Effective Cybersecurity

A Guide to Using Best Practices and Standards

E-book Engels 2018 9780134772967
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments

In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources.

Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature.

• Understand the cybersecurity discipline and the role of standards and best practices
• Define security governance, assess risks, and manage strategy and tactics
• Safeguard information and privacy, and ensure GDPR compliance
• Harden systems across the system development life cycle (SDLC)
• Protect servers, virtualized systems, and storage
• Secure networks and electronic communications, from email to VoIP
• Apply the most appropriate methods for user authentication
• Mitigate security risks in supply chains and cloud environments

This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.

Specificaties

ISBN13:9780134772967
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Preface&nbsp;&nbsp;&nbsp;&nbsp; xxvii <br> Chapter 1:&nbsp; Best Practices, Standards, and a Plan of Action&nbsp;&nbsp;&nbsp;&nbsp; 2 <br>1.1 Defining Cyberspace and Cybersecurity&nbsp;&nbsp;&nbsp;&nbsp; 3 <br>1.2 The Value of Standards and Best Practices Documents&nbsp;&nbsp;&nbsp;&nbsp; 6 <br>1.3 The Standard of Good Practice for Information Security&nbsp;&nbsp;&nbsp;&nbsp; 7 <br>1.4 The ISO/IEC 27000 Suite of Information Security Standards&nbsp;&nbsp;&nbsp;&nbsp; 12 <br>&nbsp;&nbsp;&nbsp; ISO 27001&nbsp;&nbsp;&nbsp;&nbsp; 15 <br>&nbsp;&nbsp;&nbsp; ISO 27002&nbsp;&nbsp;&nbsp;&nbsp; 17 <br>1.5 Mapping the ISO 27000 Series to the ISF SGP&nbsp;&nbsp;&nbsp;&nbsp; 18 <br>1.6 NIST Cybersecurity Framework and Security Documents&nbsp;&nbsp;&nbsp;&nbsp; 21 <br>&nbsp;&nbsp;&nbsp; NIST Cybersecurity Framework&nbsp;&nbsp;&nbsp;&nbsp; 22 <br>&nbsp;&nbsp;&nbsp; NIST Security Documents&nbsp;&nbsp;&nbsp;&nbsp; 25 <br>1.7 The CIS Critical Security Controls for Effective Cyber Defense&nbsp;&nbsp;&nbsp;&nbsp; 27 <br>1.8 COBIT 5 for Information Security&nbsp;&nbsp;&nbsp;&nbsp; 29 <br>1.9 Payment Card Industry Data Security Standard (PCI DSS)&nbsp;&nbsp;&nbsp;&nbsp; 30 <br>1.10 ITU-T Security Documents&nbsp;&nbsp;&nbsp;&nbsp; 32 <br>1.11 Effective Cybersecurity&nbsp;&nbsp;&nbsp;&nbsp; 34 <br>&nbsp;&nbsp;&nbsp; The Cybersecurity Management Process&nbsp;&nbsp;&nbsp;&nbsp; 34 <br>&nbsp;&nbsp;&nbsp; Using Best Practices and Standards Documents&nbsp;&nbsp;&nbsp;&nbsp; 36 <br>1.12 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 38 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 38 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 38 <br>1.13 References&nbsp;&nbsp;&nbsp;&nbsp; 39 <br> <br> PART I:&nbsp; PLANNING FOR CYBERSECURITY&nbsp;&nbsp;&nbsp;&nbsp; 41<br>Chapter 2:&nbsp; Security Governance&nbsp;&nbsp;&nbsp;&nbsp; 42 <br>2.1 Security Governance and Security Management&nbsp;&nbsp;&nbsp;&nbsp; 43 <br>2.2 Security Governance Principles and Desired Outcomes&nbsp;&nbsp;&nbsp;&nbsp; 45 <br>&nbsp;&nbsp;&nbsp; Principles&nbsp;&nbsp;&nbsp;&nbsp; 45 <br>&nbsp;&nbsp;&nbsp; Desired Outcomes&nbsp;&nbsp;&nbsp;&nbsp; 46 <br>2.3 Security Governance Components&nbsp;&nbsp;&nbsp;&nbsp; 47 <br>&nbsp;&nbsp;&nbsp; Strategic Planning&nbsp;&nbsp;&nbsp;&nbsp; 47 <br>&nbsp;&nbsp;&nbsp; Organizational Structure&nbsp;&nbsp;&nbsp;&nbsp; 51 <br>&nbsp;&nbsp;&nbsp; Roles and Responsibilities&nbsp;&nbsp;&nbsp;&nbsp; 55 <br>&nbsp;&nbsp;&nbsp; Integration with Enterprise Architecture&nbsp;&nbsp;&nbsp;&nbsp; 58 <br>&nbsp;&nbsp;&nbsp; Policies and Guidance&nbsp;&nbsp;&nbsp;&nbsp; 63 <br>2.4 Security Governance Approach&nbsp;&nbsp;&nbsp;&nbsp; 63 <br>&nbsp;&nbsp;&nbsp; Security Governance Framework&nbsp;&nbsp;&nbsp;&nbsp; 63 <br>&nbsp;&nbsp;&nbsp; Security Direction&nbsp;&nbsp;&nbsp;&nbsp; 64 <br>&nbsp;&nbsp;&nbsp; Responsible, Accountable, Consulted, and Informed (RACI) Charts&nbsp;&nbsp;&nbsp;&nbsp; 66 <br>2.5 Security Governance Evaluation&nbsp;&nbsp;&nbsp;&nbsp; 68 <br>2.6 Security Governance Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 69 <br>2.7 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 70 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 70 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 71 <br>2.8 References&nbsp;&nbsp;&nbsp;&nbsp; 71 <br> Chapter 3:&nbsp; Information Risk Assessment&nbsp;&nbsp;&nbsp;&nbsp; 74 <br>3.1 Risk Assessment Concepts&nbsp;&nbsp;&nbsp;&nbsp; 75 <br>&nbsp;&nbsp;&nbsp; Risk Assessment Challenges&nbsp;&nbsp;&nbsp;&nbsp; 78 <br>&nbsp;&nbsp;&nbsp; Risk Management&nbsp;&nbsp;&nbsp;&nbsp; 80 <br>&nbsp;&nbsp;&nbsp; Structure of This&nbsp;&nbsp;&nbsp;&nbsp; 84 <br>3.2 Asset Identification&nbsp;&nbsp;&nbsp;&nbsp; 85 <br>&nbsp;&nbsp;&nbsp; Hardware Assets&nbsp;&nbsp;&nbsp;&nbsp; 85 <br>&nbsp;&nbsp;&nbsp; Software Assets&nbsp;&nbsp;&nbsp;&nbsp; 85 <br>&nbsp;&nbsp;&nbsp; Information Assets&nbsp;&nbsp;&nbsp;&nbsp; 86 <br>&nbsp;&nbsp;&nbsp; Business Assets&nbsp;&nbsp;&nbsp;&nbsp; 87 <br>&nbsp;&nbsp;&nbsp; Asset Register&nbsp;&nbsp;&nbsp;&nbsp; 87 <br>3.3 Threat Identification&nbsp;&nbsp;&nbsp;&nbsp; 89 <br>&nbsp;&nbsp;&nbsp; The STRIDE Threat Model&nbsp;&nbsp;&nbsp;&nbsp; 89 <br>&nbsp;&nbsp;&nbsp; Threat Types&nbsp;&nbsp;&nbsp;&nbsp; 90 <br>&nbsp;&nbsp;&nbsp; Sources of Information&nbsp;&nbsp;&nbsp;&nbsp; 92 <br>3.4 Control Identification&nbsp;&nbsp;&nbsp;&nbsp; 98 <br>3.5 Vulnerability Identification&nbsp;&nbsp;&nbsp;&nbsp; 102 <br>&nbsp;&nbsp;&nbsp; Vulnerability Categories&nbsp;&nbsp;&nbsp;&nbsp; 103 <br>&nbsp;&nbsp;&nbsp; National Vulnerability Database and Common Vulnerability Scoring System&nbsp;&nbsp;&nbsp;&nbsp; 103 <br>3.6 Risk Assessment Approaches&nbsp;&nbsp;&nbsp;&nbsp; 107 <br>&nbsp;&nbsp;&nbsp; Quantitative Versus Qualitative Risk Assessment&nbsp;&nbsp;&nbsp;&nbsp; 107 <br>&nbsp;&nbsp;&nbsp; Simple Risk Analysis Worksheet&nbsp;&nbsp;&nbsp;&nbsp; 113 <br>&nbsp;&nbsp;&nbsp; Factor Analysis of Information Risk&nbsp;&nbsp;&nbsp;&nbsp; 114 <br>3.7 Likelihood Assessment&nbsp;&nbsp;&nbsp;&nbsp; 116 <br>&nbsp;&nbsp;&nbsp; Estimating Threat Event Frequency&nbsp;&nbsp;&nbsp;&nbsp; 118 <br>&nbsp;&nbsp;&nbsp; Estimating Vulnerability&nbsp;&nbsp;&nbsp;&nbsp; 119 <br>&nbsp;&nbsp;&nbsp; Loss Event Frequency&nbsp;&nbsp;&nbsp;&nbsp; 121 <br>3.8 Impact Assessment&nbsp;&nbsp;&nbsp;&nbsp; 122 <br>&nbsp;&nbsp;&nbsp; Estimating the Primary Loss&nbsp;&nbsp;&nbsp;&nbsp; 124 <br>&nbsp;&nbsp;&nbsp; Estimating the Secondary Loss&nbsp;&nbsp;&nbsp;&nbsp; 125 <br>&nbsp;&nbsp;&nbsp; Business Impact Reference Table&nbsp;&nbsp;&nbsp;&nbsp; 126 <br>3.9 Risk Determination&nbsp;&nbsp;&nbsp;&nbsp; 128 <br>3.10 Risk Evaluation&nbsp;&nbsp;&nbsp;&nbsp; 128 <br>3.11 Risk Treatment&nbsp;&nbsp;&nbsp;&nbsp; 129 <br>&nbsp;&nbsp;&nbsp; Risk Reduction&nbsp;&nbsp;&nbsp;&nbsp; 130 <br>&nbsp;&nbsp;&nbsp; Risk Retention&nbsp;&nbsp;&nbsp;&nbsp; 130 <br>&nbsp;&nbsp;&nbsp; Risk Avoidance&nbsp;&nbsp;&nbsp;&nbsp; 130 <br>&nbsp;&nbsp;&nbsp; Risk Transfer&nbsp;&nbsp;&nbsp;&nbsp; 131 <br>3.12 Risk Assessment Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 131 <br>3.13 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 132 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 132 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 133 <br>3.14 References&nbsp;&nbsp;&nbsp;&nbsp; 134 <br> Chapter 4:&nbsp; Security Management&nbsp;&nbsp;&nbsp;&nbsp; 136 <br>4.1 The Security Management Function&nbsp;&nbsp;&nbsp;&nbsp; 137 <br>&nbsp;&nbsp;&nbsp; Security Planning&nbsp;&nbsp;&nbsp;&nbsp; 140 <br>&nbsp;&nbsp;&nbsp; Capital Planning&nbsp;&nbsp;&nbsp;&nbsp; 142 <br>4.2 Security Policy&nbsp;&nbsp;&nbsp;&nbsp; 145 <br>&nbsp;&nbsp;&nbsp; Security Policy Categories&nbsp;&nbsp;&nbsp;&nbsp; 146 <br>&nbsp;&nbsp;&nbsp; Security Policy Document Content&nbsp;&nbsp;&nbsp;&nbsp; 147 <br>&nbsp;&nbsp;&nbsp; Management Guidelines for Security Policies&nbsp;&nbsp;&nbsp;&nbsp; 151 <br>&nbsp;&nbsp;&nbsp; Monitoring the Policy&nbsp;&nbsp;&nbsp;&nbsp; 151 <br>4.3 Acceptable Use Policy&nbsp;&nbsp;&nbsp;&nbsp; 152 <br>4.4 Security Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 154 <br>4.5 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 154 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 154 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 155 <br>4.6 References&nbsp;&nbsp;&nbsp;&nbsp; 155 <br> <br> PART II:&nbsp; MANAGING THE CYBERSECURITY FUNCTION&nbsp;&nbsp;&nbsp;&nbsp; 157<br>Chapter 5:&nbsp; People Management&nbsp;&nbsp;&nbsp;&nbsp; 160 <br>5.1 Human Resource Security&nbsp;&nbsp;&nbsp;&nbsp; 161 <br>&nbsp;&nbsp;&nbsp; Security in the Hiring Process&nbsp;&nbsp;&nbsp;&nbsp; 162 <br>&nbsp;&nbsp;&nbsp; During Employment&nbsp;&nbsp;&nbsp;&nbsp; 164 <br>&nbsp;&nbsp;&nbsp; Termination of Employment&nbsp;&nbsp;&nbsp;&nbsp; 165 <br>5.2 Security Awareness and Education&nbsp;&nbsp;&nbsp;&nbsp; 166 <br>&nbsp;&nbsp;&nbsp; Security Awareness&nbsp;&nbsp;&nbsp;&nbsp; 168 <br>&nbsp;&nbsp;&nbsp; Cybersecurity Essentials Program&nbsp;&nbsp;&nbsp;&nbsp; 173 <br>&nbsp;&nbsp;&nbsp; Role-Based Training&nbsp;&nbsp;&nbsp;&nbsp; 173 <br>&nbsp;&nbsp;&nbsp; Education and Certification&nbsp;&nbsp;&nbsp;&nbsp; 174 <br>5.3 People Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 175 <br>5.4 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 176 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 176 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 176 <br>5.5 References&nbsp;&nbsp;&nbsp;&nbsp; 177 <br> Chapter 6:&nbsp; Information Management&nbsp;&nbsp;&nbsp;&nbsp; 178 <br>6.1 Information Classification and Handling&nbsp;&nbsp;&nbsp;&nbsp; 179 <br>&nbsp;&nbsp;&nbsp; Information Classification&nbsp;&nbsp;&nbsp;&nbsp; 179 <br>&nbsp;&nbsp;&nbsp; Information Labeling&nbsp;&nbsp;&nbsp;&nbsp; 185 <br>&nbsp;&nbsp;&nbsp; Information Handling&nbsp;&nbsp;&nbsp;&nbsp; 186 <br>6.2 Privacy&nbsp;&nbsp;&nbsp;&nbsp; 186 <br>&nbsp;&nbsp;&nbsp; Privacy Threats&nbsp;&nbsp;&nbsp;&nbsp; 189 <br>&nbsp;&nbsp;&nbsp; Privacy Principles and Policies&nbsp;&nbsp;&nbsp;&nbsp; 191 <br>&nbsp;&nbsp;&nbsp; Privacy Controls&nbsp;&nbsp;&nbsp;&nbsp; 196 <br>6.3 Document and Records Management&nbsp;&nbsp;&nbsp;&nbsp; 198 <br>&nbsp;&nbsp;&nbsp; Document Management&nbsp;&nbsp;&nbsp;&nbsp; 200 <br>&nbsp;&nbsp;&nbsp; Records Management&nbsp;&nbsp;&nbsp;&nbsp; 202 <br>6.4 Sensitive Physical Information&nbsp;&nbsp;&nbsp;&nbsp; 204 <br>6.5 Information Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 205 <br>6.6 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 206 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 206 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 207 <br>6.7 References&nbsp;&nbsp;&nbsp;&nbsp; 208 <br> Chapter 7:&nbsp; Physical Asset Management&nbsp;&nbsp;&nbsp;&nbsp; 210 <br>7.1 Hardware Life Cycle Management&nbsp;&nbsp;&nbsp;&nbsp; 211 <br>&nbsp;&nbsp;&nbsp; Planning&nbsp;&nbsp;&nbsp;&nbsp; 213 <br>&nbsp;&nbsp;&nbsp; Acquisition&nbsp;&nbsp;&nbsp;&nbsp; 214 <br>&nbsp;&nbsp;&nbsp; Deployment&nbsp;&nbsp;&nbsp;&nbsp; 214 <br>&nbsp;&nbsp;&nbsp; Management&nbsp;&nbsp;&nbsp;&nbsp; 215 <br>&nbsp;&nbsp;&nbsp; Disposition&nbsp;&nbsp;&nbsp;&nbsp; 216 <br>7.2 Office Equipment&nbsp;&nbsp;&nbsp;&nbsp; 217 <br>&nbsp;&nbsp;&nbsp; Threats and Vulnerabilities&nbsp;&nbsp;&nbsp;&nbsp; 217 <br>&nbsp;&nbsp;&nbsp; Security Controls&nbsp;&nbsp;&nbsp;&nbsp; 219 <br>&nbsp;&nbsp;&nbsp; Equipment Disposal&nbsp;&nbsp;&nbsp;&nbsp; 222 <br>7.3 Industrial Control Systems&nbsp;&nbsp;&nbsp;&nbsp; 223 <br>&nbsp;&nbsp;&nbsp; Differences Between IT Systems and Industrial Control Systems&nbsp;&nbsp;&nbsp;&nbsp; 225 <br>&nbsp;&nbsp;&nbsp; ICS Security&nbsp;&nbsp;&nbsp;&nbsp; 227 <br>7.4 Mobile Device Security&nbsp;&nbsp;&nbsp;&nbsp; 231 <br>&nbsp;&nbsp;&nbsp; Mobile Device Technology&nbsp;&nbsp;&nbsp;&nbsp; 233 <br>&nbsp;&nbsp;&nbsp; Mobile Ecosystem&nbsp;&nbsp;&nbsp;&nbsp; 234 <br>&nbsp;&nbsp;&nbsp; Vulnerabilities&nbsp;&nbsp;&nbsp;&nbsp; 236 <br>&nbsp;&nbsp;&nbsp; Mobile Device Security Strategy&nbsp;&nbsp;&nbsp;&nbsp; 238 <br>&nbsp;&nbsp;&nbsp; Resources for Mobile Device Security&nbsp;&nbsp;&nbsp;&nbsp; 243 <br>7.5 Physical Asset Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 244 <br>7.6 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 245 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 245 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 245 <br>7.7 References&nbsp;&nbsp;&nbsp;&nbsp; 246 <br> Chapter 8:&nbsp; System Development&nbsp;&nbsp;&nbsp;&nbsp; 248 <br>8.1 System Development Life Cycle&nbsp;&nbsp;&nbsp;&nbsp; 248 <br>&nbsp;&nbsp;&nbsp; NIST SDLC Model&nbsp;&nbsp;&nbsp;&nbsp; 249 <br>&nbsp;&nbsp;&nbsp; The SGP’s SDLC Model&nbsp;&nbsp;&nbsp;&nbsp; 252 <br>&nbsp;&nbsp;&nbsp; DevOps&nbsp;&nbsp;&nbsp;&nbsp; 254 <br>8.2 Incorporating Security into the SDLC&nbsp;&nbsp;&nbsp;&nbsp; 259 <br>&nbsp;&nbsp;&nbsp; Initiation Phase&nbsp;&nbsp;&nbsp;&nbsp; 260 <br>&nbsp;&nbsp;&nbsp; Development/Acquisition Phase&nbsp;&nbsp;&nbsp;&nbsp; 264 <br>&nbsp;&nbsp;&nbsp; Implementation/Assessment Phase&nbsp;&nbsp;&nbsp;&nbsp; 266 <br>&nbsp;&nbsp;&nbsp; Operations and Maintenance Phase&nbsp;&nbsp;&nbsp;&nbsp; 270 <br>&nbsp;&nbsp;&nbsp; Disposal Phase&nbsp;&nbsp;&nbsp;&nbsp; 272 <br>8.3 System Development Management&nbsp;&nbsp;&nbsp;&nbsp; 273 <br>&nbsp;&nbsp;&nbsp; System Development Methodology&nbsp;&nbsp;&nbsp;&nbsp; 274 <br>&nbsp;&nbsp;&nbsp; System Development Environments&nbsp;&nbsp;&nbsp;&nbsp; 275 <br>&nbsp;&nbsp;&nbsp; Quality Assurance&nbsp;&nbsp;&nbsp;&nbsp; 277 <br>8.4 System Development Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 278 <br>8.5 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 278 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 278 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 279 <br>8.6 References&nbsp;&nbsp;&nbsp;&nbsp; 279 <br> Chapter 9:&nbsp; Business Application Management&nbsp;&nbsp;&nbsp;&nbsp; 280 <br>9.1 Application Management Concepts&nbsp;&nbsp;&nbsp;&nbsp; 281 <br>&nbsp;&nbsp;&nbsp; Application Life Cycle Management&nbsp;&nbsp;&nbsp;&nbsp; 281 <br>&nbsp;&nbsp;&nbsp; Application Portfolio Management&nbsp;&nbsp;&nbsp;&nbsp; 283 <br>&nbsp;&nbsp;&nbsp; Application Performance Management&nbsp;&nbsp;&nbsp;&nbsp; 285 <br>9.2 Corporate Business Application Security&nbsp;&nbsp;&nbsp;&nbsp; 287 <br>&nbsp;&nbsp;&nbsp; Business Application Register&nbsp;&nbsp;&nbsp;&nbsp; 287 <br>&nbsp;&nbsp;&nbsp; Business Application Protection&nbsp;&nbsp;&nbsp;&nbsp; 288 <br>&nbsp;&nbsp;&nbsp; Browser-Based Application Protection&nbsp;&nbsp;&nbsp;&nbsp; 289 <br>9.3 End User-Developed Applications (EUDAs)&nbsp;&nbsp;&nbsp;&nbsp; 295 <br>&nbsp;&nbsp;&nbsp; Benefits of EUDAs&nbsp;&nbsp;&nbsp;&nbsp; 296 <br>&nbsp;&nbsp;&nbsp; Risks of EUDAs&nbsp;&nbsp;&nbsp;&nbsp; 296 <br>&nbsp;&nbsp;&nbsp; EUDA Security Framework&nbsp;&nbsp;&nbsp;&nbsp; 297 <br>9.4 Business Application Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 300 <br>9.5 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 301 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 301 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 302 <br>9.6 References&nbsp;&nbsp;&nbsp;&nbsp; 302 <br> Chapter 10:&nbsp; System Access&nbsp;&nbsp;&nbsp;&nbsp; 304 <br>10.1 System Access Concepts&nbsp;&nbsp;&nbsp;&nbsp; 304 <br>&nbsp;&nbsp;&nbsp; Authorization&nbsp;&nbsp;&nbsp;&nbsp; 306 <br>10.2 User Authentication&nbsp;&nbsp;&nbsp;&nbsp; 307 <br>&nbsp;&nbsp;&nbsp; A Model for Electronic User Authentication&nbsp;&nbsp;&nbsp;&nbsp; 307 <br>&nbsp;&nbsp;&nbsp; Means of Authentication&nbsp;&nbsp;&nbsp;&nbsp; 310 <br>&nbsp;&nbsp;&nbsp; Multifactor Authentication&nbsp;&nbsp;&nbsp;&nbsp; 311 <br>10.3 Password-Based Authentication&nbsp;&nbsp;&nbsp;&nbsp; 312 <br>&nbsp;&nbsp;&nbsp; The Vulnerability of Passwords&nbsp;&nbsp;&nbsp;&nbsp; 313 <br>&nbsp;&nbsp;&nbsp; The Use of Hashed Passwords&nbsp;&nbsp;&nbsp;&nbsp; 315 <br>&nbsp;&nbsp;&nbsp; Password Cracking of User-Chosen Passwords&nbsp;&nbsp;&nbsp;&nbsp; 317 <br>&nbsp;&nbsp;&nbsp; Password File Access Control&nbsp;&nbsp;&nbsp;&nbsp; 319 <br>&nbsp;&nbsp;&nbsp; Password Selection&nbsp;&nbsp;&nbsp;&nbsp; 320 <br>10.4 Possession-Based Authentication&nbsp;&nbsp;&nbsp;&nbsp; 322 <br>&nbsp;&nbsp;&nbsp; Memory Cards&nbsp;&nbsp;&nbsp;&nbsp; 322 <br>&nbsp;&nbsp;&nbsp; Smart Cards&nbsp;&nbsp;&nbsp;&nbsp; 323 <br>&nbsp;&nbsp;&nbsp; Electronic Identity Cards&nbsp;&nbsp;&nbsp;&nbsp; 325 <br>&nbsp;&nbsp;&nbsp; One-Time Password Device&nbsp;&nbsp;&nbsp;&nbsp; 328 <br>&nbsp;&nbsp;&nbsp; Threats to Possession-Based Authentication&nbsp;&nbsp;&nbsp;&nbsp; 329 <br>&nbsp;&nbsp;&nbsp; Security Controls for Possession-Based Authentication&nbsp;&nbsp;&nbsp;&nbsp; 330 <br>10.5 Biometric Authentication&nbsp;&nbsp;&nbsp;&nbsp; 330 <br>&nbsp;&nbsp;&nbsp; Criteria for Biometric Characteristics&nbsp;&nbsp;&nbsp;&nbsp; 331 <br>&nbsp;&nbsp;&nbsp; Physical Characteristics Used in Biometric Applications&nbsp;&nbsp;&nbsp;&nbsp; 332 <br>&nbsp;&nbsp;&nbsp; Operation of a Biometric Authentication System&nbsp;&nbsp;&nbsp;&nbsp; 333 <br>&nbsp;&nbsp;&nbsp; Biometric Accuracy&nbsp;&nbsp;&nbsp;&nbsp; 335 <br>&nbsp;&nbsp;&nbsp; Threats to Biometric Authentication&nbsp;&nbsp;&nbsp;&nbsp; 337 <br>&nbsp;&nbsp;&nbsp; Security Controls for Biometric Authentication&nbsp;&nbsp;&nbsp;&nbsp; 339 <br>10.6 Risk Assessment for User Authentication&nbsp;&nbsp;&nbsp;&nbsp; 341 <br>&nbsp;&nbsp;&nbsp; Authenticator Assurance Levels&nbsp;&nbsp;&nbsp;&nbsp; 341 <br>&nbsp;&nbsp;&nbsp; Selecting an AAL&nbsp;&nbsp;&nbsp;&nbsp; 342 <br>&nbsp;&nbsp;&nbsp; Choosing an Authentication Method&nbsp;&nbsp;&nbsp;&nbsp; 345 <br>10.7 Access Control&nbsp;&nbsp;&nbsp;&nbsp; 347 <br>&nbsp;&nbsp;&nbsp; Subjects, Objects, and Access Rights&nbsp;&nbsp;&nbsp;&nbsp; 348 <br>&nbsp;&nbsp;&nbsp; Access Control Policies&nbsp;&nbsp;&nbsp;&nbsp; 349 <br>&nbsp;&nbsp;&nbsp; Discretionary Access Control&nbsp;&nbsp;&nbsp;&nbsp; 350 <br>&nbsp;&nbsp;&nbsp; Role-Based Access Control&nbsp;&nbsp;&nbsp;&nbsp; 351 <br>&nbsp;&nbsp;&nbsp; Attribute-Based Access Control&nbsp;&nbsp;&nbsp;&nbsp; 353 <br>&nbsp;&nbsp;&nbsp; Access Control Metrics&nbsp;&nbsp;&nbsp;&nbsp; 358 <br>10.8 Customer Access&nbsp;&nbsp;&nbsp;&nbsp; 360 <br>&nbsp;&nbsp;&nbsp; Customer Access Arrangements&nbsp;&nbsp;&nbsp;&nbsp; 360 <br>&nbsp;&nbsp;&nbsp; Customer Contracts&nbsp;&nbsp;&nbsp;&nbsp; 361 <br>&nbsp;&nbsp;&nbsp; Customer Connections&nbsp;&nbsp;&nbsp;&nbsp; 361 <br>&nbsp;&nbsp;&nbsp; Protecting Customer Data&nbsp;&nbsp;&nbsp;&nbsp; 361 <br>10.9 System Access Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 362 <br>10.10 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 363 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 363 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 363 <br>10.11 References&nbsp;&nbsp;&nbsp;&nbsp; 364 <br> Chapter 11:&nbsp; System Management&nbsp;&nbsp;&nbsp;&nbsp; 366 <br>11.1 Server Configuration&nbsp;&nbsp;&nbsp;&nbsp; 368 <br>&nbsp;&nbsp;&nbsp; Threats to Servers&nbsp;&nbsp;&nbsp;&nbsp; 368 <br>&nbsp;&nbsp;&nbsp; Requirements for Server Security&nbsp;&nbsp;&nbsp;&nbsp; 368 <br>11.2 Virtual Servers&nbsp;&nbsp;&nbsp;&nbsp; 370 <br>&nbsp;&nbsp;&nbsp; Virtualization Alternatives&nbsp;&nbsp;&nbsp;&nbsp; 371 <br>&nbsp;&nbsp;&nbsp; Virtualization Security Issues&nbsp;&nbsp;&nbsp;&nbsp; 374 <br>&nbsp;&nbsp;&nbsp; Securing Virtualization Systems&nbsp;&nbsp;&nbsp;&nbsp; 376 <br>11.3 Network Storage Systems&nbsp;&nbsp;&nbsp;&nbsp; 377 <br>11.4 Service Level Agreements&nbsp;&nbsp;&nbsp;&nbsp; 379 <br>&nbsp;&nbsp;&nbsp; Network Providers&nbsp;&nbsp;&nbsp;&nbsp; 379 <br>&nbsp;&nbsp;&nbsp; Computer Security Incident Response Team&nbsp;&nbsp;&nbsp;&nbsp; 381 <br>&nbsp;&nbsp;&nbsp; Cloud Service Providers&nbsp;&nbsp;&nbsp;&nbsp; 382 <br>11.5 Performance and Capacity Management&nbsp;&nbsp;&nbsp;&nbsp; 383 <br>11.6 Backup&nbsp;&nbsp;&nbsp;&nbsp; 384 <br>11.7 Change Management&nbsp;&nbsp;&nbsp;&nbsp; 386 <br>11.8 System Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 389 <br>11.9 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 390 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 390 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 390 <br>11.10 References&nbsp;&nbsp;&nbsp;&nbsp; 391 <br> Chapter 12:&nbsp; Networks and Communications&nbsp;&nbsp;&nbsp;&nbsp; 392 <br>12.1 Network Management Concepts&nbsp;&nbsp;&nbsp;&nbsp; 393 <br>&nbsp;&nbsp;&nbsp; Network Management Functions&nbsp;&nbsp;&nbsp;&nbsp; 393 <br>&nbsp;&nbsp;&nbsp; Network Management Systems&nbsp;&nbsp;&nbsp;&nbsp; 399 <br>&nbsp;&nbsp;&nbsp; Network Management Architecture&nbsp;&nbsp;&nbsp;&nbsp; 402 <br>12.2 Firewalls&nbsp;&nbsp;&nbsp;&nbsp; 404 <br>&nbsp;&nbsp;&nbsp; Firewall Characteristics&nbsp;&nbsp;&nbsp;&nbsp; 404 <br>&nbsp;&nbsp;&nbsp; Types of Firewalls&nbsp;&nbsp;&nbsp;&nbsp; 406 <br>&nbsp;&nbsp;&nbsp; Next-Generation Firewalls&nbsp;&nbsp;&nbsp;&nbsp; 414 <br>&nbsp;&nbsp;&nbsp; DMZ Networks&nbsp;&nbsp;&nbsp;&nbsp; 414 <br>&nbsp;&nbsp;&nbsp; The Modern IT Perimeter&nbsp;&nbsp;&nbsp;&nbsp; 416 <br>12.3 Virtual Private Networks and IP Security&nbsp;&nbsp;&nbsp;&nbsp; 417 <br>&nbsp;&nbsp;&nbsp; Virtual Private Networks&nbsp;&nbsp;&nbsp;&nbsp; 417 <br>&nbsp;&nbsp;&nbsp; IPsec&nbsp;&nbsp;&nbsp;&nbsp; 418 <br>&nbsp;&nbsp;&nbsp; Firewall-Based VPNs&nbsp;&nbsp;&nbsp;&nbsp; 420 <br>12.4 Security Considerations for Network Management&nbsp;&nbsp;&nbsp;&nbsp; 421 <br>&nbsp;&nbsp;&nbsp; Network Device Configuration&nbsp;&nbsp;&nbsp;&nbsp; 421 <br>&nbsp;&nbsp;&nbsp; Physical Network Management&nbsp;&nbsp;&nbsp;&nbsp; 423 <br>&nbsp;&nbsp;&nbsp; Wireless Access&nbsp;&nbsp;&nbsp;&nbsp; 426 <br>&nbsp;&nbsp;&nbsp; External Network Connections&nbsp;&nbsp;&nbsp;&nbsp; 427 <br>&nbsp;&nbsp;&nbsp; Firewalls&nbsp;&nbsp;&nbsp;&nbsp; 428 <br>&nbsp;&nbsp;&nbsp; Remote Maintenance&nbsp;&nbsp;&nbsp;&nbsp; 429 <br>12.5 Electronic Communications&nbsp;&nbsp;&nbsp;&nbsp; 430 <br>&nbsp;&nbsp;&nbsp; Email&nbsp;&nbsp;&nbsp;&nbsp; 430 <br>&nbsp;&nbsp;&nbsp; Instant Messaging&nbsp;&nbsp;&nbsp;&nbsp; 436 <br>&nbsp;&nbsp;&nbsp; Voice over IP (VoIP) Networks&nbsp;&nbsp;&nbsp;&nbsp; 438 <br>&nbsp;&nbsp;&nbsp; Telephony and Conferencing&nbsp;&nbsp;&nbsp;&nbsp; 444 <br>12.6 Networks and Communications Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 444 <br>12.7 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 445 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 445 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 445 <br>12.8 References&nbsp;&nbsp;&nbsp;&nbsp; 446 <br> Chapter 13:&nbsp; Supply Chain Management and Cloud Security&nbsp;&nbsp;&nbsp;&nbsp; 448 <br>13.1 Supply Chain Management Concepts&nbsp;&nbsp;&nbsp;&nbsp; 449 <br>&nbsp;&nbsp;&nbsp; The Supply Chain&nbsp;&nbsp;&nbsp;&nbsp; 449 <br>&nbsp;&nbsp;&nbsp; Supply Chain Management&nbsp;&nbsp;&nbsp;&nbsp; 451 <br>13.2 Supply Chain Risk Management&nbsp;&nbsp;&nbsp;&nbsp; 453 <br>&nbsp;&nbsp;&nbsp; Supply Chain Threats&nbsp;&nbsp;&nbsp;&nbsp; 456 <br>&nbsp;&nbsp;&nbsp; Supply Chain Vulnerabilities&nbsp;&nbsp;&nbsp;&nbsp; 459 <br>&nbsp;&nbsp;&nbsp; Supply Chain Security Controls&nbsp;&nbsp;&nbsp;&nbsp; 460 <br>&nbsp;&nbsp;&nbsp; SCRM Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 463 <br>13.3 Cloud Computing&nbsp;&nbsp;&nbsp;&nbsp; 466 <br>&nbsp;&nbsp;&nbsp; Cloud Computing Elements&nbsp;&nbsp;&nbsp;&nbsp; 466 <br>&nbsp;&nbsp;&nbsp; Cloud Computing Reference Architecture&nbsp;&nbsp;&nbsp;&nbsp; 470 <br>13.4 Cloud Security&nbsp;&nbsp;&nbsp;&nbsp; 473 <br>&nbsp;&nbsp;&nbsp; Security Considerations for Cloud Computing&nbsp;&nbsp;&nbsp;&nbsp; 473 <br>&nbsp;&nbsp;&nbsp; Threats for Cloud Service Users&nbsp;&nbsp;&nbsp;&nbsp; 474 <br>&nbsp;&nbsp;&nbsp; Risk Evaluation&nbsp;&nbsp;&nbsp;&nbsp; 475 <br>&nbsp;&nbsp;&nbsp; Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 476 <br>&nbsp;&nbsp;&nbsp; Cloud Service Agreement&nbsp;&nbsp;&nbsp;&nbsp; 477 <br>13.5 Supply Chain Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 478 <br>13.6 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 479 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 479 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 479 <br>13.7 References&nbsp;&nbsp;&nbsp;&nbsp; 480 <br> Chapter 14:&nbsp; Technical Security Management&nbsp;&nbsp;&nbsp;&nbsp; 482 <br>14.1 Security Architecture&nbsp;&nbsp;&nbsp;&nbsp; 483 <br>14.2 Malware Protection Activities&nbsp;&nbsp;&nbsp;&nbsp; 487 <br>&nbsp;&nbsp;&nbsp; Types of Malware&nbsp;&nbsp;&nbsp;&nbsp; 487 <br>&nbsp;&nbsp;&nbsp; The Nature of the Malware Threat&nbsp;&nbsp;&nbsp;&nbsp; 490 <br>&nbsp;&nbsp;&nbsp; Practical Malware Protection&nbsp;&nbsp;&nbsp;&nbsp; 490 <br>14.3 Malware Protection Software&nbsp;&nbsp;&nbsp;&nbsp; 494 <br>&nbsp;&nbsp;&nbsp; Capabilities of Malware Protection Software&nbsp;&nbsp;&nbsp;&nbsp; 494 <br>&nbsp;&nbsp;&nbsp; Managing Malware Protection Software&nbsp;&nbsp;&nbsp;&nbsp; 495 <br>14.4 Identity and Access Management&nbsp;&nbsp;&nbsp;&nbsp; 496 <br>&nbsp;&nbsp;&nbsp; IAM Architecture&nbsp;&nbsp;&nbsp;&nbsp; 497 <br>&nbsp;&nbsp;&nbsp; Federated Identity Management&nbsp;&nbsp;&nbsp;&nbsp; 498 <br>&nbsp;&nbsp;&nbsp; IAM Planning&nbsp;&nbsp;&nbsp;&nbsp; 500 <br>&nbsp;&nbsp;&nbsp; IAM Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 501 <br>14.5 Intrusion Detection&nbsp;&nbsp;&nbsp;&nbsp; 502 <br>&nbsp;&nbsp;&nbsp; Basic Principles&nbsp;&nbsp;&nbsp;&nbsp; 503 <br>&nbsp;&nbsp;&nbsp; Approaches to Intrusion Detection&nbsp;&nbsp;&nbsp;&nbsp; 504 <br>&nbsp;&nbsp;&nbsp; Host-Based Intrusion Detection Techniques&nbsp;&nbsp;&nbsp;&nbsp; 505 <br>&nbsp;&nbsp;&nbsp; Network-Based Intrusion Detection Systems&nbsp;&nbsp;&nbsp;&nbsp; 506 <br>&nbsp;&nbsp;&nbsp; IDS Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 508 <br>14.6 Data Loss Prevention&nbsp;&nbsp;&nbsp;&nbsp; 509 <br>&nbsp;&nbsp;&nbsp; Data Classification and Identification&nbsp;&nbsp;&nbsp;&nbsp; 509 <br>&nbsp;&nbsp;&nbsp; Data States&nbsp;&nbsp;&nbsp;&nbsp; 510 <br>14.7 Digital Rights Management&nbsp;&nbsp;&nbsp;&nbsp; 512 <br>&nbsp;&nbsp;&nbsp; DRM Structure and Components&nbsp;&nbsp;&nbsp;&nbsp; 513 <br>&nbsp;&nbsp;&nbsp; DRM Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 515 <br>14.8 Cryptographic Solutions&nbsp;&nbsp;&nbsp;&nbsp; 517 <br>&nbsp;&nbsp;&nbsp; Uses of Cryptography&nbsp;&nbsp;&nbsp;&nbsp; 517 <br>&nbsp;&nbsp;&nbsp; Cryptographic Algorithms&nbsp;&nbsp;&nbsp;&nbsp; 518 <br>&nbsp;&nbsp;&nbsp; Selection of Cryptographic Algorithms and Lengths&nbsp;&nbsp;&nbsp;&nbsp; 525 <br>&nbsp;&nbsp;&nbsp; Cryptography Implementation Considerations&nbsp;&nbsp;&nbsp;&nbsp; 526 <br>14.9 Cryptographic Key Management&nbsp;&nbsp;&nbsp;&nbsp; 528 <br>&nbsp;&nbsp;&nbsp; Key Types&nbsp;&nbsp;&nbsp;&nbsp; 530 <br>&nbsp;&nbsp;&nbsp; Cryptoperiod&nbsp;&nbsp;&nbsp;&nbsp; 532 <br>&nbsp;&nbsp;&nbsp; Key Life Cycle&nbsp;&nbsp;&nbsp;&nbsp; 534 <br>14.10 Public Key Infrastructure&nbsp;&nbsp;&nbsp;&nbsp; 536 <br>&nbsp;&nbsp;&nbsp; Public Key Certificates&nbsp;&nbsp;&nbsp;&nbsp; 536 <br>&nbsp;&nbsp;&nbsp; PKI Architecture&nbsp;&nbsp;&nbsp;&nbsp; 538 <br>&nbsp;&nbsp;&nbsp; Management Issues&nbsp;&nbsp;&nbsp;&nbsp; 540 <br>14.11 Technical Security Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 541 <br>14.12 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 543 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 543 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 543 <br>14.13 References&nbsp;&nbsp;&nbsp;&nbsp; 544 <br> Chapter 15:&nbsp; Threat and Incident Management&nbsp;&nbsp;&nbsp;&nbsp; 546 <br>15.1 Technical Vulnerability Management&nbsp;&nbsp;&nbsp;&nbsp; 547 <br>&nbsp;&nbsp;&nbsp; Plan Vulnerability Management&nbsp;&nbsp;&nbsp;&nbsp; 547 <br>&nbsp;&nbsp;&nbsp; Discover Known Vulnerabilities&nbsp;&nbsp;&nbsp;&nbsp; 548 <br>&nbsp;&nbsp;&nbsp; Scan for Vulnerabilities&nbsp;&nbsp;&nbsp;&nbsp; 549 <br>&nbsp;&nbsp;&nbsp; Log and Report&nbsp;&nbsp;&nbsp;&nbsp; 551 <br>&nbsp;&nbsp;&nbsp; Remediate Vulnerabilities&nbsp;&nbsp;&nbsp;&nbsp; 551 <br>15.2 Security Event Logging&nbsp;&nbsp;&nbsp;&nbsp; 554 <br>&nbsp;&nbsp;&nbsp; Security Event Logging Objective&nbsp;&nbsp;&nbsp;&nbsp; 556 <br>&nbsp;&nbsp;&nbsp; Potential Security Log Sources&nbsp;&nbsp;&nbsp;&nbsp; 556 <br>&nbsp;&nbsp;&nbsp; What to Log&nbsp;&nbsp;&nbsp;&nbsp; 557 <br>&nbsp;&nbsp;&nbsp; Protection of Log Data&nbsp;&nbsp;&nbsp;&nbsp; 557 <br>&nbsp;&nbsp;&nbsp; Log Management Policy&nbsp;&nbsp;&nbsp;&nbsp; 558 <br>15.3 Security Event Management&nbsp;&nbsp;&nbsp;&nbsp; 559 <br>&nbsp;&nbsp;&nbsp; SEM Functions&nbsp;&nbsp;&nbsp;&nbsp; 560 <br>&nbsp;&nbsp;&nbsp; SEM Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 561 <br>15.4 Threat Intelligence&nbsp;&nbsp;&nbsp;&nbsp; 563 <br>&nbsp;&nbsp;&nbsp; Threat Taxonomy&nbsp;&nbsp;&nbsp;&nbsp; 564 <br>&nbsp;&nbsp;&nbsp; The Importance of Threat Intelligence&nbsp;&nbsp;&nbsp;&nbsp; 566 <br>&nbsp;&nbsp;&nbsp; Gathering Threat Intelligence&nbsp;&nbsp;&nbsp;&nbsp; 568 <br>&nbsp;&nbsp;&nbsp; Threat Analysis&nbsp;&nbsp;&nbsp;&nbsp; 569 <br>15.5 Cyber Attack Protection&nbsp;&nbsp;&nbsp;&nbsp; 570 <br>&nbsp;&nbsp;&nbsp; Cyber Attack Kill Chain&nbsp;&nbsp;&nbsp;&nbsp; 570 <br>&nbsp;&nbsp;&nbsp; Protection and Response Measures&nbsp;&nbsp;&nbsp;&nbsp; 573 <br>&nbsp;&nbsp;&nbsp; Non-Malware Attacks&nbsp;&nbsp;&nbsp;&nbsp; 576 <br>15.6 Security Incident Management Framework&nbsp;&nbsp;&nbsp;&nbsp; 577 <br>&nbsp;&nbsp;&nbsp; Objectives of Incident Management&nbsp;&nbsp;&nbsp;&nbsp; 579 <br>&nbsp;&nbsp;&nbsp; Relationship to Information Security Management System&nbsp;&nbsp;&nbsp;&nbsp; 579 <br>&nbsp;&nbsp;&nbsp; Incident Management Policy&nbsp;&nbsp;&nbsp;&nbsp; 580 <br>&nbsp;&nbsp;&nbsp; Roles and Responsibilities&nbsp;&nbsp;&nbsp;&nbsp; 581 <br>&nbsp;&nbsp;&nbsp; Incident Management Information&nbsp;&nbsp;&nbsp;&nbsp; 583 <br>&nbsp;&nbsp;&nbsp; Incident Management Tools&nbsp;&nbsp;&nbsp;&nbsp; 583 <br>15.7 Security Incident Management Process&nbsp;&nbsp;&nbsp;&nbsp; 584 <br>&nbsp;&nbsp;&nbsp; Preparing for Incident Response&nbsp;&nbsp;&nbsp;&nbsp; 585 <br>&nbsp;&nbsp;&nbsp; Detection and Analysis&nbsp;&nbsp;&nbsp;&nbsp; 586 <br>&nbsp;&nbsp;&nbsp; Containment, Eradication, and Recovery&nbsp;&nbsp;&nbsp;&nbsp; 587 <br>&nbsp;&nbsp;&nbsp; Post-Incident Activity&nbsp;&nbsp;&nbsp;&nbsp; 588 <br>15.8 Emergency Fixes&nbsp;&nbsp;&nbsp;&nbsp; 590 <br>15.9 Forensic Investigations&nbsp;&nbsp;&nbsp;&nbsp; 592 <br>&nbsp;&nbsp;&nbsp; Prepare&nbsp;&nbsp;&nbsp;&nbsp; 593 <br>&nbsp;&nbsp;&nbsp; Identify&nbsp;&nbsp;&nbsp;&nbsp; 594 <br>&nbsp;&nbsp;&nbsp; Collect&nbsp;&nbsp;&nbsp;&nbsp; 594 <br>&nbsp;&nbsp;&nbsp; Preserve&nbsp;&nbsp;&nbsp;&nbsp; 595 <br>&nbsp;&nbsp;&nbsp; Analyze&nbsp;&nbsp;&nbsp;&nbsp; 595 <br>&nbsp;&nbsp;&nbsp; Report&nbsp;&nbsp;&nbsp;&nbsp; 596 <br>15.10 Threat and Incident Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 597 <br>15.11 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 598 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 598 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 599 <br>15.12 References&nbsp;&nbsp;&nbsp;&nbsp; 599 <br> Chapter 16:&nbsp; Local Environment Management&nbsp;&nbsp;&nbsp;&nbsp; 602 <br>16.1 Local Environment Security&nbsp;&nbsp;&nbsp;&nbsp; 602 <br>&nbsp;&nbsp;&nbsp; Local Environment Profile&nbsp;&nbsp;&nbsp;&nbsp; 603 <br>&nbsp;&nbsp;&nbsp; Local Security Coordination&nbsp;&nbsp;&nbsp;&nbsp; 604 <br>16.2 Physical Security&nbsp;&nbsp;&nbsp;&nbsp; 606 <br>&nbsp;&nbsp;&nbsp; Physical Security Threats&nbsp;&nbsp;&nbsp;&nbsp; 606 <br>&nbsp;&nbsp;&nbsp; Physical Security Officer&nbsp;&nbsp;&nbsp;&nbsp; 609 <br>&nbsp;&nbsp;&nbsp; Defense in Depth&nbsp;&nbsp;&nbsp;&nbsp; 610 <br>&nbsp;&nbsp;&nbsp; Physical Security: Prevention and Mitigation Measures&nbsp;&nbsp;&nbsp;&nbsp; 612 <br>&nbsp;&nbsp;&nbsp; Physical Security Controls&nbsp;&nbsp;&nbsp;&nbsp; 615 <br>16.3 Local Environment Management Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 619 <br>16.4 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 620 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 620 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 620 <br>16.5 References&nbsp;&nbsp;&nbsp;&nbsp; 621 <br> Chapter 17:&nbsp; Business Continuity&nbsp;&nbsp;&nbsp;&nbsp; 622 <br>17.1 Business Continuity Concepts&nbsp;&nbsp;&nbsp;&nbsp; 625 <br>&nbsp;&nbsp;&nbsp; Threats&nbsp;&nbsp;&nbsp;&nbsp; 626 <br>&nbsp;&nbsp;&nbsp; Business Continuity in Operation&nbsp;&nbsp;&nbsp;&nbsp; 628 <br>&nbsp;&nbsp;&nbsp; Business Continuity Objectives&nbsp;&nbsp;&nbsp;&nbsp; 629 <br>&nbsp;&nbsp;&nbsp; Essential Components for Maintaining Business Continuity&nbsp;&nbsp;&nbsp;&nbsp; 630 <br>17.2 Business Continuity Program&nbsp;&nbsp;&nbsp;&nbsp; 630 <br>&nbsp;&nbsp;&nbsp; Governance&nbsp;&nbsp;&nbsp;&nbsp; 631 <br>&nbsp;&nbsp;&nbsp; Business Impact Analysis&nbsp;&nbsp;&nbsp;&nbsp; 631 <br>&nbsp;&nbsp;&nbsp; Risk Assessment&nbsp;&nbsp;&nbsp;&nbsp; 632 <br>&nbsp;&nbsp;&nbsp; Business Continuity Strategy&nbsp;&nbsp;&nbsp;&nbsp; 634 <br>17.3 Business Continuity Readiness&nbsp;&nbsp;&nbsp;&nbsp; 637 <br>&nbsp;&nbsp;&nbsp; Awareness&nbsp;&nbsp;&nbsp;&nbsp; 637 <br>&nbsp;&nbsp;&nbsp; Training&nbsp;&nbsp;&nbsp;&nbsp; 638 <br>&nbsp;&nbsp;&nbsp; Resilience&nbsp;&nbsp;&nbsp;&nbsp; 639 <br>&nbsp;&nbsp;&nbsp; Control Selection&nbsp;&nbsp;&nbsp;&nbsp; 640 <br>&nbsp;&nbsp;&nbsp; Business Continuity Plan&nbsp;&nbsp;&nbsp;&nbsp; 642 <br>&nbsp;&nbsp;&nbsp; Exercising and Testing&nbsp;&nbsp;&nbsp;&nbsp; 647 <br>&nbsp;&nbsp;&nbsp; Performance Evaluation&nbsp;&nbsp;&nbsp;&nbsp; 650 <br>17.4 Business Continuity Operations&nbsp;&nbsp;&nbsp;&nbsp; 655 <br>&nbsp;&nbsp;&nbsp; Emergency Response&nbsp;&nbsp;&nbsp;&nbsp; 655 <br>&nbsp;&nbsp;&nbsp; Crisis Management&nbsp;&nbsp;&nbsp;&nbsp; 656 <br>&nbsp;&nbsp;&nbsp; Business Recovery/Restoration&nbsp;&nbsp;&nbsp;&nbsp; 657 <br>17.5 Business Continuity Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 660 <br>17.6 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 661 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 661 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 661 <br>17.7 References&nbsp;&nbsp;&nbsp;&nbsp; 662 <br> <br> PART III:&nbsp; SECURITY ASSESSMENT&nbsp;&nbsp;&nbsp;&nbsp; 665<br>Chapter 18:&nbsp; Security Monitoring and Improvement&nbsp;&nbsp;&nbsp;&nbsp; 666 <br>18.1 Security Audit&nbsp;&nbsp;&nbsp;&nbsp; 666 <br>&nbsp;&nbsp;&nbsp; Security Audit and Alarms Model&nbsp;&nbsp;&nbsp;&nbsp; 667 <br>&nbsp;&nbsp;&nbsp; Data to Collect for Auditing&nbsp;&nbsp;&nbsp;&nbsp; 668 <br>&nbsp;&nbsp;&nbsp; Internal and External Audit&nbsp;&nbsp;&nbsp;&nbsp; 672 <br>&nbsp;&nbsp;&nbsp; Security Audit Controls&nbsp;&nbsp;&nbsp;&nbsp; 673 <br>18.2 Security Performance&nbsp;&nbsp;&nbsp;&nbsp; 678 <br>&nbsp;&nbsp;&nbsp; Security Performance Measurement&nbsp;&nbsp;&nbsp;&nbsp; 678 <br>&nbsp;&nbsp;&nbsp; Security Monitoring and Reporting&nbsp;&nbsp;&nbsp;&nbsp; 686 <br>&nbsp;&nbsp;&nbsp; Information Risk Reporting&nbsp;&nbsp;&nbsp;&nbsp; 688 <br>&nbsp;&nbsp;&nbsp; Information Security Compliance Monitoring&nbsp;&nbsp;&nbsp;&nbsp; 690 <br>18.3 Security Monitoring and Improvement Best Practices&nbsp;&nbsp;&nbsp;&nbsp; 691 <br>18.4 Key Terms and Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 692 <br>&nbsp;&nbsp;&nbsp; Key Terms&nbsp;&nbsp;&nbsp;&nbsp; 692 <br>&nbsp;&nbsp;&nbsp; Review Questions&nbsp;&nbsp;&nbsp;&nbsp; 692 <br>18.5 References&nbsp;&nbsp;&nbsp;&nbsp; 693 <br> Appendix A:&nbsp; References and Standards&nbsp;&nbsp;&nbsp;&nbsp; 694<br>Appendix B:&nbsp; Glossary&nbsp;&nbsp;&nbsp;&nbsp; 708<br>Index&nbsp;&nbsp;&nbsp;&nbsp; 726<br><br>Appendix C:&nbsp; Answers to Review Questions&nbsp;&nbsp;&nbsp; (Online Only) <br>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Effective Cybersecurity