ABSTRACT

First Published in 2002. Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, fromboth an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those who simply want to learn more about the network security issues that face their organization.

The book covers a broad range of issues, starting with an assessment of network security, including the financial implications of security breaches, and moving on to discuss the different types of security threats facing computer networks. Particular attention is also given to the legal framework for network security. Attention is then turned to increasing security awareness and readiness, including system configuration, acceptable use, business continuity, and explaining technical solutions available such as firewalls and content control.

Introduction of a security policy is widely accepted as best practise in informing and educating users, and the final chapter is devoted to policy writing. By the end of the book readers should be ready to create and implement a network security policy for their organization and start reducing overheads and downtime immediately!

*Discusses all the relevant issues with a concise, straightforward, and readily accessible approach.
*Important emphasis placed on the people management aspects of network security.
*Practical business oriented approach includes reference to legal and financial aspects of network security.
*Companion web site at www.networksecurity.org.uk includes updates, additional material, downloads, and links to resources and further information.

chapter |12 pages

Security assessment

chapter |19 pages

The threats to a secure network

chapter |20 pages

Tools of the trade

chapter |18 pages

Legal framework for network security

chapter |11 pages

Gaining intelligence and taking action

chapter |20 pages

Secure processes and system configuration

chapter |14 pages

Acceptable use

chapter |13 pages

Business continuity

chapter |12 pages

Firewalls

chapter |16 pages

Content security

chapter |30 pages

Security policy