Network Security Auditing, Rough Cuts
- By JACKSON
- Published Mar 16, 2009 by Cisco Press.
Rough Cuts
- Available to Safari Subscribers
- About Rough Cuts
Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.
- Copyright 2010
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 528
- Edition: 1st
- Rough Cuts
- ISBN-10: 1-58705-939-8
- ISBN-13: 978-1-58705-939-1
This is the Rough Cut version of the printed book.
This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.
Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.
Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.
This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company’s security posture.
- Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery.
- Recognize the foundational roles of security policies, procedures, and standards.
- Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting.
- Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors.
- Evaluate people, processes, and technical security controls through a system-based approach.
- Audit security services enabled through Cisco products.
- Analyze security policy and compliance requirements for Cisco networks.
- Assess infrastructure security and intrusion prevention systems.
- Audit network access control and secure remote access systems.
- Review security in clients, hosts, and IP communications.
- Evaluate the performance of security monitoring and management systems.
This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
Table of Contents
Introduction xxi
Chapter 1 The Principles of Auditing 1
Security Fundamentals: The Five Pillars 1
Assessment 2
Prevention 3
Detection 3
Reaction 4
Recovery 4
Building a Security Program 4
Policy 5
Procedures 6
Standards 7
Security Controls 7
Administrative Controls 7
Technical Controls 8
Physical Controls 8
Preventative Controls 8
Detective Controls 8
Corrective Controls 8
Recovery Controls 9
Managing Risk 9
Risk Assessment 10
Risk Mitigation 14
Risk in the Fourth Dimension 16
How, What, and Why You Audit 17
Audit Charter 17
Engagement Letter 18
Types of Audits 19
Security Review 19
Security Assessment 19
Security Audit 20
The Role of the Auditor 20
Places Where Audits Occur 21
Policy Level 21
Procedure Level 21
Control Level 22
The Auditing Process 22
Planning Phase: Audit Subject, Objective, and Scope 22
Research Phase: Planning, Audit Procedures, and Evaluation Criteria 23
Data Gathering Phase: Checklists, Tools, and Evidence 23
Data Analysis Phase: Analyze, Map, and Recommend 24
Audit Report Phase: Write, Present, and File the Audit Report 24
Follow-Up Phase: Follow up, Follow up, Follow up! 25
Summary 25
References in This Chapter 26
Chapter 2 Information Security and the Law 27
IT Security Laws 27
Hacking, Cracking, and Fraud Laws 29
Computer Fraud and Abuse Act 29
Access Device Statute 31
Electronic Communications Privacy Act 34
Title I: Wiretap Act 34
Title II: Stored Communications Act 37
<Other Things You Might Like
- Securing Enterprise Networks with Cisco Meraki
- eBook $55.99
- Securing Enterprise Networks with Cisco Meraki
- Book $55.99