Book description
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.
Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help you:
- Develop Policies: define rules, regulations, and monitoring criteria
- Know Your Network: build knowledge of your infrastructure with network telemetry
- Select Your Targets: define the subset of infrastructure to be monitored
- Choose Event Sources: identify event types needed to discover policy violations
- Feed and Tune: collect data, generate alerts, and tune systems using contextual information
- Maintain Dependable Event Sources: prevent critical gaps in collecting and monitoring events
Security Monitoring illustrates these steps with detailed examples that will help you learn to select and deploy the best techniques for monitoring your own enterprise network.
Publisher resources
Table of contents
-
Security Monitoring
- SPECIAL OFFER: Upgrade this ebook with O’Reilly
- Preface
- 1. Getting Started
- 2. Implement Policies for Monitoring
- 3. Know Your Network
-
4. Select Targets for Monitoring
- Methods for Selecting Targets
- Practical Considerations for Selecting Targets
- Recommended Monitoring Targets
- Choosing Components Within Monitoring Targets
- Blanco Wireless: Selecting Targets for Monitoring
- Conclusion
- 5. Choose Event Sources
- 6. Feed and Tune
-
7. Maintain Dependable Event Sources
- Maintain Device Configurations
- Monitor the Monitors
- Monitor Databases
- Automated System Monitoring
- System Monitoring for Blanco Wireless
- Conclusion
-
8. Conclusion: Keeping It Real
- What Can Go Wrong
- Case Studies
- Real Stories of the CSIRT
- Bare Minimum Requirements
- Conclusion
- A. Detailed OSU flow-tools Collector Setup
- B. SLA Template
- C. Calculating Availability
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with O’Reilly
Product information
- Title: Security Monitoring
- Author(s):
- Release date: February 2009
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596555450
You might also like
book
The Practice of Network Security Monitoring
Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional …
book
Applied Network Security Monitoring
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground …
book
Cyber Security, 2nd Edition
Cyber security has never been more essential than it is today, it’s not a case of …
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …