NAC (Network Admission Control)      2nd
National Cyber Security Partnership (NCSP)      
NBAR (Network-Based Application Recognition)      
NCSP (National Cyber Security Partnership)      
negligence      2nd 3rd
NetForensics      2nd
NetIQ      
netizenry      2nd
Network Intelligence      
network interface cards (NICs)      [See NICs (network interface cards)]
Network policies      2nd 3rd
network reconnaissance      
network reconnaissance attacks      
Network Security Secrets & Solutions (i), 4th edition
network targets      2nd 3rd
network testing      
network vunerability scanners      
Network-Based Application Recognition (NBAR)      
network-based IDS (NIDS)      2nd
networks      
Newton's Telecom Dictionary      
NICs      
NIDS      
NIDS (network-based IDS)      2nd 3rd
Niksun      
No Time to Relax      
nonmathematical security fundamentals      2nd
Normalization      2nd
Norton Antivirus Protection software      
Notebook computers      2nd
NPV (Net Present Value)      2nd 3rd 4th 5th 6th
OLE_LINK1      
OLE_LINK2      
one-time passwords      
one-time passwords (OTPs)      2nd
online banking      
Operating systems      
operating sytems      
operation integrity      
Opportunities      
Organizations      
OTPs (one-time passwords)      2nd 3rd 4th
out-of-band management      2nd 3rd
outgoing traffic monitoring      
outgoing-traffic administration      2nd 3rd 4th
ownership policies      2nd 3rd
packet sniffers      
Packets      
Parameters      
password attacks      
password policies      
password sanctity      
password storing      
Passwords      2nd 3rd 4th
patches      
Paths      
payback periods      2nd 3rd
peer group communications      2nd
Peer groups      
penetrable analysis      2nd 3rd 4th 5th
perimeter routers      
PGP (Pretty Good Privacy)      
physical security policies      2nd 3rd
pincreases in      
Ping of Death attacks      
Pins      
PINs (personal identification numbers)      
PKI      2nd 3rd 4th 5th
policies      
policy adjustments      
policy enforcement challenges      
policy tools      2nd 3rd
port redirection attacks      
port security      
Present values      2nd 3rd 4th 5th 6th 7th
presentations      
Pretty Good Privacy (PGP)      
preventing      
Privacy      
privacy breaches      2nd
privacy concerns      2nd
privacy filters      
Private keys      
private virtual LANs (PVLANs)      [See switches;PVLANs (private virtual LANs)]
procedural requirements      2nd 3rd 4th
production department      
professional hackers      2nd 3rd 4th
Propagation      
proposals      
Protection      
protocol exploitation      
protocol vunerabilities      
protocol weaknesses      
Protocols      
proximity cards      
Proxy servers      
pseudo-tokens      
Public Company Accounting Reform and Investor Protection Act of 2002, The (i)      
Public key infrastructure (PKI)      [See PKI (public key infrastructure)]
Public keys      
purist hackers      2nd 3rd
PVLANs      
PVLANs (private virtual LANs)      
quality audits      
quality practices      
Questions      
questions and situations      2nd 3rd 4th 5th 6th
RA (risk aversion) quotient      
rating scale      
recognizing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
reconnaissance attacks      2nd 3rd 4th 5th
regulating      
reliability issues      
Remote access      
remote configuration policies      2nd 3rd
Remote user      
remote user encrypted VPN      
remote-access policies      2nd
reporting      
Request for Comments (RFCs)      
required policies      
requirement management      2nd 3rd 4th
Requirements      
respondents      
responding to      2nd
responsibility determination      
retention      
retention policies      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
return on investment (ROI) modeling      
RETURNS      
reviewing      2nd 3rd
RFCs (Request for Comments)      
Ridge, Tom      
Risk aversion      2nd 3rd
risk exposure      
Risk tolerance      
risk tolerance equivalency scale      2nd
risks      
roconnaissance attacks      
ROI (return on investment)      2nd 3rd
ROI (return on investment) modeling      
ROP      
ROP (return on prevention)      
router targets      2nd
routers      
RST (Reset) packets      
Sa
SA (Security Agent)      
sabotage attacks      
SAFE      
SAFE architectures      2nd 3rd 4th 5th 6th 7th
SAFE blueprint      
SAFE blueprints      2nd 3rd
sales department      
sanctity      
Sarbanes-Oxley Act of 2002, The (i)      
Scalability      
Scanning      
scanning and system attacks      2nd
scanning and system detailing      2nd 3rd
scanning and system detailing attacks      2nd 3rd
secure component      2nd
secure cultures      
secure data exchanges      
secure date exchanges      
secure environments      
securing      
Security      
security audits      
security breaches      2nd 3rd 4th
security incidents      
security initiatives      
security modeling      2nd 3rd
security postures      2nd 3rd
security presentations      2nd 3rd 4th 5th
security requirements      
Security Survey      
security topologies      2nd
Security Wheel      2nd
self-defending networks      2nd 3rd 4th
Senior management      
senior management requirements      
sensors      
Servers      2nd 3rd 4th 5th 6th 7th
Service Level Agreements (SLAs)      [See SLAs (service level agreements)]
Service-level agreements (SLAs)      
session hijackings      
session replay      
session replays      
session termination      
session time length      
short-term risks      2nd 3rd
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте