Register your product to gain access to bonus material or receive a coupon.
Business Case for Network Security, The: Advocacy, Governance, and ROI
- Your Price: $31.99
- List Price: $39.99
- Includes EPUB, MOBI, and PDF
- About eBook Formats
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
- Copyright 2005
- Dimensions: Special (all other)
- Pages: 408
- Edition: 1st
- eBook (Watermarked)
- ISBN-10: 0-13-343389-7
- ISBN-13: 978-0-13-343389-0
Understand the total cost of ownership and return on investment for network security solutions
- Understand what motivates hackers and how to classify threats
- Learn how to recognize common vulnerabilities and common types of attacks
- Examine modern day security systems, devices, and mitigation techniques
- Integrate policies and personnel with security equipment to effectively lessen security risks
- Analyze the greater implications of security breaches facing corporations and executives today
- Understand the governance aspects of network security to help implement a climate of change throughout your organization
- Learn how to qualify your organization’s aversion to risk
- Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI
- Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities
The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.
Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow financial modeling exercises to be performed easily.
An essential IT security-investing tool written from a business management perspective, The Business Case for Network Security: Advocacy, Governance, and ROI helps you determine the effective ROP for your business.
This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today’s most important technologies and business strategies.
Table of Contents
I. VULNERABILITIES AND TECHNOLOGIES.
1. Hackers and Threats.
Contending with Vulnerability
Realizing Value in Security Audits
Assessing Vulnerability and Response
Hackers: Motivation and Characteristics
The Enemy Within: Maliciousness and Sloppiness
The Future of Hacking and Security
2. Crucial Need for Security: Vulnerabilities and Attacks.
Design Vulnerabilities Issues
Human Vulnerability Issues
Implementation Vulnerability Issues
Categories of Attacks
The Human Component in Attacks
Denial of Service Attacks
Additional Common Attacks
Scanning and System Detailing
Software and Protocol Exploitation
Man-in-the-Middle Wireless Attacks
Wireless Denial of Service
The Hapless Road Warrior
Examples of Social Engineering Tactics
Summary of Attacks
Cisco SAFE Axioms
Routers Are Targets
Switches Are Targets
Hosts Are Targets
Networks Are Targets
Applications Are Targets
3. Security Technology and Related Equipment.
Authentication, Authorization, and Accounting: AAA
Public Key Infrastructure
From Detection to Prevention: Intrusion-Detection Systems and Intrusion-Prevention Systems
Network- and Host-Based IDS
E-Mail Content Filtering
Assessment and Audit
Additional Mitigation Methods
Stopping a Worm with Network-Based Application Recognition
Automated Patch Management
Notebook Privacy Filter
4. Putting It All Together: Threats and Security Equipment.
Threats, Targets, and Trends
Lowering Risk Exposure
II. HUMAN AND FINANCIAL ISSUES.
5. Policy, Personnel, and Equipment as Security Enablers.
Securing the Organization: Equipment and Access
Managing the Availability and Integrity of Operations
Implementing New Software and Privacy Concerns
Custom and Vendor-Supplied Software
Sending Data: Privacy and Encryption Considerations
Regulating Interactivity Through Information and Equipment Control
Determining Levels of Confidentiality
Inventory Control: Logging and Tagging
Mobilizing the Human Element: Creating a Secure Culture
Management Involvement: Steering Committee
Creating Guidelines Through the Establishment of Procedural Requirements
Determining Rules and Defining Compliance
Securing the Future: Business Continuity Planning
Ensuring a Successful Security Policy Approach
Security Is a Learned Behavior
Inviting the Unknown
Avoiding a Fall into the Safety Trap
Accounting for the Unaccountable
Striving to Make Security Policies More Efficient
Surveying IT Management
The Need for Determining a Consensus on Risk
Infosec Management Survey
Infosec Management Quotient
6. A Matter of Governance: Taking Security to the Board.
Security-A Governance Issue
Directing Security Initiatives
Leading the Way
Establishing a Secure Culture
Securing the Physical Business
Securing Business Relationships
Securing the Homeland
Involving the Board
Examining the Need for Executive Involvement
Elements Requiring Executive Participation
7. Creating Demand for the Security Proposal: IT Management's Role.
Delivering the Security Message to Executive Management
Recognizing the Goals of the Corporation
Knowing How the Organization Can Use ROP
Understanding the Organization's Mandate and Directives
Acknowledging the Organization's Imperatives and Required Deliverables
Establishing an Appropriate Security Posture
Outlining Methods IT Managers Can Use to Engage the Organization
Assessing Senior Business Management Security Requirements
Every Question Counts: Delivering the Survey to Respondents
Infosec Operational Survey
Infosec Operational Quotient
8. Risk Aversion and Security Topologies.
The Notion of Risk Aversion
Determining Risk Tolerance
What Assets to Protect
Short-Term and Long-Term Risks
Calculating the Risk-Aversion Quotient
Risk-Aversion Quotient and Risk Tolerance
Using the Charts
One Size Rarely Fits All
Security Throughout the Network
9. Return on Prevention: Investing in Capital Assets.
Examining Cost of Attacks
Determining a Baseline
Budgeting for Security Equipment
Total Cost of Ownership
Analyzing Returns on Security Capital Investments
Net Present Value
Internal Rate of Return
Return on Investment
The Bottom Line
Acknowledging Nonmathematical Security Fundamentals
III. POLICIES AND FUTURE.
10. Essential Elements of Security Policy Development.
Determining Required Policies
Constructing Reliable and Sound Policies
Using Policy Tools and Policy Implementation Considerations
Useful Policy Tools
Performing Comprehensive Monitoring
Knowing Policy Types
Physical Security Policies
Dialup and Analog Policies
Remote Configuration Policies
VPN and Encryption Policies
Data Sensitivity, Retention, and Ethics Policies
Summary of Policy Types
11. Security Is a Living Process.
Good Netizen Conduct
SWOT: Strengths, Weaknesses, Opportunities, and Threats
Appendix A. References.
Appendix B. OSI Model, Internet Protocol, and Packets.
Appendix C. Quick Guides to Security Technologies.
Appendix D. Return on Prevention Calculations Reference Sheets.