Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
198 Security De-engineering
approval, the change will be given a cursory glance over and accepted
by security.
Quite common also is the conguration misdemeanor whereby an
organization congures a network log server that aggregates log mes-
sages from various sources, but then disables local logging on those
sources because it is seen as redundant. Unfortunately though, secu-
rity incidents and connectivity outages often come as a pair. Usually
there is a viable business case for local logging.
Incidents can easily escape the net of logging, monitoring, detec-
tion, security information event management (SIEM) systems, and so
on, but in keeping with the theme of this book, there is also of course
the matter of IT skills or lack of. It is usual ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355