By Chris Jackson

This whole new consultant to auditing community safeguard is an essential source for safety, community, and IT pros, and for the experts and expertise companions who serve them.

Cisco community safeguard specialist Chris Jackson starts with an intensive evaluation of the auditing approach, together with insurance of the most recent laws, compliance matters, and top practices. the writer then demonstrates the right way to section safeguard architectures into domain names and degree safeguard effectiveness via a finished platforms approach.

Network safeguard Auditing completely covers using either advertisement and open resource instruments to aid in auditing and validating defense coverage assumptions. The e-book additionally introduces top IT governance frameworks akin to COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and powerful integrations with Cisco defense items.

This publication palms you with targeted auditing checklists for every area, reasonable layout insights for assembly auditing specifications, and functional information for utilizing complementary options to enhance any company’s defense posture.
• grasp the 5 pillars of safety auditing: evaluate, prevention, detection, response, and restoration.
• realize the foundational roles of safeguard rules, strategies, and criteria.
• comprehend present legislation with regards to hacking, cracking, fraud, highbrow estate, junk mail, and reporting.
• research safeguard governance, together with the jobs of CXOs, safeguard administrators, directors, clients, and auditors.
• assessment humans, methods, and technical defense controls via a system-based process.
• Audit safety providers enabled via Cisco items.
• research safety coverage and compliance requisites for Cisco networks.
• examine infrastructure safety and intrusion prevention structures.
• Audit community entry keep an eye on and safe distant entry structures.
• assessment defense in consumers, hosts, and IP communications.
• evaluation the functionality of safeguard tracking and administration systems.

This protection ebook is a part of the Cisco Press Networking know-how sequence. defense titles from Cisco Press aid networking pros safe serious info and assets, hinder and mitigate community assaults, and construct end-to-end, self-defending networks.

Show description

Read Online or Download Network Security Auditing PDF

Similar Computers books

Database Modeling and Design: Logical Design, 4th Edition (The Morgan Kaufmann Series in Data Management Systems)

Database structures and database layout know-how have gone through major evolution lately. The relational facts version and relational database structures dominate company purposes; in flip, they're prolonged via different applied sciences like info warehousing, OLAP, and information mining. How do you version and layout your database program in attention of recent know-how or new enterprise wishes?

Computer Networking: A Top-Down Approach (6th Edition)

&>Computer Networking maintains with an early emphasis on application-layer paradigms and alertness programming interfaces (the most sensible layer), encouraging a hands-on adventure with protocols and networking strategies, prior to operating down the protocol stack to extra summary layers. This booklet has turn into the dominant e-book for this direction due to the authors’ reputations, the precision of rationalization, the standard of the artwork application, and the worth in their personal vitamins.

The Guru's Guide to Transact-SQL

Due to the fact that its creation over a decade in the past, the Microsoft SQL Server question language, Transact-SQL, has turn into more and more renowned and extra robust. the present model activities such complicated positive factors as OLE Automation help, cross-platform querying amenities, and full-text seek administration. This publication is the consummate advisor to Microsoft Transact-SQL.

Data Structures and Problem Solving Using Java (4th Edition)

Facts buildings and challenge fixing utilizing Java takes a pragmatic and special approach to facts constructions that separates interface from implementation. it truly is compatible for the second one or 3rd programming direction.   This ebook presents a realistic advent to info constructions with an emphasis on summary pondering and challenge fixing, in addition to using Java.

Additional info for Network Security Auditing

Show sample text content

Ordinarily, there are 4 high-level business-focused audit different types: ■ Auditing a firm: This point of auditing is sometimes inquisitive about the governance point of defense and touches all facets of the enterprise. Organizational auditing is usually performed at the side of certification or accreditation (such as ISO 27001) and will be concerned from a source and time perspective. ■ Auditing a website: domain names are IT providers provided to the enterprise and at this point, the auditor teams interconnected strategies, applied sciences, and enterprise features to evaluate them as one unit. those domain names surround the entire humans, methods, and applied sciences linked to defense carrier parts akin to distant entry, perimeter intrusion prevention, and entry regulate. This point is basically inquisitive about provider supply, structure, and assembly the protection necessities of the company. ■ Auditing a functionality: At this point, the auditor assesses a useful point of the enterprise that comes with a number of strategies and applied sciences used to safe the company carrier. enterprise capabilities characterize company prone comparable to HR, finance, and production. An auditor experiences the function-specific safeguard controls, applied sciences, and approaches utilized by the enterprise functionality. 133 134 community protection Auditing ■ Auditing a procedure: the bottom point of auditing and so much particular is to evaluate a safety procedure. A approach is outlined because the steps played to complete a selected activity, for instance, to create new consumer entry to the community. The auditor experiences and observes all the steps from approach initiation to of entirety for coverage compliance and stable defense practices. Auditors may be requested to audit at any of those 4 degrees, yet auditing on the area point so much represents assessing protection as a process. With Cisco items, safety features and features are built-in into each equipment, so the idea that of a number of capabilities, tactics, and controls being within the similar machine has to be thought of. A router could be a firewall, IPS, and speak to approach all even as, because of this the auditor needs to logically separate out the prone provided via the equipment while trying out. each one area identifies a number of layers of safety extensive and the rules and strategies which are appropriate. person safety units and applied sciences can live in a number of domain names, which highlights their multifunctional function. The seven auditing domain names, as defined in short, are the root for the association of the remainder of this ebook and construct upon one another for auditing community protection. We specialize in every one of those domain names in additional aspect in next chapters of this booklet. It’s very important to notice that the domain names coated are concerned about Cisco community defense and aren't indicative of all elements of safeguard; for instance, actual protection and catastrophe restoration should not incorporated during this record. even supposing those domain names are very important for businesses to handle, they're open air of the scope of this publication.

Rated 4.69 of 5 – based on 47 votes