PacktLib: Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Credits

About the Author

About the Reviewers

www.packtpub.com

Preface

Enterprise Security Overview

The façade of enterprise security

Enterprise security pitfalls

The road map to securing the enterprise

Summary

Security Architectures

Redefining the network edge

Security architecture models

Summary

Security As a Process

Risk analysis

Security policies and standards

Security exceptions

Security review of changes

Summary

Securing the Network

Overview

Next generation firewalls

Intrusion detection and prevention

Advanced persistent threat detection and mitigation

Securing network services

Network segmentation

Applying security architecture to the network

Summary

Securing Systems

System classification

File integrity monitoring

Application whitelisting

Host-based intrusion prevention system

Host firewall

Anti-virus

User account management

Policy enforcement

Summary

Securing Enterprise Data

Data classification

Data Loss Prevention

Encryption and hashing

Tokenization

Data masking

Authorization

Developing supporting processes

Summary

Wireless Network Security

Security and wireless networks

Securing wireless networks

Wireless network implementation

Wireless segmentation

Wireless network intrusion prevention

Summary

The Human Element of Security

Social engineering

Security awareness training

Access denied – enforcing least privilege

Physical security

Summary

Security Monitoring

Monitoring strategies

Privileged user access

Systems monitoring

Network security monitoring

Security Information and Event Management

Predictive behavioral analysis

Summary

Managing Security Incidents

Defining a security incident

Developing supporting processes

Getting enterprise support

Building the incident response team

Developing the incident response plan

Taking action

Summary

Applying Trust Models to Develop a Security Architectuture

Applying Trust Models to Develop a Security Architectuture

Risk Analysis, Policy and Standard, and System Hardening Resources

Risk Analysis, Policy and Standard, and System Hardening Resources

Risk Analysis, Policy and Standard, and System Hardening Resources

Risk Analysis, Policy and Standard, and System Hardening Resources

Security Tools List

Security Tools List

Security Tools List

Security Tools List

Security Tools List

Security Tools List

Security Tools List

Security Awareness Resources

Security Awareness Resources

Security Awareness Resources

Security Awareness Resources

Security Awareness Resources

Security Incident Response Resources

Security Incident Response Resources

Security Incident Response Resources

Security Incident Response Resources

Security Incident Response Resources

Security Incident Response Resources

Index