Network Security Auditing

Nonfiction, Computers, Networking & Communications
Cover of the book Network Security Auditing by Chris Jackson, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Chris Jackson ISBN: 9781587059421
Publisher: Pearson Education Publication: June 2, 2010
Imprint: Cisco Press Language: English
Author: Chris Jackson
ISBN: 9781587059421
Publisher: Pearson Education
Publication: June 2, 2010
Imprint: Cisco Press
Language: English

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.

 

Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.

 

Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.

 

This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company’s security posture.

  • Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery.
  • Recognize the foundational roles of security policies, procedures, and standards.
  • Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting.
  • Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors.
  • Evaluate people, processes, and technical security controls through a system-based approach.
  • Audit security services enabled through Cisco products.
  • Analyze security policy and compliance requirements for Cisco networks.
  • Assess infrastructure security and intrusion prevention systems.
  • Audit network access control and secure remote access systems.
  • Review security in clients, hosts, and IP communications.
  • Evaluate the performance of security monitoring and management systems.

This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.

 

Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.

 

Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.

 

This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company’s security posture.

This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.

More books from Pearson Education

Cover of the book I, Avatar: The Culture and Consequences of Having a Second Life by Chris Jackson
Cover of the book Windows Server 2012 Pocket Consultant by Chris Jackson
Cover of the book How to Identify and Weed Out Low Performers in Any Business by Chris Jackson
Cover of the book Nanoconvergence by Chris Jackson
Cover of the book Begin to Code with Python by Chris Jackson
Cover of the book iOS 9 Application Development in 24 Hours, Sams Teach Yourself by Chris Jackson
Cover of the book Mac OS X Lion by Chris Jackson
Cover of the book Digital Exhaust by Chris Jackson
Cover of the book Learning Core Audio by Chris Jackson
Cover of the book Microsoft Public Cloud Services by Chris Jackson
Cover of the book Microsoft Expression Blend 4 Unleashed by Chris Jackson
Cover of the book Exam Ref 70-745 Implementing a Software-Defined DataCenter by Chris Jackson
Cover of the book Communities of Innovation by Chris Jackson
Cover of the book Upgrading and Repairing PCs by Chris Jackson
Cover of the book Creating a Database in FileMaker Pro 8 by Chris Jackson
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy