Book description
Understand the total cost of ownership and return on investment for network security solutions
Understand what motivates hackers and how to classify threats
Learn how to recognize common vulnerabilities and common types of attacks
Examine modern day security systems, devices, and mitigation techniques
Integrate policies and personnel with security equipment to effectively lessen security risks
Analyze the greater implications of security breaches facing corporations and executives today
Understand the governance aspects of network security to help implement a climate of change throughout your organization
Learn how to qualify your organization’s aversion to risk
Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI
Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities
The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.
Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow financial modeling exercises to be performed easily.
An essential IT security-investing tool written from a business management perspective, The Business Case for Network Security: Advocacy, Governance, and ROI helps you determine the effective ROP for your business.
This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today’s most important technologies and business strategies.
Table of contents
- About This eBook
- Title Page
- Copyright Page
- About the Authors
- About the Technical Reviewers
- Dedications
- Acknowledgments
- Contents at a Glance
- Contents
- Icons Used in This Book
- Introduction
-
Part I: Vulnerabilities and Technologies
- Chapter 1. Hackers and Threats
- Chapter 2. Crucial Need for Security: Vulnerabilities and Attacks
-
Chapter 3. Security Technology and Related Equipment
- Virus Protection
- Traffic Filtering and Firewalls
- Encryption
- Authentication, Authorization, and Accounting: AAA
- Public Key Infrastructure
- From Detection to Prevention: Intrusion-Detection Systems and Intrusion-Prevention Systems
- Content Filtering
- Assessment and Audit
- Additional Mitigation Methods
- Summary
- End Notes
- Chapter 4. Putting It All Together: Threats and Security Equipment
-
Part II: Human and Financial Issues
-
Chapter 5. Policy, Personnel, and Equipment as Security Enablers
- Securing the Organization: Equipment and Access
- Managing the Availability and Integrity of Operations
- Implementing New Software and Privacy Concerns
- Regulating Interactivity Through Information and Equipment Control
- Mobilizing the Human Element: Creating a Secure Culture
- Creating Guidelines Through the Establishment of Procedural Requirements
- Determining Rules and Defining Compliance
- Securing the Future: Business Continuity Planning
- Ensuring a Successful Security Policy Approach
- Surveying IT Management
- Summary
- Chapter 6. A Matter of Governance: Taking Security to the Board
- Chapter 7. Creating Demand for the Security Proposal: IT Management's Role
- Chapter 8. Risk Aversion and Security Topologies
- Chapter 9. Return on Prevention: Investing in Capital Assets
-
Chapter 5. Policy, Personnel, and Equipment as Security Enablers
- Part III: Policies and Future
- Part IV: Appendixes
- Glossary
- Index
Product information
- Title: The Business Case For Network Security: Advocacy, Governance, And Roi
- Author(s):
- Release date: December 2004
- Publisher(s): Cisco Press
- ISBN: 1587201216
You might also like
book
CompTIA® Security+™ SY0-301 Exam Cram, Third Edition
Prepare for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Exam Cram from Pearson IT …
book
CompTIA® Security+ SY0-401 Cert Guide, Deluxe Edition, Third Edition
This is the eBook version of the print title. Note that the eBook does not provide …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
article
Three Ways to Sell Value in B2B Markets
As customers face pressure to reduce costs while maintaining profitability, value-based selling (VBS) has become critical …