IT Security 2nd Ed.

Risking the Corporation

Linda Ann McCarthy

Publisher: Prentice Hall, 2003, 272 pages

ISBN: 0-13-101112-X

Keywords: IT Security

Last modified: March 20, 2022, 11:47 p.m.

Even the world's largest and most sophisticated networks are vulnerable to attack — and so is yours.

The scenarios described in IT Security: Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software — as well as the vulnerability caused by poor training, corporate politics, and careless management. In the previous version of this book, originally published as Intranet Security: Stories from the Trenches, Linda McCarthy drew on her experience penetrating thousands of corporate networks to identify key security risks and practical solutions. This update is even more compelling and offers a clear plan for improving the security of your systems. You'll find useful tools and preventive measures you can take right now.

In addition, McCarthy's security checklists and resource listings can help you tighten security throughout your entire IT infrastructure.

  • Foreword
  • Acknowledgments
  • Introduction
    • About this Book
    • How this Book Is Organized
    • About Hackers
  • Chapter 1. Responding to Attacks
    • Incident-Response Nightmare
    • Let's Not Go There…
    • Final Words
  • Chapter 2. Out-of-the-Box Security
    • Deal with Security Later
    • Let's Not Go There?
    • Final Words
  • Chapter 3. Executive Support
    • Executive Commitment
    • Let's Not Go There?
    • Final Words
  • Chapter 4. Network Access
    • Partner Connections
    • Let's Not Go There…
    • Final Words
  • Chapter 5. Security Training
    • Overlooking Training
    • Let's Not Go There…
    • Final Words
  • Chapter 6. Unplanned Security
    • Transition Plan
    • Let's Not Go There…
    • Final Words
  • Chapter 7. Maintaining Security
    • Responsible for Security
    • Let's Not Go There…
    • Final Words
  • Chapter 8. Internal Network Security
    • Unsafe Network
    • Let's Not Go There?
    • Final Words
  • Chapter 9. Outsourcing Security
    • Forget Security?
    • Let's Not Go There?
    • Final Words
  • Chapter 10. Unsecure Email
    • Email or See Mail?
    • Let's Not Go There…
    • Final Words
  • Chapter 11. Looking Back: What's Next?
    • Risking the Corporation
    • Legal Duties to Protect Information and Networks
    • Business Initiatives and Corporate Goals
    • Threats Require Action
  • Chapter 12. A Hacker's Walk Through the Network
    • A Hacker's Profile
    • Walking with the Hacker
    • What the Hacker Was Doing?
    • Conclusion
  • Appendix A. People and Products to Know
    • Security-Related Organizations
    • Security Resources
    • Security Vulnerability Archives
    • Popular Mailing Lists
    • Consulting Firms
    • Security Crime Investigation
    • Insuring Information Technology
    • Software You Need to Know About
    • Product Vendors
  • Acronyms
  • Glossary

Reviews

IT Security

Reviewed by Roland Buresund

Good ******* (7 out of 10)

Last modified: May 21, 2007, 3:09 a.m.

A book that you may put into the CIO's hands (or why not any managers hands). It explains the reasoning why you need security with some (in fact) silly and not very factual examples that anyway is very telling to any non-security savy senior manager.

In short, a book to give away.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required