Home > Store

Process of Network Security, The: Designing and Managing a Safe Network

Register your product to gain access to bonus material or receive a coupon.

Process of Network Security, The: Designing and Managing a Safe Network

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 2000
  • Dimensions: 7-1/4" x 9-1/4"
  • Pages: 304
  • Edition: 1st
  • Book
  • ISBN-10: 0-201-43317-6
  • ISBN-13: 978-0-201-43317-3

This wide-ranging, up-to-date, conversational guide to network security focuses on the most important success factors: process and mindset. Security expert Thomas Wadlow shows exactly what it means to "be" a successful network security manager within a large business organization. Learn how to define what an organization's security goals ought to be -- and how to implement an effective security policy quickly, without endless committee meetings or company politics. Understand who may be attacking you, and how to "think pathologically" about your network, putting yourself in the shoes of your attacker. Evaluate which information resources are most worth protecting; learn how to build an effective security team; and discover how to build security systems that protect the enterprise as a whole, not just individual devices. Learn how to fortify your network components and design; monitor and audit your network; even quantify the value of security. The book also presents five exceptionally detailed chapters on how to respond effectively to an attack -- from forensics and log analysis to damage control. For every manager and executive concerned with network security, including sysadmins, netadmins, security managers, CIOs, CFOs, and CEOs.

Sample Content

Table of Contents



Preface.


Acknowledgments.


1. Understanding Security.

What Are We Protecting?

Thinking Like a Defender.

The Reader of This Book.

The Organization We Are Protecting.

The Process of Security.

How Do You Know That the Process Is Working?

Trend Analysis.



2. Writing a Security Policy.

Pitfalls.

Staging a Coup

Contents of the Policy



3. Who Is Attacking You?

The Nature of the Beast.

Security as an Evolutionary Strategy.



4. Security Design Process.

Thinking About Security.

Principles of Security.

The Shape of Your Defenses.

The Shape of Your Security Organization.



5. Building a Security Team.

Employee Characteristics.

Job Functions in a Security Team.

Training and Cross-Training.

Interviewing Security Candidates.

Background Checks.

Hiring.

Firing.



6. Fortifying Network Components.

What Is a Network Component?

Component Types.

Selecting Components.

Component Categories.

Fortifying Components.

System Fortification.



7. Personnel Security.

Management Issues.

Hiring Process.

Trouble with Employees.

Firing Process.

Resignation Process.

Contractors.



8. Physical Security.

What Are the Threats?

Physical Security Basics.

Going Overboard.

Backups.

Denial of Service.

Electrical Power.

Telephones.

Access Control Logging and Log Analysis.



9. Monitoring Your Network.

The Shape of the Logging System.

What to Log.

Logging Mechanisms.

Time.

Sensors.

Logging System Design.

Log Management.

Log Analysis.



10. Auditing Your Network.

Why Should You Audit Your Network?

Types of Audit.

What Should the Audit Measure?

Who Should Do the Audit?

Expectations.



11. Quantifying the Value of Security.

Perception of Value.

Process of Explaining Security Issues.

Measurements.



12. Preparing for an Attack.

Getting Started.

War Games.

Post-Mortem Analysis.

Developing a Response Plan.

Personnel.

Safety Equipment.

Survival Pack Contents.

Choosing Hiding Places.

Set Your Own Ground Rules.



13. Handling an Attack.

Exciting, but Not Fun.

Thinking Pathologically.

About Attacks.

What You Can Do.

What You Should Not Do.

Response Team.

Priorities During an Attack.



14. Forensics.

Getting Started.

The Art of Investigation.

The Clean Room.

Analyzing the Contaminated File System.

Analysis Tools.

What to Look For.



15. Log Analysis.

Integrity Checks.

Log Analysis.

The Hunt.

Developing Theories.

Legalities.



16. Damage Control.

Priorities.

Advance Preparation.

Post-Mortem Analysis.



Appendix A: Glossary. 0201433176T04062001

Preface

A friend of mine said to me the other day that he wanted his old Internet back again. Things worked as well as they needed to. Everyone was nice. You could send mail to people you'd never met, and you'd typically get a nice reply. People gained access to different machines all around the world, which was given more or less freely, so you could log into those machines and see what they'd accomplished this month or just chat with friends. If something needed to be done, a bunch of smart people got together and did it, without too much fuss or bother. It was a nice place, for the most part.

He really wasn't serious, this friend of mine. He makes his living using the Internet we have today and by speaking about the Internet we'll have tomorrow. He gets most of his news from CNN's Web site, and the computer industry-specific sites such as Slashdot and Freshmeat. I can't remember the last time he traveled without a laptop; you can send him e-mail anywhere he travels, and (if you get past his filtering software) he'll answer it from Tokyo or Singapore or Paris. The Internet is probably the most complicated thing created by the human race, and yet it is (relatively speaking, of course) easy to use and just about everywhere you'd want it to be.

But I understand his point. The Internet isn't the friendly place it used to be. What was once a small town, where neighbors were friendly and you could leave your door unlocked, is now the largest (virtual) community in the world, and it's growing bigger every day. There are bad parts of town, and there are muggers and thieves and con men, just as in every other city on Earth. You can't get beaten up, but you can be robbed of your time and in some cases of your money.

For all that, the Internet is probably the safest community of its size ever in existence. But that isn't something to take much comfort in. The reason I say this is that I and other members of my profession are called on to look at the security of sites on the Internet from time to time. I know the Internet is mostly safe, because the doors to most places are still unlocked and yet major catastrophes have not happened. Reasoning from that, it appears that most of the people on the Internet are not Bad Guys. Not yet, anyway.

Of course, this can change at any time. And it has begun to. The 1990s saw an ever-growing number of people systematically trolling for computer weaknesses. These people are not trying to attack a specific site; rather, they are just fishing to see what they can catch. The late 1990s saw the beginning of Internet attacks for political reasons. As this book was written, the news media referred to the conflict in Kosovo as the "First Internet War" because of several hostile incidents that occurred and also because much of the unofficial communication between sides was taking place over the Internet.

The Internet is becoming a dangerous place. But it is important to see this in perspective. Any large community has its bad neighborhoods, robberies, muggings and trouble spots, but that doesn't mean it is impossible to live and work there safely. The trick is to keep your eyes open, take reasonable precautions, and not act foolishly. The same rules apply to the Internet.

But computer security means far more these days than the ability of one person to protect himself or herself from the dangers that can arise on the Internet. It's one thing to protect yourself. It's a very different thing indeed to protect a hundred computers, or a thousand, or ten thousand.

This book is intended for the people facing that formidable challenge and the people who will assist in such an endeavour. It is not a tutorial on how to become a hacker. Nor is it a technical manual on how to run a large computer network. Many other sources cover those subjects, for better or worse. My goal here is to give a person charged with the responsibility of running the network security for a large organization a tool for understanding the language and practices of network and computer security, and to provide some hints along the way to save some time and some scraped knuckles. As with any large project, there are many ways to approach these issues. I don't claim that this book is an exhaustive survey of all possible ways. It is, however, a collection of good methodology and tips and tricks, with some warning signs at the rough spots, that have worked for me.

So who am I? Well, I am an electrical engineer by training, but I was swept up into computer science in my high school and college years. My first experience with the Internet was in the late 1970s, when I discovered that I could connect from Carnegie-Mellon University, where I went to school, to a machine in London, England, over something called the ARPANET, which was just appearing on the scene at that time. Like many others at CMU, I worked in the university Computer Center. Unlike many of my colleagues there, I've kept much the same job ever since, running larger and larger collections of computers and their networks at Lawrence Livermore Laboratory, Schlumberger's Palo Alto Research Center, Xerox's Palo Alto Research Center, ParcPlace Systems, and Sun Microsystems Laboratories. Along the way, I've learned a few things about keeping large collections of machines happy and healthy and about keeping the Bad Guys out and the Good Guys working. Now I find myself as the Chief Technology Officer and Vice President of Security for Pilot Network Services, Inc., a company I helped to found and whose function is to handle Internet security for our customers, a diverse collection of some of the most dynamic and interesting (as well as the largest) companies on Earth. The principles we use to run our business safely can be found in this book. That may strike you as odd, creating a book that says how we do our business, because it enables people to compete against us, using our own principles. Well, read on. If you still think it's easy, give it a shot. We welcome the competition.

Acknowledgments

A great many people helped me with the production of this book, directly or indirectly, but I'd like to thank several specifically:

Dr. Martine Droulers and Dr. Celine Broggio, wonderful friends who fed me delicious food and gave me the use of their French seaside attic to finish the book. Fromage! Eileen Keremitsis, who put up with my grumbling, made sure that I wasn't working too hard, and was ready with an invitation to dinner whenever I needed one. Dennis Allison, who tempted me back into the book-writing business after a long absence, and Karen Gettman and Mary Hart of Addison-Wesley, who made sure that I stayed the course. Steve Riley, Joseph Balsama, Steve Rader, John Stewart, and Clifford Neuman, who read the entire manuscript and whose numerous and insightful comments I found very helpful. And of course, the people at Pilot Network Services, who are the hardest working and nicest bunch of security folks I've ever met.

Tom Wadlow
San Francisco, California, USA
Le Crotoy, Picardie, France, 2000



0201433176P04062001

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020