Main Page

  
IT Security: Risking the Corporation
By Linda McCarthy
 
Publisher: Prentice Hall PTR
Pub Date: February 24, 2003
ISBN: 0-13-101112-X
Pages: 272


Even the world's largest and most sophisticated networks are vulnerable to attack-and so is yours. The scenarios described in IT Security:Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software-as well as the vulnerability caused by poor training, corporate politics, and careless management.

In the previous version of this book, originally published as Intranet Security:Stories From the Trenches, Linda McCarthy drew on her experience penetrating thousands of corporate networks to identify key security risks and practical solutions. This timely update is even more compelling and offers a clear plan for improvinhg the security of your systems. You'll find useful tools and preventive measures you can take right now. In addition, McCarthy's security checklists and resource listings can help you tighten security throughout your entire IT infrastructure.

  
• Table of Contents
IT Security: Risking the Corporation
By Linda McCarthy
 
Publisher: Prentice Hall PTR
Pub Date: February 24, 2003
ISBN: 0-13-101112-X
Pages: 272
   Copyright
   Foreword
   Acknowledgments
   About the Author
   Introduction
      About this Book
      How this Book Is Organized
      About Hackers
    Chapter 1.  Responding to Attacks
      Incident-Response Nightmare
      Let's Not Go There...
      Final Words
    Chapter 2.  Out-of-the-Box Security
      Deal with Security Later
      Let's Not Go There…
      Final Words
    Chapter 3.  Executive Support
      Executive Commitment
      Let's Not Go There…
      Final Words
    Chapter 4.  Network Access
      Partner Connections
      Let's Not Go There...
      Final Words
    Chapter 5.  Security Training
      Overlooking Training
      Let's Not Go There...
      Final Words
    Chapter 6.  Unplanned Security
      Transition Plan
      Let's Not Go There...
      Final Words
    Chapter 7.  Maintaining Security
      Responsible for Security
      Let's Not Go There...
      Final Words
    Chapter 8.  Internal Network Security
      Unsafe Network
      Let's Not Go There…
      Final Words
    Chapter 9.  Outsourcing Security
      Forget Security?
      Let's Not Go There…
      Final Words
    Chapter 10.  Unsecure Email
      Email or See Mail?
      Let's Not Go There...
      Final Words
    Chapter 11.  Looking Back: What's Next?
      Risking the Corporation
      Legal Duties to Protect Information and Networks
      Business Initiatives and Corporate Goals
      Threats Require Action
    Chapter 12.  A Hacker's Walk Through the Network
      A Hacker's Profile
      Walking with the Hacker
      What the Hacker Was Doing…
      Conclusion
   Appendix A.  People and Products to Know
      Security-Related Organizations
      Security Resources
      Security Vulnerability Archives
      Popular Mailing Lists
      Consulting Firms
      Security Crime Investigation
      Insuring Information Technology
      Software You Need to Know About
      Product Vendors
   Acronyms
   Glossary