computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 21
Chapter 21 –  Protecting Internet-Visible Systems
     Robert Gezelter, CDP

Chapter Contents:

   21.1    Introduction
   21.1.1    Not Solely a Technical Issue
   21.1.2    Ubiquitous Internet Protocol (IP) Networking
   21.1.3    Internal Partitions
   21.1.4    Critical Availability
   21.1.5    Accessibility
   21.1.6    Appropriate Responses to Attacks
   21.1.7    Counter-Battery
   21.1.8    Protecting Employees
   21.2    Technical Issues
   21.2.1    Inside/Outside
   21.2.2    Hidden Subnets
   21.2.3    What Need Be Exposed?
   21.2.4    Multiple Security Domains
   21.2.5    Compartmentalization
   21.2.6    Need to Access
   21.2.7    Accountability
   21.2.8    Read-Only File Security
   21.2.9    Exposures
   21.2.10    Going Offline
   21.2.11    Auditing
   21.2.12    Planning
   21.2.13    Site Hardening
   21.2.14    Site Dispersion
   21.2.15    Benefits and Drawbacks of Hardening and Dispersion
   21.3    Application Service Providers
   21.4    Summary
   21.5    References
   21.6    For Further Reading

Chapters Cross Referenced:
  Chapter 11 –  Denial-of-Service Attacks
  Chapter 14 –  Physical Threats to the Information Infrastructure
  Chapter 15 –  Protecting the Information Infrastructure
  Chapter 16 –  Identification and Authentication
  Chapter 20 –  Firewalls and Proxy Servers
  Chapter 22 –  Protecting Web Sites
  Chapter 36 –  Auditing Computer Security
  Chapter 40 –  Computer Emergency Quick-Response Teams
  Chapter 42 –  Business Continuity Planning
  Chapter 47 –  Risk Assessment and Risk Management
  Chapter 49 –  Medical Records Security
  Chapter 52 –  Privacy in Cyberspace
  Chapter 54 –  The Future of Information Security

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved