Network Security In the '90s

Issues and Solutions for Managers

Thomas W. Madron

Publisher: Wiley, 1992, 293 pages

ISBN: 0-471-54777-8

Keywords: IT Security, Networks

Last modified: July 20, 2021, 6:55 p.m.

How do you protect your company's computer data? How do you create a "tamperproof office"? These are tow of the biggest challnges facing today's managers. Now, a well-known expert helps you quickly assess whther your network is secure and if not, what needs to be done and what it will cost you.

Written especially for managers, this practical guide provides you with valuable information on the important issues, implications, and strategies behind the management and maintenance of secure electronic systems. Then, you'll be prepared to make the right choices for your own organization.

Packet with the latest, most up-to-date information, Network Security in the '90s also:

  • Discusses risk analysis issues, the impact of security on performance, and how much protection is enough
  • Provides a model system to illustrate the scope of security and information integrity
  • Includes a survey of commercial available security products — including access control products, data encryption, disaster recovery, and physical security
  • Discusses proven methods for preventing unauthorized access
  • Explains how to effectively deal with worms and viruses
  1. Managing Network Security
    • Defining Information Security
    • Developing Understandings of Security
    • Threats to Information Security
    • Assessing Security Needs
    • The Impact of Information Security Measures
      • Network/Computer Performance
      • User Unfriendliness
      • Cost
    • Getting Serious About Network Security
    • Concluding Notes
    • Notes
  2. A Management Model for Network Security
    • Computer and Network Abuse
    • What Is Network Security?
    • A Manager's Security Model
    • Building Network Security
    • Organizing Network Security
      • An Information Security Policy
      • The Information Security Department
    • Concluding Notes
    • Notes
  3. The OSI Security Architecture
    • Open System Interconnection Model (OSI)
      • Overview of OSI
      • Open Systems Interconnection Environment
      • Concepts of a Layered Architecture
    • The OSI Security Architecture
    • Security Threat
      • Passive Threats
        • Release of Message Contents
        • Traffic Analysis
      • Active Threats
        • Denial of Message Service
        • Masquerading
        • Message Service Modification
    • Security Service
      • Confidentiality
      • Authentication
        • Data-Origin Authentication
        • Peer-entity Authentication
      • Data Integration
      • Repudiation and Non-repudiation
      • Access Control
    • Security Mechanisms
      • Encryption
      • Digital Signature
      • Access Control Mechanisms
      • Data Integrity Mechanisms
      • Authentication Mechanisms
      • Traffic Protection Mechanisms
      • Routing Control
      • Notarization
    • Concluding Notes
    • Notes
  4. Recognizing Security Risks
    • The Security Audit
    • Risk Analysis
      • Qualitative Risk Analysis
        • Auditor Risk Assessment Reviews
        • Management Security Reviews
        • Threat Scenario Case Study
        • The Delphi Method
        • Expert Systems
      • Quantitative Risk Analysis
    • Risk Analysis Software
    • Concluding Notes
    • Notes
  5. Encryption as a Security Mechanism
    • Private Key Cryptosystems
      • The Data Encryption Standard (DES)
        • DES Past and Present
        • Modes of Operation
      • The Future of Private Key Cryptosystems
    • Public Key Cryptosystems
    • Encrypting Network Flows
    • Key Management
    • Applications at Risk
    • Notes
  6. Methods for Preventing Unauthorized Access
    • Introduction
    • Techniques of Access Control
      • Who You Are
      • What You Posses
      • What You Know
    • Public Networks
    • Private Network Access Control
      • LAN Access Control
      • WAN Access Control
        • OSI Networks
        • IBM Mainframe Networks
        • DEC Networks
    • Access Policies
    • Notes
  7. Dealing with Worms and Viruses
    • Vulnerabilities
    • How Viruses Infect Networks
    • Viruses and Other
    • Security Threats
    • Elements of a Viral
    • Infection Policy
      • User Education
      • Software Management
      • Technical Controls
      • Monitoring
        • Workstation Viruses
        • Multi-User System Viruses
        • Network Issues
      • Contingency Planning
    • Summary and Conclusions
    • Notes
  8. Micros, Minis, and Mainframes
    • Micros
      • Vulnerabilities
      • Security for Microcomputers
    • Multi-user Host Systems
      • Vulnerabilities
      • Security for Large Multi-User Systems
        • International Business Machines (IBM): MVS
        • Digital Equipment Corporation (DEC): VMS
        • AT&T UNIX System V
    • Conclusions
    • Notes
  9. A Survey of Security Products
    • Access Control Products
      • Domestic and International WAN
      • Access Control
      • Mini and Mainframe Access Control
      • LAN/Micro Access Control
      • Physical Access Control
    • Data Encryption
    • Disaster Recovery
    • Physical Security
    • Conclusions
    • Notes
  10. How Much Protection Is Enough?
    • The Impact of Security Measures
    • Closing the Barn Door
    • A Security Review Procedure
    • Conclusions
    • Notes
    • Network Security Checklist

Reviews

Network Security In the '90s

Reviewed by Roland Buresund

Decent ****** (6 out of 10)

Last modified: Nov. 15, 2008, 1:42 a.m.

An excellent book that is destroyed by all errors in the printing.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required