Security Threat Mitigation and Response
Home > Computing and Information Technology > Computer security > Privacy and data protection > Security Threat Mitigation and Response: Understanding Cisco Security MARS
Security Threat Mitigation and Response: Understanding Cisco Security MARS

Security Threat Mitigation and Response: Understanding Cisco Security MARS


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System   Dale Tesch Greg Abelar   While it is commonly understood that deploying network security devices is critical to the well-being of an organization’s systems and data, all too often companies assume that simply having these devices is enough to maintain the integrity of network resources. To really provide effective protection for their networks, organizations need to take the next step by closely examining network infrastructure, host, application, and security events to determine if an attack has exploited devices on their networks.   Cisco® Security Monitoring, Analysis, and Response System (Cisco Security MARS) complements network and security infrastructure investment by delivering a security command and control solution that is easy to deploy, easy to use, and cost-effective. Cisco Security MARS fortifies deployed network devices and security countermeasures, empowering you to readily identify, manage, and eliminate network attacks and maintain compliance.   Security Threat Mitigation and Response helps you understand this powerful new security paradigm that reduces your security risks and helps you comply with new data privacy standards. This book clearly presents the advantages of moving from a security reporting system to an all-inclusive security and network threat recognition and mitigation system. You will learn how Cisco Security MARS works, what the potential return on investment is for deploying Cisco Security MARS, and how to set up and configure Cisco Security MARS in your network.   “Dealing with gigantic amounts of disparate data is the next big challenge in computer security; if you’re a Cisco Security MARS user, this book is what you’ve been looking for.” –Marcus J. Ranum, Chief of Security, Tenable Security, Inc.   Dale Tesch is a product sales specialist for the Cisco Security MARS product line for the Cisco Systems® United States AT Security team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005. Since then, he has had the primary responsibilities of training the Cisco sales and engineering team on SIM systems and Cisco Security MARS and for providing advanced sales support to Cisco customers.    Greg Abelar has been an employee of Cisco Systems since December 1996. He was an original member of the Cisco Technical Assistance Security team, helping to hire and train many of the team’s engineers. He has held various positions in both the Security Architecture and Security Technical Marketing Engineering teams at Cisco.   Understand how to protect your network with a defense-in-depth strategy Examine real-world examples of cost savings realized by Cisco Security MARS deployments Evaluate the technology that underpins the Cisco Security MARS appliance Set up and configure Cisco Security MARS devices and customize them for your environment Configure Cisco Security MARS to communicate with your existing hosts, servers, network devices, security appliances, and other devices in your network Investigate reported threats and use predefined reports and queries to get additional information about events and devices in your network Use custom reports and custom queries to generate device and event information about your network and security events Learn firsthand from real-world customer stories how Cisco Security MARS has thwarted network attacks   This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.   Category: Cisco Press–Security Covers: Security Threat Mitigation    

Table of Contents:
Foreword Introduction Part I          The Security Threat Identification and Response Challenge Chapter 1   Understanding SIM and STM Understanding Security Information Management Legacy Threat Response Understanding Security Information Management Meeting the Needs of Industry Regulations Understanding the Unified Security Platform Introduction to Security Threat Mitigation Leveraging Your Existing Environment Summary Chapter 2   Role of CS-MARS in Your Network The Self-Defending Network and the Expanding Role of CS-MARS Understanding the Self-Defending Network Enhancing the Self-Defending Network CS-MARS: Filling the Gaps in the Self-Defending Network CS-MARS as an STM Solution Reasons for an STM Day-Zero Attacks, Viruses, and Worms Monitoring and Enforcing Security Policy Insight, Integration, and Control of Your Network Auditing Controls Monitoring Access Control Using CS-MARS to Justify Security Investment The STM Deployment Summary Chapter 3   Deriving TCO and ROI Fact, FUD, and Fiction FUD vs. Reality Real Threats to Enterprises Attack Impact Tangible Costs Intangible Costs Emerging Threats Impact of Attacks and Probability of Reoccurrence Total Cost of Ownership Using CS-MARS to Ensure ROI and Protect Your Assets Cost of Recovery Without CS-MARS Cost of Recovery Using CS-MARS Summary Part II         CS-MARS Theory and Configuration Chapter 4   CS-MARS Technologies and Theory Technical Introduction to the CS-MARS Appliance CS-MARS at a Glance CS-MARS Product Portfolio and Hardware Specifications CS-MARS Terminology CS-MARS Technologies Database Storage and Utilization CS-MARS Database Structure CS-MARS Data Archiving Network Topology Used for Forensic Analysis CS-MARS Topology Information Understanding Attack Diagrams and Attack Vectors CS-MARS Network Discovery NetFlow in CS-MARS Understanding NetFlow Using NetFlow in CS-MARS Conducting Behavioral Profiling Using CS-MARS Positive Alert Verification and Dynamic Vulnerability Scanning Understanding False Positives Understanding Vulnerability Analysis Methodology of Communication Communication Methods Use of Agents Incident Reporting and Notification Methods Summary Chapter 5   CS-MARS Appliance Setup and Configuration Deploying CS-MARS in Your Network Network Placement CS-MARS Security Hardening CS-MARS Initial Setup and Quick Install Complete the Initial CS-MARS Configuration Enter System Parameters Using the CS-MARS Web Interface CS-MARS Reporting Device Setup Adding Devices Creating Users and Groups Configuring NetFlow and Vulnerability Scanning Configuring CS-MARS System Maintenance Configuring System Parameters Summary Chapter 6         Reporting and Mitigative Device Configuration Identifying CS-MARS–Supported Devices Types of Devices and the Information They Provide The Difference Between Reporting and Mitigation Devices Table of CS-MARS–Supported Devices Configuring Devices to Communicate with CS-MARS Configuring Routers Configuring Switches Configuring Firewalls Enabling IDS and IPS in a CS-MARS Environment Operating Systems and Web Servers Configure VPN 3000 Configure VPN 3000 Series Concentrators to Communicate with CS-MARS Add VPN 3000 Series Concentrators to the CS-MARS Device Database Antivirus Hosts and Servers Database Servers Oracle Summary Part III        CS-MARS Operation Chapter 7   CS-MARS Basic Operation Using the Summary Dashboard, Network Status Graphs, and My Reports Tab Reading Incidents and Viewing Path Information Using the HotSpot Graph and Attack Diagram Interpreting Events and NetFlow Graphs and False Positive Graphs Understanding Data on the Information Summary Column Interpreting the X, Y Axis Graphs Using the Network Status Tab Using My Reports Using the Incidents Page Using the Incidents Page Using the Incident ID to View Data Simple Queries Setting the Query Type Instant Queries On-Demand Queries and Manual Queries Summary Chapter 8   Advanced Operation and Security Analysis Creating Reports Report Formats Using Predefined Reports Creating Custom Reports Methods of Report Delivery Creating Rules The Two Types of Rules Active vs. Inactive Rules Creating Custom System Inspection Rules Using the Query Tool to Create a Rule Complex and Behavioral Rule Creation Summary Part IV       CS-MARS in Action Chapter 9   CS-MARS Uncovered State Government Detection Action Resolution Large University Detection Action Resolution Hospital Detection Action Resolution Enterprise Financial Company Detection Action Resolution Small Business Detection Action Resolution Summary Part VAppendixes Appendix A      Useful Security Websites Security Links and Descriptions General Security Governmental Security Controls and Information Tools and Testing Cisco Security Sites Appendix B      CS-MARS Quick Data Sheets Quick Hardware and Protocol Specifications for CS-MARS CS-MARS Technology Facts NetFlow Platform Guide  NetFlow Performance Information NetFlow Memory Allocation Information V4.1 Product Support List Appendix C      CS-MARS Supplements CS-MARS Evaluation Worksheet Security Threat Mitigation Technical Evaluation Worksheet Sample Seed File ISS Configuration Scripts ISS Network Sensor ISS Server Sensor IOS and CATOS NetFlow Quick Configuration Guide Configuring NetFlow Export on a Cisco IOS Device Configuring NetFlow on a Cisco CATOS Switch Appendix D      Command-Line Interface Complete Command Summary CS-MARS Maintenance Commands Appendix E      CS-MARS Reporting CS-MARS V4.1 Reports Appendix F      CS-MARS Console Access Using Serial Console Access Appendix G     CS-MARS Check Point Configuration Configuring Check Point NG FP3/AI and CS-MARS Check Point–Side Configuration CS-MARS Configuration Modifying the Communications to the SmartDashboard/CMA Known Open and Closed Issues Configuring Check Point Provider-1 R60 Index

About the Author :
Greg Abelar has been an employee of Cisco Systems, Inc., since December 1996. He was an original member of the Cisco Technical Assistance Security Team, helping to hire and train many of the engineers. He has held various positions in both the Security Architecture and Security Technical Marketing Engineering teams at Cisco. Greg is the primary founder and project manager of Cisco’s Written CCIE Security exam. Before his employment at Cisco, Greg worked at Apple Computer, Inc., for eight years as a TCP/IP, IPX, and AppleTalk cross-platform escalation engineer. At Apple, he also served as a project leader in the technical platform deployment for the Apple worldwide network. From 1991 to 1996, Greg worked as both a systems programmer and an IT manager for Plantronics, Inc. From 1985 to 1991, Greg was employed by the County Bank of Santa Cruz, where he worked as an applications programmer. This book is Greg’s second authorship of a technical publication; the first was a very successful and uniquely presented publication, also from Cisco Press, titled Securing Your Business with Cisco ASA and PIX Firewalls (2005). Besides authoring Cisco Press publications, he was a co-author of Version 2 of the premier Internet security architecture whitepaper, “SAFE: A Security Blueprint for Enterprise and Networks.” His credentials also include technical editing of five security publications by Cisco Press. Greg lives with his wife, Ellen, and three children, Jesse, Ethan, and Ryan, in Aptos, California.   Visit Greg's blog at http://security1a.blogspot.com/.   Dale Tesch is a product sales specialist for the CS-MARS product line for Cisco Systems’ US AT Security Team. Dale came to Cisco Systems through the acquisition of Protego Networks in February 2005 and has held the primary responsibilities of training Cisco’s Sales and Engineering team on SIMS and CS-MARS and providing advanced sales support to Cisco customers. While at Protego Networks, he was responsible for sales and engineering in parts of the United States, Canada, and Europe. Before Protego Networks, he was an AT security engineer for Cisco Systems’ U.S. Channels Organization. Dale was the founding team leader of the U.S. Channels Security Technical Advisory Team and came to Cisco originally in 2000. Before Cisco, he was the senior systems engineer at Vitts Networks, a New England–based DSL provider. Previously, Dale spent ten years in the U.S. Navy Submarine Force and is a veteran of Desert Storm. He lives in Madbury, New Hampshire, with his fiancée, Janet, and their six children, Scott, Alex, Isabella, Douglas, Andrew, and Kristyn. Dale has published several articles on SIMs, security policy, and wireless security and has been a technical editor for Cisco Press. Dale also speaks as an industry expert and trainer for various technical seminars. He holds CCNP and CISSP certifications and is a graduate of Southern New Hampshire University.


Best Sellers


Product Details
  • ISBN-13: 9781587054082
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Sub Title: Understanding Cisco Security MARS
  • ISBN-10: 1587054086
  • Publisher Date: 28 Sep 2006
  • Binding: Digital download
  • No of Pages: 404
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Threat Mitigation and Response: Understanding Cisco Security MARS
Pearson Education (US) -
Security Threat Mitigation and Response: Understanding Cisco Security MARS
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Threat Mitigation and Response: Understanding Cisco Security MARS

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!