
Securing Business Information
Strategies to Protect the Enterprise and Its Network
F. Christian Byrnes, Dale Kutnick
Résumé
Securing Business Information provides an approach to security that is derived from numerous successful implementations. The Enterprise Security Plan (ESP) is a six-step process for tailoring enterprise security techniques to the needs of your business.
This book will guide you through these steps to secure your computing infrastructure within the constraints of normal business operations, resources, and today's technology:
- Prepare the enterprise, starting with the staff and their roles.
- Organize a group of security domains and assess the tolerable amount of risk for each.
- Complete a baseline security analysis and derive a set of guiding policies.
- Determine how security policies are being enforced throughout the enterprise.
- Identify gaps and set priorities.
- Plan the projects to implement an appropriately secure enterprise
L'auteur - F. Christian Byrnes
F. CHRISTIAN BYRNES leads Meta Group's security coverage. He is the author of Security in Enterprise Computing: A Practical Guide. In recognition of his expertise in intellectual property concerns, he was appointed to the US Congress advisory committee that produced an extensive report to guide congress in planning future laws. Mr. Byrnes was CEO at Centrax Corporation, a security software vendor acquired by CyberSafe.
L'auteur - Dale Kutnick
DALE KUTNICK is the cofounder, CEO, and Chairman of the Board of META Group, overseeing all of the company's research and analytic activities. Prior to cofounding META Group in 1989, Mr. Kutnick was executive vice president of research at Gartner Group. Previously, he was executive director and a principal at Yankee Group, and a principal at Battery Ventures, a venture capital firm.
Sommaire
- Prepare the Enterprise for Security
- Organize Security by Resource and Domains
- Complete the Baseline Security Analysis
- Complete the Requirements
- Identify Gaps and Prioritize Needs
- Selecting and Planning the Projects
- Modifying ESP
- Formulating a Technology Strategy
- Security Technologies
- Two Case Histories
- Security Follow-Up Projects
- Single-Point Administration through Role-based Authorization
- Single Sign-On
- Appendix A: Sample Request For Proposal
- Appendix B: Further Reading
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Addison Wesley |
Auteur(s) | F. Christian Byrnes, Dale Kutnick |
Parution | 01/01/2002 |
Nb. de pages | 237 |
Format | 19 x 24 |
Couverture | Relié |
Poids | 610g |
Intérieur | Noir et Blanc |
EAN13 | 9780971288744 |
ISBN13 | 978-0-9712887-4-4 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse