Threats come from a unique variety of sources. Insider threats, as well as malicious hackers are not only difficult to detect and prevent, but many times they have been using resources without the business even aware they are there.
This IBM Redbook deliverable describes the various threats and how to prevent them through a distributed array of protection technologies and services. We take a closer look at preemptive security that is designed to stop Internet threats before they can impact networks. We also explore technologies that can help complement threat mitigation techniques such as identity management solutions as well as network mapping tools and behavior techniques.
This book is a valuable resource for senior officers, architects as well as C level executives who want to understand and implement enterprise security following architectural guidelines.
Table of Contents
Part 1. Terminology and infrastructure
- Chapter 1. Business context
- Chapter 2. Common security architecture and network models
- Chapter 3. IT threat mitigation concept.
Part 2. Threat mitigation components
- Chapter 4. Security intelligence and research
- Chapter 5. Centralized Management
- Chapter 6. Network intrusions and anomalies
- Chapter 7. Vulnerability management
- Chapter 8. E-mail, instant messaging and Web content security
- Chapter 9. Host security solutions
- Chapter 10. Managed Security Services
Part 3. Business scenarios
- Chapter 11. Threat mitigation deployment guide
- Chapter 12. Business scenarios
Part 4. Appendixes
- Appendix A. Method for Architecting Secure Solutions
- Appendix B. Base technologies