Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $35.99
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
11Activity
P. 1
Security Monitoring

Security Monitoring

Ratings:

5.0

(2)
|Views: 675 |Likes:

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.

Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help you:

Develop Policies: define rules, regulations, and monitoring criteria Know Your Network: build knowledge of your infrastructure with network telemetry Select Your Targets: define the subset of infrastructure to be monitored Choose Event Sources: identify event types needed to discover policy violations Feed and Tune: collect data, generate alerts, and tune systems using contextual information Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events

Security Monitoring illustrates these steps with detailed examples that will help you learn to select and deploy the best techniques for monitoring your own enterprise network.

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.

Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help you:

Develop Policies: define rules, regulations, and monitoring criteria Know Your Network: build knowledge of your infrastructure with network telemetry Select Your Targets: define the subset of infrastructure to be monitored Choose Event Sources: identify event types needed to discover policy violations Feed and Tune: collect data, generate alerts, and tune systems using contextual information Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events

Security Monitoring illustrates these steps with detailed examples that will help you learn to select and deploy the best techniques for monitoring your own enterprise network.

More info:

Publish date: Feb 9, 2009
Added to Scribd: Sep 05, 2011
Copyright:Traditional Copyright: All rights reservedISBN:9780596551001
List Price: $35.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

08/19/2014

248

9780596551001

$35.99

USD

pdf

You're Reading a Free Preview
Pages 10 to 40 are not shown in this preview.
You're Reading a Free Preview
Pages 50 to 159 are not shown in this preview.
You're Reading a Free Preview
Pages 169 to 227 are not shown in this preview.
You're Reading a Free Preview
Pages 238 to 248 are not shown in this preview.

Activity (11)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Monika Burgess liked this
Phuong Pham liked this
azrana1 liked this
Kishan Patel liked this
Michael liked this
ms13395792 liked this
Fraidi Asisi liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->