Skip to Main Content
Security Monitoring
book

Security Monitoring

by Chris Fry, Martin Nystrom
February 2009
Intermediate to advanced content levelIntermediate to advanced
256 pages
7h 43m
English
O'Reilly Media, Inc.
Content preview from Security Monitoring

What This Book Is

Hopefully, you’ve already read books on security. This one aims to take you deeper into your network, guiding you to carve out the more sensitive, important parts of the network for focused monitoring. We haven’t coined a term for this, but if we did, it would be targeted monitoring or policy-based monitoring or targeted reality-based policy monitoring for detecting extrusions.

Here is a short summary of the chapters in this book and what you’ll find inside:

Chapter 1, Getting Started

Provides rationale for monitoring and challenges, and introduces our monitoring philosophy

Following Chapter 1 are the six core chapters of the book, each successively building on topics discussed in previous chapters:

Chapter 2, Implement Policies for Monitoring

Defines rules, regulations, and criteria to monitor

Chapter 3, Know Your Network

Builds knowledge of your infrastructure with network telemetry

Chapter 4, Select Targets for Monitoring

Defines the subset of infrastructure to monitor

Chapter 5, Choose Event Sources

Identifies the event types needed to discover policy violations

Chapter 6, Feed and Tune

Collects data and generates alerts, and tunes systems using context

Chapter 7, Maintain Dependable Event Sources

Prevents critical gaps in your event collection and monitoring

Following the core chapters are the closing chapter and a trio of appendixes:

Chapter 8, Conclusion: Keeping It Real

Provides case studies and real examples to illustrate the concepts presented in the six core chapters

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna

Publisher Resources

ISBN: 9780596157944Errata Page