Cargando…

Advances in security information management : perceptions and outcomes /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Suárez de Tangil, Guillermo, Palomar, Esther
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Nova Publishers, [2013]
Colección:Computer science, technology and applications.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1162009242
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 130124t20132013nyua ob 001 0 eng
010 |a  2020677486 
040 |a DLC  |b eng  |e rda  |c DLC  |d VLY  |d E7B  |d YDXCP  |d N$T  |d OCLCF  |d EBLCP  |d AGLDB  |d OTZ  |d VTS  |d AU@  |d STF  |d N$T  |d AJS  |d OCLCO  |d OCLCQ 
019 |a 849920422  |a 851034703  |a 1058447273  |a 1119125336  |a 1158112886  |a 1158969613  |a 1160539320  |a 1187187238  |a 1249466306  |a 1257357845  |a 1298250843 
020 |a 9781624172212  |q ebook 
020 |a 1624172210 
020 |z 1624172040  |q hardcover 
020 |z 9781624172045  |q hardcover 
029 1 |a AU@  |b 000062325793 
029 1 |a CHNEW  |b 000604791 
029 1 |a DEBBG  |b BV043106260 
029 1 |a DEBSZ  |b 429940203 
035 |a (OCoLC)1162009242  |z (OCoLC)849920422  |z (OCoLC)851034703  |z (OCoLC)1058447273  |z (OCoLC)1119125336  |z (OCoLC)1158112886  |z (OCoLC)1158969613  |z (OCoLC)1160539320  |z (OCoLC)1187187238  |z (OCoLC)1249466306  |z (OCoLC)1257357845  |z (OCoLC)1298250843 
042 |a pcc 
050 0 0 |a QA76.9.A25 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Advances in security information management :  |b perceptions and outcomes /  |c Guillermo Suárez de Tangil and Esther Palomar, editors. 
264 1 |a New York :  |b Nova Publishers,  |c [2013] 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer science, technology and applications 
504 |a Includes bibliographical references and index. 
588 |a Description based on print version record and CIP data provided by publisher. 
546 |a English. 
505 0 |a ADVANCES IN SECURITY INFORMATION MANAGEMENT ; ADVANCES IN SECURITY INFORMATION MANAGEMENT ; CONTENTS ; PREFACE ; SECURITY INFORMATION AND EVENT MANAGEMENT SYSTEMS ... A NEED IN THE REAL WORLD; Abstract; 1. Introduction; 2. Security Evolution; 2.1. Attack Evolution; 2.2.Compliance; 3. Traditional Incident Handling Strategies; 3.1. Passive Tools; 3.1.1. IDS; 3.1.2. Operating System (OS) Detection; 3.1.3. User Identi cation; 3.2. Active Tools; 3.2.1. Firewalls; 3.2.2. Intrusion Prevention Systems; 3.2.3. Web Content Filtering; 3.2.4. Anti-Virus; 3.2.5. Web Application Firewalls. 
505 8 |a 3.2.6. Data or Information Leakage Prevention3.3. Proactive Tools; 3.3.1. Vulnerability Assessment; 3.3.2. Exploit Tools and Penetration Testing; 3.4. Attacking Tools; 4. Deployment and Use ofSecurity Tools; 4.1. Proper Deployment; 4.1.1. Input for the Tools; 4.1.2.Network Access Requirements; 4.2. Log Analysis; 5. Dealing with Information Overload; 5.1. Log Correlation Basis; 5.2. Actionable Data; 5.2.1. Individual High Value True Positives Pre-SIEM; 5.2.2. SIEM Correlated True Positives; 5.2.3. Dealing with False Positives; 5.2.4. Evaluating Effectiveness: Results and Stats from SIEM; 6. AccomplishingSIEM. 
505 8 |a 6.1.Company Rules6.2. Management Buy-In; 6.3. Requirements and Testing; 7. SIEM Speci c Requirements; 7.1. Dealing with Standard Logs; 7.1.1. Logs need to be correctly interpreted by SIEM; 7.1.2. Support; 7.2. SIEM Defaults: Rules and Parsers; 7.3. Customization; 7.3.1. Incidents; 7.3.2. Events; 7.3.3. Fixed Hardware and Software Architectures; 7.4. Physical and Logical Implementation; 7.5. Training; 8. Role Speci c Importance; 8.1. Managed Security Services; 8.1.1. Outsourced Security Management; 8.1.2. In-House Security Management; 8.2. Incident Handlers and Analysts; 8.2.1. Tracking and Reporting. 
505 8 |a 8.2.2. Analysts8.2.3. Incident Response; 9. Conclusion; References; SECURITY INFORMATION AND VULNERABILITY MANAGEMENT; Abstract; 1. Introduction; 2. Software Vulnerability Evaluation; 2.1. Security Risk Evaluation; 2.2. Vulnerability Monitoring; 2.3. Perimeter Security Traf c and Risk Monitoring; 2.4. Vulnerability Recovery; 3. Security Information and Event Management; 3.1. Log information quality; 3.2. Reliable sources of security advisories; 3.3. Accurac yof the asset inventory; 3.4. Vulnerability assessment; 3.5. Firewall change management; 4. Building blocks; 4.1. Building connector. 
505 8 |a 4.2. Building collector4.3. Adaptive ltering and correlation; 4.4. Correlation capability; 4.5. Correlation scenario; 5. Conclusion; A Advisory Information; A1. Secunia Sample Report; A2. Oval Sample Report; B Generic Advisory Report Taxonomy; B1. Asset Sample Report; B2. Vulnerability Scan Sample Report; B3. Application Log Sample Report; B4. Firewall Sample Report; References; TOWARD A MULTISTAGE ATTACK DETECTION FRAMEWORK; Abstract; 1. Introduction; 2. Attack Scenarios; 2.1. Analysis Methodology; 2.2. Scenario Alpha; 2.2.1. General Statistics; 2.2.2. Summary of Conversations; 2.2.3. In-depth Analysis. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |x Management. 
650 0 |a Data protection. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Suárez de Tangil, Guillermo. 
700 1 |a Palomar, Esther. 
776 0 8 |i Print version:  |t Advances in security information management  |d New York : Nova Publishers, [2013]  |z 9781624172045  |w (DLC) 2012040823 
830 0 |a Computer science, technology and applications. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=610654  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL3022303 
938 |a ebrary  |b EBRY  |n ebr10704271 
938 |a EBSCOhost  |b EBSC  |n 610654 
938 |a YBP Library Services  |b YANK  |n 10735536 
994 |a 92  |b IZTAP