• Complain

Aaron Woody - Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Here you can read online Aaron Woody - Enterprise Security: A Data-Centric Approach to Securing the Enterprise full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Packt Publishing, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Aaron Woody Enterprise Security: A Data-Centric Approach to Securing the Enterprise
  • Book:
    Enterprise Security: A Data-Centric Approach to Securing the Enterprise
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2013
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Enterprise Security: A Data-Centric Approach to Securing the Enterprise: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn enterprise information security challenges and roadmap to success.

In Detail

Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.

Enterprise Security: A Data-Centric Approach to Securing the Enterprise will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD.

Enterprise Security: A Data-Centric Approach to Securing the Enterprise will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.

This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security.

This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.

This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.

What you will learn from this book

  • Enterprise information security challenges and roadmap to success.
  • Data-centric security architecture.
  • Applying security through policies, standards, and processes.
  • Basics of risk analysis, deciding what is valuable and needs to be secured.
  • Layered security approach from data to network edge.
  • Securing wireless implementations.
  • Managing the human element of security through awareness.
  • Security monitoring and incident management.
  • Learn sample forms and process flows for quick and easy use.

Approach

Its a reference guide to enterprise security programs.

Aaron Woody: author's other books


Who wrote Enterprise Security: A Data-Centric Approach to Securing the Enterprise? Find out the surname, the name of the author of the book and a list of all author's works by series.

Enterprise Security: A Data-Centric Approach to Securing the Enterprise — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Enterprise Security: A Data-Centric Approach to Securing the Enterprise

Copyright 2013 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

First published: February 2013

Production Reference: 1120213

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham B3 2PB, UK.

ISBN 978-1-84968-596-2

www.packtpub.com

Cover Image by Artie Ng (<>)

Credits

Author

Aaron Woody

Reviewers

Lee Allen

Shon Robinson

Acquisition Editor

Mary Jasmine Nadar

Lead Technical Editor

Susmita Panda

Technical Editors

Worrell Lewis

Charmaine Pereira

Pooja Prakashan

Lubna Shaikh

Manmeet Singh Vasir

Project Coordinators

Priya Sharma

Esha Thakker

Proofreader

Bernadette Watkins

Indexer

Hemangini Bari

Graphics

Sheetal Aute

Valentina D'silva

Aditi Gajjar

Production Coordinator

Shantanu Zagade

Cover Work

Shantanu Zagade

About the Author

Aaron Woody is an expert in information security with over 15 years of experience across several industry verticals. His experience includes securing some of the largest enterprises in the world. Currently, he is a Security Consultant in the public sector. He is also a speaker and active instructor teaching hacking and forensics, and maintains a blog n00bpentesting.com.

Aaron can also be followed on twitter at @shai_saint. He will be launching a companion website (>.

I sincerely thank my wife Melissa and my children, Alexis and Elisa, for sharing me with this project.

About the Reviewers

Lee Allen is currently the Vulnerability Management Program Lead for one of the Fortune 500 companies. He is also the owner of MiDGames.com that is dedicated to bridging the gap between learning and fun, by providing 3D video games that reinforce and teach complex subjects such as Linux command line and penetration testing skills.

Lee is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide , Packt Publishing .

I would like to thank my wife Kellie and our children for allowing me the time needed to review this book. I would also like to thank Aaron Woody for allowing me to be a part of this work. This is an excellent book that contains information that every security professional should know. Aaron does an excellent job of making the knowledge available in an easy to understand and comprehensive manner. I would also like to thank George and Helen Slocum; without your encouragement and support throughout the years, I would never have chased my dreams.

Shon Robinson has been working in IT for 17 years, with 15 of these spent dealing with various aspects of the security field. Over the years, he has worked for a large financial services company in a number of roles including securing the online banking platform and performing application vulnerability assessments across all lines of business applications. Currently, he is a Principal Consultant for a business security company. He has also been a reviewer for Hakin9 since its first issues.

In addition to an MBA and Master of Theological Studies, Shon currently holds a number of active certifications including CISSP, ISSAP, ISSMP, CISA, CISM, CRISC, CEH, and a number of others on security, application, and operating systems.

In his copious free time, Shon tries to help teach the Central Ohio ISSA CISSP prep class.

I would like to thank Aaron for recommending me as a reviewer. I have, even after all these years, been able to learn more about security architecture from the experience. I would especially like to thank my wife, Tammy, who has been a supportive partner and inspiration in life even when I make her life difficult; and my son, Jesse, who is my joy and reminds me daily to be thankful for and enjoy every second.

www.packtpub.com
Support files, e-books, discount offers, and more

You might want to visit www.packtpub.com for support files and downloads related to your book.

Did you know that Packt offers e-book versions of every book published, with PDF and ePub files available? You can upgrade to the e-book version at > for more details.

At www.packtpub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and e-books.

httppacktlibpacktpubcom Do you need instant solutions to your IT - photo 1

http://packtlib.packtpub.com

Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read, and search across Packt's entire library of books.

Why Subscribe?
  • Fully searchable across every book published by Packt
  • Copy and paste, print and bookmark content
  • On demand and accessible via web browser
Free Access for Packt account holders

If you have an account with Packt at www.packtpub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.

Instant Updates on New Packt Books

Get notified! Find out when new books are published by following @PacktEnterprise on Twitter, or the Packt Enterprise Facebook page.

This book is dedicated to my grandmother Helen L. Woody (1932 2001).

Preface

Information security in the enterprise is challenging and has been considered a roadblock to enterprise innovation and use of new services such as cloud and bring your own device (BYOD). One of the primary reasons for this is the paradigm from which information security is being approached in today's ever evolving and agile businesses. Strict security requirements as an overlay to a perimeter-focused network architecture does not adequately secure enterprise data, failing the agile enterprise.

This book covers the current state of enterprise security and a new model for implementing security in the enterprise. Data-centric security architecture is introduced in the context of a layered security approach for end-to-end security. By looking at each component of the data-centric architecture, the realization of applying these concepts to information security creates a new paradigm to operate from where information security is agile and becomes a business enablement process supporting the latest trends in business such as cloud and BYOD.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Enterprise Security: A Data-Centric Approach to Securing the Enterprise»

Look at similar books to Enterprise Security: A Data-Centric Approach to Securing the Enterprise. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Enterprise Security: A Data-Centric Approach to Securing the Enterprise»

Discussion, reviews of the book Enterprise Security: A Data-Centric Approach to Securing the Enterprise and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.