Book description
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.
Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.
This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company’s security posture.
Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery.
Recognize the foundational roles of security policies, procedures, and standards.
Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting.
Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors.
Evaluate people, processes, and technical security controls through a system-based approach.
Audit security services enabled through Cisco products.
Analyze security policy and compliance requirements for Cisco networks.
Assess infrastructure security and intrusion prevention systems.
Audit network access control and secure remote access systems.
Review security in clients, hosts, and IP communications.
Evaluate the performance of security monitoring and management systems.
This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
Table of contents
- Title Page
- Copyright Page
- Dedications
- About the Author
- About the Technical Reviewers
- Acknowledgments
- Contents at a Glance
- Contents
- Icons Used in This Book
- Introduction
- Chapter 1. The Principles of Auditing
- Chapter 2. Information Security and the Law
- Chapter 3. Information Security Governance, Frameworks, and Standards
- Chapter 4. Auditing Tools and Techniques
- Chapter 5. Auditing Cisco Security Solutions
- Chapter 6. Policy, Compliance, and Management
- Chapter 7. Infrastructure Security
- Chapter 8. Perimeter Intrusion Prevention
- Chapter 9. Access Control
- Chapter 10. Secure Remote Access
- Chapter 11. Endpoint Protection
- Chapter 12. Unified Communications
- Index
Product information
- Title: Network Security Auditing
- Author(s):
- Release date: June 2010
- Publisher(s): Cisco Press
- ISBN: 9781587053528
You might also like
book
Securing Network Infrastructure
Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction This course is a complete guide to help …
book
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition
The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this …