Planning for Survivable Networks

Free Download

Authors:

Edition: 1

ISBN: 9780471232841, 047123284X

Size: 6 MB (6221499 bytes)

Pages: 223/223

File format:

Language:

Publishing Year:

Category:

Annlee A. Hines9780471232841, 047123284X

Keep your network safe from security disasters with a dependable recovery strategyCompanies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.In the information-packed pages of this book, Annlee Hines shares her unique and diverse work experience. She explains that the first thing you need, whatever your business may be, is reliable information and an idea of what you need to protect, as well as what you are protecting it from. She then dives into a discussion of how much you can expect to spend depending on what kind of security your network requires. She also delves into addressing the variables that determine why your needs will not necessarily be the needs of your closest competitor.Most importantly, Hines writes this valuable material realizing that you already know how to do your job – it’s just that you now have to reconsider just how vulnerable the information nervous system of your company really is.From major terrorist attacks to natural disasters to hackers, Annlee Hines explores how to defend your network and reviews such topics as:* Probes, viruses, worms, and Trojan horses* The most common vulnerabilities networks face* Understanding and justifying costs* Lessons to be learned from successful defense strategies* Preparing for the worst and the requirements of network survival* Remedies, cyber recovery, and restoration

Table of contents :
Cover……Page 1
Table of Contents……Page 2
Planning for Survivable NetworksÅ Ensuring Business Continuity……Page 7
Foreword……Page 9
Network Continuity……Page 11
Define Survival……Page 12
In Defense of Paranoia……Page 13
By the Numbers……Page 14
Think the Unthinkable……Page 15
Plan to Survive……Page 16
Choice versus Chance……Page 17
Overview……Page 18
Immature Hands……Page 19
Deliberate Attackers……Page 23
Mature Hands……Page 29
Externalities……Page 34
TCP/IP……Page 35
Probes……Page 41
Viruses……Page 43
Worms……Page 44
Trojan Horses……Page 45
Denial of Service/Distributed DoS……Page 46
Sample Attack……Page 47
Means……Page 50
Opportunity……Page 51
System Is Not a Dirty Word……Page 53
Bugs……Page 54
Top General Vulnerabilities……Page 55
Top Windows Vulnerabilities……Page 59
Top UNIX Vulnerabilities……Page 60
Common Threads……Page 62
Topology……Page 63
Defense in Depth……Page 66
The Price of Defense……Page 68
Costs……Page 69
Converged Networks……Page 70
The Catch……Page 72
Operator Error……Page 73
A Classic Disaster……Page 74
A Trophy Property……Page 76
Train the Way You Will Fight……Page 77
A Scarcity of Heroes……Page 78
Organization……Page 79
Attitude……Page 80
A Plan……Page 81
Adequate Warning……Page 82
Modest Warning……Page 86
No Real Warning at All……Page 88
It’s a Scary World, Isn’t It?……Page 93
Operational Continuity……Page 94
Getting the People Out……Page 100
Network Assets……Page 101
Example: Data Services……Page 103
Lessons Actually Learned……Page 108
Kudos……Page 110
Extending the Example……Page 111
Overview……Page 113
Bombs……Page 115
Sabotage……Page 116
CBR Attacks……Page 117
World Trade Center Examples……Page 119
Successes……Page 120
Lost Access……Page 124
Less Than Successes……Page 126
Cyber-Kidnapping……Page 129
Easier Targets……Page 130
Combined Attacks……Page 131
Unfortunate Opportunities……Page 133
Reportable Outages: They’re Everywhere……Page 134
Route Diversity in Reality……Page 135
Fire……Page 136
Required Evacuations……Page 137
Yours……Page 138
Theirs……Page 140
Equipment 1, Plan 0……Page 144
Solving the Wrong Problem……Page 145
What Must Roll Downhill……Page 147
Survival Requirements……Page 149
Network Continuity Requirements……Page 150
Threat Analysis……Page 155
Operational Analysis……Page 157
Fixes……Page 158
Remedies……Page 160
Procedures……Page 161
Survivability Today……Page 162
Don’t Get Too Close……Page 163
Talk Is Cheap……Page 164
Trade-offs……Page 165
Operational Procedures……Page 167
Forensic Procedures……Page 168
Sustained Operations……Page 172
Restoration……Page 173
Undress Rehearsal……Page 175
Exercise Scenario 1: Cyber-Problems……Page 177
Exercise Scenario 2: Physical Problems……Page 178
Evolution……Page 179
Fixed and Variable Costs……Page 184
Direct Costs versus Indirect Costs……Page 185
Explicit and Implicit Costs……Page 186
Valid Comparisons……Page 187
Understanding Revenues……Page 188
Expected Values……Page 189
Presenting Your Case……Page 190
CDG Example……Page 192
Disaster Summary……Page 193
Alternatives Summary……Page 194
Finally……Page 196
Overview……Page 197
Basic Defenses You Must Implement……Page 198
Catastrophes Happen……Page 199
Your Recovery……Page 200
Systemic Behavior……Page 202
Standardization versus Resiliency……Page 203
Pay Me Now or Pay Me Later……Page 204
Earthquake Hazard……Page 206
Miscellaneous……Page 207
Terrorism……Page 208
Weather Planning……Page 209
Appendix B: Questions to Ask Yourself……Page 210
Survival Planning……Page 212
Recovery……Page 213
Appendix D: Post-Mortem Questions……Page 215
Appendix E: Time Value of Money……Page 216
A-L……Page 217
N-W……Page 218
List of Figures……Page 220
List of Tables……Page 222
List of Sidebars……Page 223

Reviews

There are no reviews yet.

Be the first to review “Planning for Survivable Networks”
Shopping Cart
Scroll to Top