Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
By Chris Fry and Martin Nystrom
5/5
()
Currently unavailable
Currently unavailable
About this ebook
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.
Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help you:
- Develop Policies: define rules, regulations, and monitoring criteria
- Know Your Network: build knowledge of your infrastructure with network telemetry
- Select Your Targets: define the subset of infrastructure to be monitored
- Choose Event Sources: identify event types needed to discover policy violations
- Feed and Tune: collect data, generate alerts, and tune systems using contextual information
- Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events
Security Monitoring illustrates these steps with detailed examples that will help you learn to select and deploy the best techniques for monitoring your own enterprise network.
Related to Security Monitoring
Related ebooks
HP NonStop Server Security: A Practical Handbook Rating: 0 out of 5 stars0 ratingsOperations Risk: Managing a Key Component of Operational Risk Rating: 4 out of 5 stars4/5Global Brand Integrity Management Rating: 0 out of 5 stars0 ratingsThe Ultimate Financial Security Survey Rating: 5 out of 5 stars5/5Troubleshooting Campus Networks: Practical Analysis of Cisco and LAN Protocols Rating: 4 out of 5 stars4/5CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance Rating: 5 out of 5 stars5/5A Systems Approach to Managing the Complexities of Process Industries Rating: 0 out of 5 stars0 ratingsOperations and Supply Management 4.0: Industry Insights, Case Studies and Best Practices Rating: 0 out of 5 stars0 ratingsApplication Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsApplication security in the ISO27001:2013 Environment Rating: 4 out of 5 stars4/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5The Micro Cap Investor: Strategies for Making Big Returns in Small Companies Rating: 0 out of 5 stars0 ratingsSuccessful Direct Marketing Methods Rating: 4 out of 5 stars4/5Fair Lending Compliance: Intelligence and Implications for Credit Risk Management Rating: 0 out of 5 stars0 ratingsOpen Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsPositive Alpha Generation: Designing Sound Investment Processes Rating: 0 out of 5 stars0 ratingsThe Fundamentals of Risk Measurement Rating: 0 out of 5 stars0 ratingsProduct Life Cycle Assessment to Reduce Health Risks and Environmental Impacts Rating: 0 out of 5 stars0 ratingsFinancial Analysis and Risk Management: Data Governance, Analytics and Life Cycle Management Rating: 0 out of 5 stars0 ratingsHandbook of Asset and Liability Management: From Models to Optimal Return Strategies Rating: 0 out of 5 stars0 ratingsRisk Management Technology in Financial Services: Risk Control, Stress Testing, Models, and IT Systems and Structures Rating: 0 out of 5 stars0 ratingsThe CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security Rating: 3 out of 5 stars3/5The Simple Rules of Risk: Revisiting the Art of Financial Risk Management Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Cases Studies and Solutions Rating: 5 out of 5 stars5/52015 Valuation Handbook: Industry Cost of Capital Rating: 0 out of 5 stars0 ratingsManaging Information Security Rating: 0 out of 5 stars0 ratingsASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem Design Solution Rating: 0 out of 5 stars0 ratings
Networking For You
A Beginner's Guide to Ham Radio Rating: 0 out of 5 stars0 ratingsNetworking All-in-One For Dummies Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCCNA Certification Study Guide, Volume 2: Exam 200-301 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5The Compete Ccna 200-301 Study Guide: Network Engineering Edition Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam Rating: 5 out of 5 stars5/5Cisco Networking All-in-One For Dummies Rating: 4 out of 5 stars4/5Raspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Network+ Certification Passport, Sixth Edition (Exam N10-007) Rating: 1 out of 5 stars1/5Microsoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Computer Networking: An introductory guide for complete beginners: Computer Networking, #1 Rating: 5 out of 5 stars5/5Networking For Dummies Rating: 5 out of 5 stars5/5Wireshark Essentials Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Quantum Computing For Dummies Rating: 0 out of 5 stars0 ratingsAWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam Rating: 0 out of 5 stars0 ratingsLearning Linux Shell Scripting Rating: 4 out of 5 stars4/5Emergency Preparedness and Off-Grid Communication Rating: 0 out of 5 stars0 ratingsStealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5The Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5
Reviews for Security Monitoring
2 ratings0 reviews