Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Bibliographic Details
Main Author: Woody, Aaron
Format: eBook
Language:English
Published: Birmingham, UK Packt Pub. 2013
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04826nmm a2200517 u 4500
001 EB001919705
003 EBX01000000000000001082607
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1849685975 
020 |a 1849685967 
020 |a 9781849685979 
050 4 |a TK5103.4885 .W384 2013 
100 1 |a Woody, Aaron 
245 0 0 |a Enterprise security  |b a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise  |c Aaron Woody 
260 |a Birmingham, UK  |b Packt Pub.  |c 2013 
300 |a 1 volume  |b illustrations 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; Table of Contents; Preface; Chapter 1: Enterprise Security Overview; The façade of enterprise security; The history and making of the façade; Our current approach to security; Security architecture 101; A new approach to security; Enterprise security pitfalls; Shortcomings of the current security architecture; Communicating information security; The cost of information security; The conflicting message of enterprise security; Proving a negative; The road map to securing the enterprise; Road map components 
505 0 |a Common IT security standardsSecurity exceptions; Security review of changes; Perimeter security changes; Data access changes; Network architectural changes; Summary; Chapter 4: Securing the Network; Overview; Next generation firewalls; Benefits of NGFW technology; Application awareness; Intrusion prevention; Advanced malware mitigation; Intrusion detection and prevention; Intrusion detection; Intrusion prevention; Detection methods; Behavioral analysis; Anomaly detection; Signature-based detection; Advanced persistent threat detection and mitigation; Securing network services; DNS 
505 0 |a Defining usersDefining applications; Defining data; Defining roles; Defining processes; Defining policies and standards; Defining network infrastructure; Defining application security architecture; Summary; Chapter 2: Security Architectures; Redefining the network edge; Drivers for redefinition; Feature-rich web applications; Business partner access; Miscellaneous third-party services; Cloud initiatives; Security architecture models; Defining the building blocks of trust models; Defining data in a trust model; Defining processes in a trust model; Defining applications in a trust model 
505 0 |a Defining users in a trust modelDefining roles in a trust model; Defining policies and standards; Enterprise trust models; Application user (external); Application owner (business partner); System owner (contractor); Data owner (internal); Automation; Micro architectures; Data risk-centric architectures; BYOD initiatives; Bring your own mobile device; Bring your own PC; Summary; Chapter 3: Security As a Process; Risk analysis; What is risk analysis?; Assessing threats; Assessing impact; Assessing probability; Assessing risk; Applying risk analysis to trust models 
505 0 |a Deciding on a risk analysis methodologyOther thoughts on risk and new enterprise endeavors; Security policies and standards; Policy versus standard; A quick note on wording; Understanding security policy development; Common IT security policies; Information security policy; Acceptable use policy; Technology use policy; Remote access policy; Data classification policy; Data handling policy; Data retention policy; Data destruction policy; Policies for emerging technologies; Policy considerations; Emerging technology challenges; Developing enterprise security standards 
653 |a Computer security 
653 |a Ordinateurs / Architecture 
653 |a Computer architecture / http://id.loc.gov/authorities/subjects/sh85029479 
653 |a Sécurité informatique 
653 |a Gestion / Informatique 
653 |a Management / Data processing / fast 
653 |a Management / Data processing / http://id.loc.gov/authorities/subjects/sh85080339 
653 |a Computer architecture / fast 
653 |a Business / Data processing / http://id.loc.gov/authorities/subjects/sh85018264 
653 |a Business / Data processing / fast 
653 |a Computer security / fast 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBB747735 
776 |z 1849685975 
776 |z 9781849685962 
776 |z 9781849685979 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849685962/?ar  |x Verlag  |3 Volltext 
082 0 |a 658 
082 0 |a 330 
082 0 |a 658.478 W912 2013 [ONLINE] 
520 |a A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise