Cover image for Security planning and disaster recovery
Title:
Security planning and disaster recovery
Personal Author:
Publication Information:
New York : McGraw-Hill Osborne, 2002
ISBN:
9780072224634
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010020248 TK5105.59 M36 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

This volume provides information for creating and implementing a successful security and disaster recovery plan. Each chapter includes a hands-on security checklist with tasks to implement to ensure networks are safe.


Table of Contents

Acknowledgmentsp. xv
Introductionp. xvii
Part I Guiding Principles in Plan Development
1 The Role of the Information Security Programp. 3
Getting Off on the Right Footp. 4
Establishing the Role of Securityp. 5
Reporting Structurep. 6
Mission Statementp. 7
Long-Term Goalsp. 8
Short-Term Objectivesp. 10
Relationshipsp. 10
Technical Relationshipsp. 10
Business Relationshipsp. 13
Checklist: Key Roles of the Programp. 18
2 Laws and Regulationsp. 19
Working with the Legal and Compliance Departmentsp. 21
Legal Backgroundp. 22
Computer Fraud and Abuse Act of 1986p. 22
Electronic Communications Privacy Act of 1986p. 24
Computer Security Act of 1987p. 27
National Information Infrastructure Protection Act of 1996p. 27
Gramm-Leach-Bliley Financial Services Modernization Actp. 29
Health Insurance Portability and Accountability Act (HIPAA)p. 33
Resourcesp. 37
Checklist: Key Points in Information Security Legal Issuesp. 38
3 Assessmentsp. 39
Internal Auditsp. 40
External Auditsp. 43
Assessmentsp. 44
Self-Assessmentsp. 44
Vulnerability Assessmentsp. 45
Penetration Testsp. 46
Risk Assessmentsp. 49
Checklist: Key Points in Assessmentsp. 53
Part II Plan Implementation
4 Establishing Policies and Proceduresp. 57
Purpose of Policiesp. 58
Policies to Createp. 59
Acceptable Use Policyp. 60
Information Security Policyp. 61
Dealing with Existing Documentsp. 68
Getting Buy-Inp. 69
Policy Reviewp. 70
Checklist: Key Points in Establishing Policies and Proceduresp. 72
5 Implementing the Security Planp. 73
Where to Startp. 75
Establish the Planp. 76
Risk Assessmentp. 78
Risk Reduction Planp. 78
Develop Policiesp. 81
Solution Deploymentp. 81
Trainingp. 82
Audit and Reportingp. 82
Do It All Over Againp. 83
Working with System Administratorsp. 85
Working with Managementp. 87
Educating Usersp. 88
Checklist: Key Points in Implementing the Security Planp. 89
6 Deploying New Projects and Technologiesp. 91
New Business Projectsp. 92
Requirements Definitionp. 94
System Designp. 97
Internal Developmentp. 111
Third-Party Productsp. 112
Testp. 112
Pilotp. 112
Full Productionp. 114
Checklist: Key Points in Deploying Business Projectsp. 114
7 Security Training and Awarenessp. 117
User Awarenessp. 119
Management Awarenessp. 120
Security Team Training and Awarenessp. 121
Training Methodsp. 122
Job Descriptionp. 123
New Hire Orientationp. 124
Acceptable Use Policyp. 125
Formal Classroom Trainingp. 125
Seminars and Brown Bag Sessionsp. 126
Newsletters and Web Sitesp. 127
Campaignsp. 128
Conferencesp. 129
Checklist: Key Points for Security Training and Awarenessp. 130
8 Monitoring Securityp. 131
Policy Monitoringp. 132
Awarenessp. 132
Systemsp. 133
Employeesp. 134
Computer Usep. 135
Network Monitoringp. 136
System Configurationsp. 136
Attacksp. 137
Mechanisms to Monitor the Networkp. 137
Audit Log Monitoringp. 138
Unauthorized Accessp. 139
Inappropriate Behaviorp. 139
Mechanisms for Effective Log Monitoringp. 140
Vulnerability Monitoringp. 141
Software Patchesp. 142
Configuration Issuesp. 142
Mechanisms to Identify Vulnerabilitiesp. 143
Checklist: Key Points in Monitoring Securityp. 146
Part III Plan Administration
9 Budgeting for Securityp. 149
Establishing the Needp. 150
Building the Budgetp. 153
Other Considerationsp. 153
Staffing Requirementsp. 154
Training Costsp. 156
Software and Hardware Maintenancep. 157
Outside Servicesp. 157
New Productsp. 159
Unexpected Costsp. 160
Stick to Your Budgetp. 160
Checklist: Key Points in Security Program Budgetingp. 161
10 The Security Staffp. 163
Skill Areasp. 164
Security Administrationp. 165
Policy Developmentp. 166
Architecturep. 167
Researchp. 167
Assessmentp. 167
Auditp. 168
Hiring Good Peoplep. 168
Work Ethicp. 168
Skills and Experiencep. 169
Personalityp. 170
Certificationsp. 172
Small Organizationsp. 173
Skills on the Staffp. 173
Finding Skills Outside of the Staffp. 173
Large Organizationsp. 175
Basic Organization of the Security Departmentp. 175
Finding Skills Outside of the Staffp. 175
Checklist: Key Points in Hiring Staffp. 176
11 Reportingp. 177
Progress on Project Plansp. 178
State of Securityp. 180
Metricsp. 180
Risk Measurementp. 183
Return on Investmentp. 189
Business Projectsp. 189
Direct Savingsp. 189
Incidentsp. 190
Factual Account of Eventsp. 190
Vulnerabilities Exploitedp. 190
Actions Takenp. 191
Recommendationsp. 191
Auditsp. 191
Security Department Responsep. 192
Checklist: Key Points in Security Reportingp. 192
Part IV How to Respond to Incidents
12 Incident Responsep. 197
The Teamp. 198
Team Membersp. 198
Leadershipp. 201
Authorityp. 201
Team Preparationp. 202
Identifying the Incidentp. 202
What Is an Incident?p. 202
What to Look Forp. 203
The Help Desk Can Helpp. 205
Escalationp. 206
Investigationp. 206
Collecting Evidencep. 207
Determining Responsep. 208
Containmentp. 209
Eradicationp. 210
Documentationp. 211
Before Documentationp. 211
During Documentationp. 212
After Documentationp. 213
Legal Issuesp. 214
Monitoringp. 214
Evidence Collectionp. 214
Checklist: Key Points in Incident Responsep. 215
13 Developing Contingency Plansp. 217
Defining Disastersp. 218
Identifying Critical Systems and Datap. 221
Business Impact Analysisp. 221
The Interview Processp. 223
Preparednessp. 223
Risk Analysis Itemsp. 224
Inventoryp. 224
Fundingp. 226
Justificationp. 227
Allocation of Fundsp. 227
Interorganizational Cooperation and Corporate Politicsp. 228
Putting the Recovery Team and Steering Committee Togetherp. 228
General Proceduresp. 230
Backups and Tape Storagep. 231
Resourcesp. 233
Checklist: Key Points for Contingency Plansp. 234
14 Responding to Disastersp. 235
Reality Checkp. 236
First Things Firstp. 236
Damage Assessmentp. 237
Defining Authority and the Teamp. 238
Assembling the Teamp. 238
Assessing Available Skillsp. 240
Setting Initial Prioritiesp. 240
Setting Goalsp. 241
Following or Not Following the Planp. 241
Phases of a Disasterp. 242
Responsep. 242
Resumptionp. 244
Recoveryp. 246
Restorationp. 248
Checklist: Key Points in Disaster Responsep. 249
Part V Appendixes
A Handling Auditsp. 253
Being Part of the Teamp. 254
Information Gatheringp. 254
Audit Reportp. 255
Audit Responsep. 256
Internal Auditsp. 256
Regularly Scheduled Auditsp. 257
Audits in Response to a Problemp. 257
External Auditsp. 258
Financial Auditsp. 258
SAS-70p. 260
Security's Response to the Auditp. 264
Checklist: Key Points in Handling Auditsp. 265
B Outsourcing Securityp. 267
Services to Outsourcep. 268
"Technical" Security Servicesp. 269
"People" Security Servicesp. 269
Choosing What to Outsourcep. 270
Reasons for Outsourcingp. 270
Costs Involved in Outsourcingp. 271
Back to Risk Managementp. 272
Choosing a Vendorp. 273
Servicesp. 273
Pricep. 274
Other Issuesp. 274
Working with the Vendorp. 276
Day-to-Day Interactionp. 276
Setting Expectationsp. 276
Managing Riskp. 277
Checklist: Key Points in Outsourcingp. 277
C Managing New Security Projectsp. 279
Defining Requirementsp. 280
Security Requirementsp. 280
Fail-over Requirementsp. 281
Performance Requirementsp. 281
Manageability Requirementsp. 282
Integration Requirementsp. 283
Writing the RFPp. 283
RFP Requirementsp. 284
RFP Conditions of Acceptancep. 284
Evaluating Responsesp. 284
Technical Responsesp. 284
Non-technical Responsesp. 286
Tradeoffsp. 286
Choosing the Vendorp. 286
Developing New Security Projects Internallyp. 287
Integrating the Products with the Organizationp. 287
Technology Integrationp. 287
Procedural Integrationp. 288
Security Product Integrationp. 288
Checklist: Key Points in Deploying New Security Technologyp. 289
Indexp. 291