Complete LAN Security and Control

Peter T. Davis

Publisher: McGraw-Hill, 1994, 329 pages

ISBN: 0-8306-4549-7

Keywords: IT Security, Networks

Last modified: April 9, 2021, 10:52 a.m.

Plan, manage, and protect the security of your local area network.

  • Define and identify threats
  • Use preventive and corrective control methods
  • Secure hardware, software, and network components
  • Apply hardware and software controls

Secure your organization's most important asset — information

Covers emerging technologies such as imaging, wireless LANs, telecommuting, and rightsizing.

  • Part one: The problem
    1. LANs: The corporate lifeline
      • Information equals power
      • The changing LANscape
      • Power to the people
      • Understanding the problem
      • Understanding management's need for control
      • The need for security
      • Self-assessment quiz
    2. What is a LAN?
      • LAN components
      • Communication palindrome: ISO OSI
      • Getting the data out
      • Topologies
      • The network interface
      • The big three interface standards
      • Protocols: the rules of the road
      • How fast is data transmitted?
      • Which LAN is best?
  • Part two: The framework
    1. What is a threat?
      • Threats
      • Threats to a LAN environment
      • Threat scenarios
      • Vulnerabilities
      • Exposures
    2. What is a control
      • Types of control
      • Areas of control
      • Potential control issues
      • Control process
      • Relationship to management cycle
      • Relationship to total customer service
      • Relationship to risk analysis
      • Controls & people
    3. Managing risk: cost-benefit analysis
      • Costs. benefits — & risks
      • Risk
      • Risk analysis
      • Management decision
      • Control implementation
      • Effectiveness review
      • Final words on risk management
  • Part three: The solutions
    1. Secure the LAN
      • Information systems ethics: an oxymoron?
      • The first step: administrative & organizational security
      • Disaster preparedness
      • Working with people: personnel security
      • Protecting the office: physical & environmental security
      • Riding the waves: communications & electronic security
      • Iron age: hardware security
      • Picking one's brains: software security
    2. Applying controls to hardware
      • The message is the medium: cabling
      • Making the connection
      • Are you being served?
      • Sharing peripherals
      • Workstations: the local intelligence
      • Fault tolerance
      • Backup strategies
      • Static, noise, surges, brownouts, blackouts & other power problems
    3. Applying controls to software
      • It takes all types
      • Network operating system
      • Operating system
      • Network management software
      • Application software
    4. Applying controls to communications
      • Internetworking & connectivity
      • Communication security guideline
      • Network components
  • Part four: The future
    1. Future LAN security issues
      • Wireless technology
      • Cooperative computing
      • Telecommuting
      • Imaging: the last frontier
      • Rightsizing
      • LAN disaster
  • Appendices
    1. LAN security checklist
    2. Password dictionary
    3. LAN products
    4. Organizations

Reviews

Complete LAN Security and Control

Reviewed by Roland Buresund

Excrement * (1 out of 10)

Last modified: Nov. 15, 2008, 2:24 a.m.

Pathetic.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required