O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to Cheat at Managing Information Security

Book Description

This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.

These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.

Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure

* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies

* Navigate through jargon filled meetings with this handy aid

* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Acknowledgments
  6. Author Acknowledgements
  7. About the Author
  8. About Interoute Communications Limited
  9. About the Technical Editor
  10. How to Use this Book
  11. Preface
  12. Introduction
  13. Chapter 1: The Security Organization
    1. Anecdote
    2. Introduction
    3. Where Should Security Sit? Below the CEO, CTO, or CFO
    4. Your Mission: If You Choose to Accept It
    5. Role of the Security Function: What’s in a Job?
    6. The Hybrid Security Team: Back to Organizational Studies
    7. What Makes a Good CISO?
    8. Summary
  14. Chapter 2: The Information Security Policy
    1. Anecdote
    2. Introduction
    3. Policy, Strategy, and Standards: Business Theory
    4. Back to Security
    5. The Security Strategy and the Security Planning Process
    6. Security Policy Revisited
    7. Security Standards Revisited
    8. Compliance and Enforcement
    9. Summary
  15. Chapter 3: Jargon, Principles, and Concepts
    1. Anecdote
    2. Introduction
    3. CIA: Confidentiality, Integrity, and Availability
    4. The Vulnerability Cycle
    5. Types of Controls
    6. Risk Analysis
    7. AAA
    8. Other Concepts You Need to Know
    9. Generic Types of Attack
    10. Summary
  16. Chapter 4: Information Security Laws and Regulations
    1. Anecdote
    2. Introduction
    3. U.K. Legislation
    4. U.S. Legislation
    5. Summary
  17. Chapter 5: Information Security Standards and Audits
    1. Anecdote
    2. Introduction
    3. ISO/IEC 27001:2005: What Now for BS 7799?
    4. PAS 56
    5. FIPS 140-2
    6. Common Criteria Certification
    7. Types of Audit
    8. Summary
  18. Chapter 6: Interviews, Bosses, and Staff
    1. Anecdote
    2. Introduction
    3. Bosses
    4. Worst Employees
    5. Summary
  19. Chapter 7: Infrastructure Security
    1. Anecdote
    2. Introduction
    3. E-commerce
    4. Just Checking
    5. Summary
  20. Chapter 8: Firewalls
    1. Anecdote
    2. Introduction
    3. Firewall Structure and Design
    4. Other Types of Firewalls
    5. Commercial Firewalls
    6. Summary
  21. Chapter 9: Intrusion Detection Systems: Theory
    1. Anecdote
    2. Introduction
    3. Why Bother with an IDS?
    4. NIDS in Your Hair
    5. For the Technically Minded
    6. Summary
  22. Chapter 10: Intrusion Detection Systems: In Practice
    1. Anecdote
    2. Introduction: Tricks, Tips, and Techniques
    3. IDS Deployment Methodology
    4. Selection
    5. Deployment
    6. Information Management
    7. Incident Response and Crisis Management
    8. Test and Tune
    9. Summary
  23. Chapter 11: Intrusion Prevention and Protection
    1. Anecdote
    2. Introduction
    3. What Is an IPS?
    4. Active Response: What Can an IPS Do?
    5. A Quick Tour of IPS Implementations
    6. Example Deployments
    7. Summary
  24. Chapter 12: Network Penetration Testing
    1. Anecdote
    2. Introduction
    3. Types of Penetration Testing
    4. Network Penetration Testing
    5. Controls and the Paperwork You Need
    6. What’s the Difference between a Pen Test and Hacking?
    7. Summary
  25. Chapter 13: Application Security Flaws and Application Testing
    1. Anecdote
    2. Introduction
    3. Configuration Management
    4. Unvalidated Input
    5. Bad Identity Control
    6. Fixing Things
    7. For the More Technically Minded
    8. Summary
  26. Index