Corporate Computer Security 4th Edition By Randy J. Boyle – Test Bank
Original price was: $35.00.$24.97Current price is: $24.97.
Format: Downloadable ZIP File
Resource Type: Test bank
Duration: Unlimited downloads
Delivery: Instant Download
ISBN Information:
- ISBN-10 : 0133545199
- ISBN-13 : 978-0133545197
Suitable for introductory courses in IT Security.
Diving deeply into enterprise strategies with a comprehensive technical approach to security tools, Corporate Computer Security provides both a strong business focus and in-depth technical insight into security mechanisms. This material equips students with the necessary IT security expertise for professional environments.
This edition emphasizes a more business-oriented perspective, integrating additional hands-on projects, discussions on wireless and data security, and real-world case studies.
Enhancing the teaching and learning process, this program offers the following benefits:
- Encouraging Practical Application: All chapters now include new hands-on projects utilizing cutting-edge software.
- Emphasis on Business Applications: This edition emphasizes the practical application of concepts in a business context, with a focus on securing corporate data systems rather than individual hosts.
- Keeping Content Relevant: Latest examples, exercises, and research findings are incorporated throughout the material.
Table of Contents
Chapter 1: The Landscape of Threats
1.1: Opening Remarks
1.2: Risk Factors concerning Employees
1.3: Unpacking Malicious Software
1.4: Understanding Hackers and Attacks
1.5: Overview of Criminal Activity
1.6: Considerations with Competitor Threats
1.7: Cyberwarfare and Cyberterrorism
1.8: Concluding Thoughts
Chapter 2: Strategic Planning and Policy Development
2.1: Initial Considerations
2.2: Compliance Regulations and Legal Obligations
2.3: Organizational Structure
2.4: Evaluation of Risks
2.5: Architecting Technical Safeguards
2.6: Implementing Policies
2.7: Governance Frameworks in Operation
2.8: Concluding Remarks
Chapter 3: Exploring Cryptography
3.1: Introduction to Cryptographic Measures
3.2: Insight into Symmetric Key Encryption Ciphers
3.3: Standards of Cryptographic Systems
3.4: Negotiating Protocols
3.5: Initial Authentication Procedures
3.6: Keys Establishment Techniques
3.7: Message Integrity Verification
3.8: Quantum Cryptography Implications
3.9: Discussion on Cryptographic Mechanisms
3.10: SSL/TLS Protocol Analysis
3.11: Understanding IPsec
3.12: Closing Observations
Chapter 4: Network Security Protocols
4.1: Initial Overview
4.2: Addressing DoS Threats
4.3: ARP Security Measures
4.4: Network Access Controls
4.5: Safeguarding Ethernet Networks
4.6: Strategies for Wireless Security
4.7: Summarizing Network Security Practices
Chapter 5: Implementing Access Controls
5.1: Starting Dialogues on Access Control
5.2: Physical Barriers and Security Measures
5.3: Password Best Practices
5.4: Utilizing Access Cards and Tokens
5.5: Evaluation of Biometric Authentication
5.6: Safer Cryptographic Authentication Methods
5.7: Discussion on Authorization Techniques
5.8: Auditing Access
5.9: Centralized Authentication Management
5.10: Directories and Identity Management
5.11: Conclusive Remarks on Access Control
Chapter 6: Effective Firewall Systems
6.1: Introduction to Firewall Technologies
6.2: Exploring Static Packet Filters
6.3: Enhanced Inspection Techniques
6.4: NAT Concepts
6.5: Application Proxies and Content Filters
6.6: Detecting Intrusions and Preventing Threats
6.7: Antivirus Filtering and Unified Threat Management
6.8: Architectural Variants in Firewalls
6.9: Managing Firewall Systems
6.10: Filtering Considerations
6.11: Concluding Firewall Strategies
Chapter 7: Strengthening Host Security
7.1: Beginning Insights
7.2: Key Operating Systems for Servers
7.3: Identifying and Patching Vulnerabilities
7.4: User and Group Management
7.5: Permission Configuration
7.6: Secure Password Generation
7.7: Vulnerability Assessment Procedures
7.8: Closing Commentary on Host Security
Chapter 8: Application Security Practices
8.1: Securing Applications
8.2: Ensuring Online Security
8.3: Combating Web-Based Attacks
8.4: Safeguarding Email Communications
8.5: Security within VoIP Systems
8.6: Considerations for Other User Applications
8.7: Summarizing Application Security
Chapter 9: Safeguarding Data
9.1: Beginning of Data Protections
9.2: Backup Strategies
9.3: Media Solutions and RAID Systems
9.4: Maintaining Secure Data Policies
9.5: Enhancing Database Security
9.6: Preventing Data Loss Incidents
9.7: Final Data Security Observations
Chapter 10: Responding to Incidents and Disasters
10.1: Emergency Situations
10.2: Procedures for Major Intrusions
10.3: Detecting Intrusions
10.4: Continuity Planning
10.5: Recovery Initiatives
10.6: Concluding Disaster Recovery Strategies
Appendices
A.1: Initial Insights
A.2: Network Overview
A.3: Protocols in Networks
A.4: Components of Standard Architectures
A.5: Models of Standards Architecture
A.6: Single-Network Standards
A.7: Interconnection Standards
A.8: Internet Protocol Fundamentals
A.9: Transport-Controlling Protocol
A.10: Connectionless Transmission Protocol
A.11: Administrative Protocols for TCP/IP
A.12: Application Layer Standards
A.13: Summary of Appendix Discussions
User Reviews
Be the first to review “Corporate Computer Security 4th Edition By Randy J. Boyle – Test Bank”
Original price was: $35.00.$24.97Current price is: $24.97.
There are no reviews yet.