computersecurityhandbook.com
Home
>
Fourth Edition
> Chapter 21
Home
by Author
Fourth Edition
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Chapter 22
Chapter 23
Chapter 24
Chapter 25
Chapter 26
Chapter 27
Chapter 28
Chapter 29
Chapter 30
Chapter 31
Chapter 32
Chapter 33
Chapter 34
Chapter 35
Chapter 36
Chapter 37
Chapter 38
Chapter 39
Chapter 40
Chapter 41
Chapter 42
Chapter 43
Chapter 44
Chapter 45
Chapter 46
Chapter 47
Chapter 48
Chapter 49
Chapter 50
Chapter 51
Chapter 52
Chapter 53
Chapter 54
by Section
Services
About this site
Chapter 21 –
Protecting Internet-Visible Systems
Robert Gezelter, CDP
Chapter Contents:
21.1
Introduction
21.1.1
Not Solely a Technical Issue
21.1.2
Ubiquitous Internet Protocol (IP) Networking
21.1.3
Internal Partitions
21.1.4
Critical Availability
21.1.5
Accessibility
21.1.6
Appropriate Responses to Attacks
21.1.7
Counter-Battery
21.1.8
Protecting Employees
21.2
Technical Issues
21.2.1
Inside/Outside
21.2.2
Hidden Subnets
21.2.3
What Need Be Exposed?
21.2.4
Multiple Security Domains
21.2.5
Compartmentalization
21.2.6
Need to Access
21.2.7
Accountability
21.2.8
Read-Only File Security
21.2.9
Exposures
21.2.10
Going Offline
21.2.11
Auditing
21.2.12
Planning
21.2.13
Site Hardening
21.2.14
Site Dispersion
21.2.15
Benefits and Drawbacks of Hardening and Dispersion
21.3
Application Service Providers
21.4
Summary
21.5
References
21.6
For Further Reading
Chapters Cross Referenced:
Chapter 11 – Denial-of-Service Attacks
Chapter 14 – Physical Threats to the Information Infrastructure
Chapter 15 – Protecting the Information Infrastructure
Chapter 16 – Identification and Authentication
Chapter 20 – Firewalls and Proxy Servers
Chapter 22 – Protecting Web Sites
Chapter 36 – Auditing Computer Security
Chapter 40 – Computer Emergency Quick-Response Teams
Chapter 42 – Business Continuity Planning
Chapter 47 – Risk Assessment and Risk Management
Chapter 49 – Medical Records Security
Chapter 52 – Privacy in Cyberspace
Chapter 54 – The Future of Information Security
Please report problems to the webmaster at:
webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved