Security Monitoring with Cisco Security MARS
Home > Computing and Information Technology > Computer security > Privacy and data protection > Security Monitoring with Cisco Security MARS
Security Monitoring with Cisco Security MARS

Security Monitoring with Cisco Security MARS


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Security Monitoring with Cisco Security MARS   Threat mitigation system deployment   Gary Halleen Greg Kellogg   Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening.   Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors.   Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools.   “In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment.” —Ed Skoudis, Vice President of Security Strategy, Predictive Systems   Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful computer crimes conviction in the state of Oregon. Gary is a regular speaker at security events and presents at Cisco Networkers conferences.   Greg Kellogg is the vice president of security solutions for Calence, LLC. He is responsible for managing the company’s overall security strategy. Greg has more than 15 years of networking industry experience, including serving as a senior security business consultant for the Cisco Enterprise Channel organization. Additionally, Greg worked for Protego Networks, Inc. (where MARS was originally developed). There he was responsible for developing channel partner programs and helped solution providers increase their security revenue.   Learn the differences between various log aggregation and correlation systems Examine regulatory and industry requirements Evaluate various deployment scenarios Properly size your deployment Protect the Cisco Security MARS appliance from attack Generate reports, archive data, and implement disaster recovery plans Investigate incidents when Cisco Security MARS detects an attack Troubleshoot Cisco Security MARS operation Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices Manage groups of MARS controllers with global controller operations   This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.   Category: Cisco Press—Security Covers: Security Threat Mitigation    

Table of Contents:
Foreword Introduction Part I Introduction to CS-MARS and Security Threat Mitigation Chapter 1 Introducing CS-MARS Introduction to Security Information Management     The Role of a SIM in Today’s Network     Common Features for SIM Products     Desirable Features for SIM Products Challenges in Security Monitoring     Types of Events Messages Understanding CS-MARS     Security Threat Mitigation System     Topology and Visualization     Robust Reporting and Rules Engine     Alerts and Mitigation     Description of Terminology CS-MARS User Interface     Dashboard     Network Status     My Reports Summary Chapter 2 Regulatory Challenges in Depth Health Insurance Portability and Accountability Act of 1996 (HIPAA)     Who Is Affected by HIPAA?     What Are the Penalties for Noncompliance?     HIPAA Security Rule     HIPAA Security Rule and Security Monitoring Gramm-Leach-Bliley Act of 1999 (GLB Act)     Who Is Affected by the GLB Act?     What Are the Penalties for Noncompliance with GLB?     The GLB Act Safeguards Rule     The GLB Safeguards Rule and Security Monitoring The Sarbanes-Oxley Act of 2002 (SOX)     Who Is Affected by Sarbanes-Oxley?     What Are the Penalties for Noncompliance with Sarbanes-Oxley?     Sarbanes-Oxley Internal Controls Payment Card Industry Data Security Standard (PCI-DSS)     Who Is Affected by the PCI Data Security Standard?     What Are the Penalties for Noncompliance with PCI-DSS?     The PCI Data Security Standard     Compliance Validation Requirements Summary Chapter 3 CS-MARS Deployment Scenarios Deployment Types     Local and Standalone Controllers     Global Controllers Sizing a CS-MARS Deployment     Special Considerations for Cisco IPSs     Determining Your Events per Second     Determining Your Storage Requirements     Considerations for Reporting Performance     Considerations for Future Growth and Flood Conditions     Planning for Topology Awareness CS-MARS Sizing Case Studies     Retail Chain Example     State Government Example     Healthcare Example Summary Part II CS-MARS Operations and Forensics Chapter 4 Securing CS-MARS Physical Security Inherent Security of MARS Appliances Security Management Network MARS Communications Requirements Network Security Recommendations     Ingress Firewall Rules     Egress Firewall Rules     Network-Based IDS and IPS Issues Summary Chapter 5 Rules, Reports, and Queries Built-In Reports Understanding the Reporting Interface     Reporting Methods     The Query Interface Creating an On-Demand Report Batch Reports and the Report Wizard Creating a Rule     About Rules     Creating the Rule Creating Drop Rules     About Drop Rules     Creating the Drop Rule Summary Chapter 6 Incident Investigation and Forensics Incident Handling and Forensic Techniques     Initial Incident Investigation     Viewing Incident Details     Finishing Your Investigation False-Positive Tuning     Deciding Where to Tune     Tuning False Positives in MARS Summary Chapter 7 Archiving and Disaster Recovery Understanding CS-MARS Archiving     Planning and Selecting the Archive Server     Configuring the Archiving Server     Configuring CS-MARS for Archiving Using the Archives     Restoring from Archive     Restoring to a Reporting Appliance     Direct Access of Archived Events     Retrieving Raw Events from Archive Summary Part III CS-MARS Advanced Topics Chapter 8 Integration with Cisco Security Manager Configuring CS-Manager to Support CS-MARS Configuring CS-MARS to Integrate with CS-Manager Using CS-Manager Within CS-MARS Summary Chapter 9 Troubleshooting CS-MARS Be Prepared Troubleshooting MARS Hardware     Beeping Noises     Degraded RAID Array Troubleshooting Software and Devices     Unknown Reporting Device IP     Check Point or Other Logs Are Incorrectly Parsed     New Monitored Device Logs Still Not Parsed     How Much Storage Is Being Used, and How Long Will It Last?     E-Mail Notifications Sent to Admin Group Never Arrive     MARS Is Not Receiving Events from Devices Summary Chapter 10 Network Admission Control Types of Cisco NAC     NAC Framework Host Conditions     Understanding NAC Framework Communications Configuration of CS-MARS for NAC     Framework Reporting Information Available on CS-MARS Summary Chapter 11 CS-MARS Custom Parser Getting Messages to CS-MARS Determining What to Parse Adding the Device or Application Type Adding Log Templates     First Log Template     Second and Third Log Templates     Fourth and Fifth Log Templates     Additional Messages Adding Monitored Device or Software Queries, Reports, and Rules     Queries     Reports     Rules Custom Parser for Cisco CSC Module Summary Chapter 12 CS-MARS Global Controller Understanding the Global Controller Zones Installing the Global Controller     Enabling Communications Between Controllers     Troubleshooting Using the Global Controller Interface     Logging In to the Controller     Dashboard     Drilling Down into an Incident     Query/Reports     Local Versus Global Rules     Security and Monitor Devices     Custom Parser     Software Upgrades Global Controller Recovery Summary Part IV Appendixes Appendix A Querying the Archive Appendix B CS-MARS Command Reference Appendix C Useful Websites Index   1587052709   TOC   6/11/2007

About the Author :
Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems, remote access, and routing/switching technology. Gary is a CISSP and ISSAP and has been a technical editor for Cisco Press. Before working at Cisco, he wrote web-based software, owned an Internet service provider, worked in Information Technology at a college, and taught computer science courses. His diligence was responsible for the first successful computer crimes conviction in the state of Oregon. Gary is a regular speaker at security events, and he presents at Cisco Networkers conferences. He lives in Salem, Oregon, with his wife and children. Greg Kellogg is the vice president of security solutions for Calence, LLC, which is based out of Tempe, Arizona. He is responsible for managing the company’s overall security strategy, as well as developing new security solutions and service offerings, establishing strategic partnerships, managing strategic client engagements, and supporting business development efforts. Greg has more than 15 years of networking industry experience, including serving as a senior security business consultant for the Cisco Systems Enterprise Channel organization. While at Cisco, Greg helped organizations understand regulatory compliance, policy creation, and risk analysis to guide their security implementations. He was recognized for his commitment to service with the Cisco Technology Leader of the Year award. Additionally, Greg worked for Protego Networks, Inc. (where MARS was originally developed). While there, he was responsible for developing channel partner programs and helping solution providers increase their security revenue. Greg currently resides in Spring Branch, Texas, with his wife and four children.  


Best Sellers


Product Details
  • ISBN-13: 9781587054594
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • ISBN-10: 1587054590
  • Publisher Date: 06 Jul 2007
  • Binding: Digital download
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Monitoring with Cisco Security MARS
Pearson Education (US) -
Security Monitoring with Cisco Security MARS
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Monitoring with Cisco Security MARS

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!