Matches in SemOpenAlex for { <https://semopenalex.org/work/W647276828> ?p ?o ?g. }
Showing items 1 to 51 of
51
with 100 items per page.
- W647276828 abstract "Preface. I. THE FORGING OF A NEW ECONOMY. 1. What is E-Business? The E-Business Sweepstakes. Caesars of E-Business: An Embattled Business Culture. The Lure of Overnight Successes. Crossing the Digital Chasm. The Sobering Reality. Real-World Examples. E-Business: The Shaping and Dynamics of a New Economy. The E-Business Supply Chain. Related E-Business Trends. Summary. 2. What Is E-Security? E-Security at Your Service. Demands on Traditional IT Security: A Changing of the Guard. Principles of E-Security. Risk Management in the New Economy. How E-Security Enables E-Business. The E-Security Dilemma: Open Access versus Asset Protection. 3. The Malicious Opponents of E-Business. The Lure of Hacking. Hackers versus Crackers. Hacker Groups. Why Hackers Love to Target Microsoft. Meeting the Hacker Threat. National Infrastructure Protection Center. Central Intelligence Agency. Other White Hats. II. PROTECTING INFORMATION ASSETS IN AN OPEN SOCIETY. 4. A New Theater of Battle. From the Demilitarized Zone and the Perimeter to Guerilla Warfare. The Triumph of Intranets, Extranets, and Virtual Private Networks. The Vanishing World of Controlled, or Closed, Access. The Impact of Open Access. The Correlation between Open Access and Asset Protection. The Role of Authentication and Privacy in the New Economy. Summary. 5. Reempowering Information Technology in the New Arms Race. The Failings of the Old Paradigm. Infiltration of Rogue Applets. Human Error and Omission. Ongoing Change in the Enterprise Network. Deploying and Maintaining Complex Layer Client/Server Software. Shortage of Human Capital. Rigidity of Enterprise Security Policy. Tools for Rearming the IT Manager. Guidelines for E-Security. Enterprise Security Policy. Summary. III. WAGING WAR FOR CONTROL OF CYBERSPACE. 6. Attacks by Syntax: Hacker and Cracker Tools. Inherent Shortcomings of TCP/IP. Standard Ports of Call. TCP/IP Implementation Weaknesses. IP Spoofing. Distributed Denial-of-Service Attacks and Tools. Trin00. Tribe Flood Network. Tribe Flood Network 2000. Stacheldraht. ICMP Directed Broadcast, or Smurf Bandwidth Attack. Backdoor Programs and Trojan Horses. Backdoor Program Functions. Examples of Backdoor Programs. Summary. 7. Attacks by Automated Command Sequences. Script Attacks. The Next Generation of E-Mail Attacks. The Bubble Boy Virus. Mainstream JavaScript Attacks. Attacks through Remote Procedure Call Services. Brown Orifice. Summary and Recommendations. 8. Countermeasures and Attack Prevention. Surviving an Attack. Formulate an Emergency Response Plan and an Incident Response Team. Obtain Outside Assistance. Contact Law Enforcement Authorities. Use Intrusion Detection System Software. Countering an Attack. Disconnect Compromised Host/System from Your Network. Copy an Image of the Compromised System(s). Analyze the Intrusion. Recognizing What the Intruder Leaves Behind. 9. Denial-of-Service Attacks. Effects of DoS and DDoS Attacks. General Computing Resources. High-Performance Firewall. Network Bandwidth. Handling a SYN Flood DDoS Attack. Countermeasures. Precautions. Handling a Bandwidth DDoS Attack. Guarding against Being an Accomplice Network. Guarding against Becoming an Intermediary Network. Guarding against Being a Victim. Handling a UDP Flood Bomb. Using an IDS. Recovering from a DDoS Attack. 10. Creating a Functional Model for E-Security. Developing a Blueprint for E-Security. Understanding Business Objectives. Honing in on Your IT Security Policy. Making Good on IT Security's Best Practices. The IT Security Functional Model. Deploying Effective E-Security Architecture: Hardening the Network's Infrastructure. Hardening Your Router. Hardening Your Operating Systems. Summary. 11. Building a Security Architecture. Firewall Architecture Deployment, Controls, and Administration. Types of Firewalls. Hardening Firewalls. Remote-Access Architecture. Encryption Options for Administrators. Securing Remote-Administration Pipes for Administrators. Remote-Access Architecture/Solutions for Users. Vulnerability Assessment Architecture/Solutions. Network-Based Assessment Architecture. Host Vulnerability Assessment. Intrusion Detection Architecture. Network-Based IDS Architecture. Host-Based IDS Solutions. IV. ACTIVE DEFENSE MECHANISMS AND RISK MANAGEMENT. 12. Vulnerability Management. Types of Vulnerabilities. Managing IT Systems Vulnerabilities. Conducting Vulnerability Analysis. Network-Based Vulnerability Analysis. Host-Based Vulnerability Analysis. 13. Risk Management. The Role of Assessment in Risk Management. The Process of Risk Management. Defining the System Boundaries. Threat Analysis. Impact Analysis. Risk Determination. Summary. Appendix A: SANs/fbi Top 20 Internet Security Vulnerabilities. Appendix B: Sample CERT/Coordination Center Incident Response Form. Appendix C: Windows 2000 Security/Hardening Plan. Appendix D: Denial-of-Service Attacks. Glossary. Bibliography. Index. 020171972XT08282002" @default.
- W647276828 created "2016-06-24" @default.
- W647276828 creator A5062625419 @default.
- W647276828 date "2002-08-12" @default.
- W647276828 modified "2023-09-27" @default.
- W647276828 title "Enterprise Security: The Manager's Defense Guide" @default.
- W647276828 hasPublicationYear "2002" @default.
- W647276828 type Work @default.
- W647276828 sameAs 647276828 @default.
- W647276828 citedByCount "3" @default.
- W647276828 crossrefType "book" @default.
- W647276828 hasAuthorship W647276828A5062625419 @default.
- W647276828 hasConcept C141141315 @default.
- W647276828 hasConcept C144133560 @default.
- W647276828 hasConcept C199360897 @default.
- W647276828 hasConcept C38652104 @default.
- W647276828 hasConcept C41008148 @default.
- W647276828 hasConcept C86844869 @default.
- W647276828 hasConceptScore W647276828C141141315 @default.
- W647276828 hasConceptScore W647276828C144133560 @default.
- W647276828 hasConceptScore W647276828C199360897 @default.
- W647276828 hasConceptScore W647276828C38652104 @default.
- W647276828 hasConceptScore W647276828C41008148 @default.
- W647276828 hasConceptScore W647276828C86844869 @default.
- W647276828 hasLocation W6472768281 @default.
- W647276828 hasOpenAccess W647276828 @default.
- W647276828 hasPrimaryLocation W6472768281 @default.
- W647276828 hasRelatedWork W1560504743 @default.
- W647276828 hasRelatedWork W1983535948 @default.
- W647276828 hasRelatedWork W1995263871 @default.
- W647276828 hasRelatedWork W2053451652 @default.
- W647276828 hasRelatedWork W2071302186 @default.
- W647276828 hasRelatedWork W2072634189 @default.
- W647276828 hasRelatedWork W2076091832 @default.
- W647276828 hasRelatedWork W2181704311 @default.
- W647276828 hasRelatedWork W2225783731 @default.
- W647276828 hasRelatedWork W2348383924 @default.
- W647276828 hasRelatedWork W2354131045 @default.
- W647276828 hasRelatedWork W2361145267 @default.
- W647276828 hasRelatedWork W2384815038 @default.
- W647276828 hasRelatedWork W2388182222 @default.
- W647276828 hasRelatedWork W2805376717 @default.
- W647276828 hasRelatedWork W3011075364 @default.
- W647276828 hasRelatedWork W3175081627 @default.
- W647276828 hasRelatedWork W570292129 @default.
- W647276828 hasRelatedWork W574402863 @default.
- W647276828 hasRelatedWork W1924795275 @default.
- W647276828 isParatext "false" @default.
- W647276828 isRetracted "false" @default.
- W647276828 magId "647276828" @default.
- W647276828 workType "book" @default.