Download Free Computer Books

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 24 September 2012

Preventing Good People From Doing Bad Things: Implementing Least Privilege

Posted on 12:55 by Unknown


In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into account the weakest link in their implementation: human nature. Despite all other efforts, people can sway from what they should be doing.

Preventing Good People from doing Bad Things drives that concept home to business executives, auditors, and IT professionals alike. Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsoft’s Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases.  

Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. The book also discusses the cost advantages of preventing good people from doing bad things. Each of the chapters emphasizes the need auditors, business executives, and IT professionals all have for least privilege, and discuss in detail the tensions and solutions it takes to implement this principle. Each chapter includes data from technology analysts including Forrester, Gartner, IDC, and Burton, along with analyst and industry expert quotations.

What you’ll learn

  • Why unlimited administration rights are a bad thing
  • Why least privileges is a good solution
  • Effective implementation of least privileges
  • Least privileges on Unix and Linux servers
  • Issues with Microsoft's Group Policy

Who this book is for

The audience is segmented into three separate categories, all of which are clearly addressed and weighed-in on in each chapter: the auditor, the businessman, and the IT professional.

Auditor

The first segment are the information technology security auditors. They are the ones responsible for the analysis of technical, physical, and administrative controls in the organization(s) whose security is in question. Their work includes the auditing of data center personnel, computer equipment, all policies and procedures, physical and environmental controls, and back-up procedures. Because their jobs so heavily rely on established protocols for the protection of sensitive information, this segment of the market will find this book a must-read. Their main concern is making sure the companies they are inspecting are in compliance with regulations and are taking the appropriate measures to secure their information and the users accessing them. They will learn how least privilege is the only way to fully satisfy government security regulations, and it will give them necessary and cutting-edge information on how to correctly perform their jobs.

Businessperson

The second segment are the businesspeople. They are the ones who run the companies requiring least privilege. These individuals are driven by the bottom line, and are ultimately concerned with spending and returns on investment. While they may be interested in security and realize its importance, the motivation behind any decisions is saving the company money. They need this book because it will clearly outline the financial benefits of implementing least privilege. It will explain that, from a business point of view, least privilege is the only way to eliminate the misuse of privilege and avoid the extensive costs of security breaches, expensive audits, help desk costs, and costly hours of IT troubleshooting. They will read it and use it as a reference as they prepare financially for a more secure IT environment.

IT Professional

The third and final segment are the IT professionals. They are the ones who appreciate security for security’s sake. They understand the implications of a noncompliant environment. They are on the forefront of the company’s information environment. They manage users and those users’ privileges. They download applications, grant privileges to users, process information, store information, program, install software, perform data management, network machines, and manage the networks they create. They need and will read this book because it will expand their understanding of the concept of least privilege and apply it to the environment in which they work. They will learn how to supplement Group Policy to attain least privilege, how to protect their environments, and how to carry security throughout their enterprise. This book will teach them new ways to look at the principle of least privilege, and it will educate them with the information necessary to receive executive and financial backing to the projects that will secure their network.

Table of Contents

  1. The Only IT Constant is Change
  2. Misuse of Privilege is the New Corporate Landmine
  3. Business Executives, Technologisst and Auditors Need Least Privilege
  4. Supplementing Group Policy on Windows Desktops
  5. Servers Are the Primary Target for Insiders and Hackers Alike
  6. Protecting Virtual Environments from Hypervisor Sabotage
  7. Secure Multi-Tenancy for Private, Public and Hybrid Clouds
  8. Applications, Databases, and Desktop Data Need Least Privilege, Too
  9. Security Does Not Equal Compliance
  10. The Hard and Soft Cost of Apathy
  11. Final Thoughts for Least Privilege Best Practices


ISBN: 9781430239215

Date: 2011-10-17

Author(s): John Mutch, Brian Anderson

Pages: 220

File Name: Apress.Preventing.Good.People.From.Doing.Bad.Things.Oct.2011.rar

Download Preventing Good People From Doing Bad Things: Implementing Least Privilege
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications
    IMPORTANT: This Revised Edition includes a Full Index and a better Table of Contents to provide readers new tools to find and review its ...
  • Wxpython in Action
    Because they are often large and complex, GUI programming tool kits can be hard to use. wxPython is a combination of the Python programming ...
  • Genealogy Online For Dummies
    Researching your genealogy online is like being a kid in a candy store. So many neat things catch your eye that it’s difficult to decide whi...
  • Microsoft SQL Server 2008 Administration for Oracle DBAs
    Leverage your Oracle DBA skills on Microsoft SQL Server 2008 Microsoft SQL Server 2008 Administration for Oracle DBAs shows you how...
  • Oracle E-Business Suite Development & Extensibility Handbook (Oracle Press)
    Extend and Customize Oracle E-Business Suite Transform your Oracle E-Business Suite infrastructure to suit enterprise requirements using the...
  • Advanced iOS 4 Programming: Developing Mobile Applications for Apple iPhone, iPad, and iPod touch
    With Advanced iOS 4 Programming , developers have the expert guidance they need to create amazing applications for Apple's iPhone, iPad,...
  • Dreamweaver CS5 All-in-One For Dummies (For Dummies (Computer/Tech))
    Everything Web designers need to build sites with Dreamweaver Dreamweaver is the leading Web site creation tool, with 90 percent of the mark...
  • Microsoft Visual Basic 2008 Step by Step
    Teach yourself the fundamentals of working with Visual Basic 2008 one step at a time. With STEP BY STEP, you work at your own pace through h...
  • Oracle BI Publisher 11g: A Practical Guide to Enterprise Reporting
    Create and deliver improved snapshots in time of your Enterprise data using Oracle BI Publisher 11g with this hands-on book and eBook guide ...
  • Beginning Nokia Apps Development: Qt and HTML5 for Symbian and MeeGo (Books for Professionals by Professionals)
    While media buzz regularly circulates around iPhone and Android, Nokia still leads the pack in terms of world market share. Symbian, for ins...

Blog Archive

  • ▼  2012 (500)
    • ►  October (115)
    • ▼  September (385)
      • The Little Mac Book, Lion Edition (Little Book)
      • Web 2.0 and Social Networking for the Enterprise: ...
      • Crapshoot Investing: How Tech-Savvy Traders and Cl...
      • Search Engine Optimization for Flash: Best Practic...
      • Canon PowerShot G12: From Snapshots to Great Shots
      • Investing in People: Financial Impact of Human Res...
      • Lead with LUV: A Different Way to Create Real Success
      • Aided Navigation: GPS with High Rate Sensors
      • VMware VI3 Implementation and Administration
      • BlackBerry Enterprise Server 5 Implementation Guide
      • The Essential Guide to Flash CS4 with ActionScript
      • Solaris Application Programming
      • My New Mac, Lion Edition: Simple Projects to Get Y...
      • Fedora Bible 2010 Edition: Featuring Fedora Linux ...
      • Trading from Your Gut: How to Use Right Brain Inst...
      • The People CMM: A Framework for Human Capital Mana...
      • Creating Flash Widgets with Flash CS4 and ActionSc...
      • Beginning Joomla!: From Novice to Professional
      • Perl Medic: Transforming Legacy Code
      • Perl Programming for Biologists
      • iLife '11 For Dummies
      • OmniGraffle 5 Diagramming Essentials
      • Asterisk 1.4 - the Professional's Guide
      • Content Syndication with RSS
      • Mining Google Web Services: Building Applications ...
      • HP Network Node Manager 9: Getting Started
      • Making the World Work Better: The Ideas That Shape...
      • Developing Facebook Platform Applications with Rai...
      • Mac OS X Lion on Demand (2nd Edition)
      • Dreamweaver CS5 All-in-One For Dummies (For Dummie...
      • Optical System Design, Second Edition
      • Agile Web Development with Rails, Third Edition
      • Waves Plus-Ins Workshop -- Mixing by the Bundle
      • Online Marketing Inside Out (Online Marketing: Sit...
      • Essential JavaFX
      • Microsoft Silverlight 4 Data and Services Cookbook
      • WordPress 24-Hour Trainer: Watch, Read, and Learn ...
      • IBM Lotus Domino: Classic Web Application Developm...
      • The Oracle Universal Content Management Handbook
      • The Official Ubuntu Book (5th Edition)
      • Mac OS X Lion Pocket Guide
      • The Future of Looking Back (Microsoft Research)
      • Professional Ubuntu Mobile Development (Wrox Progr...
      • Never Buy Another Stock Again: The Investing Portf...
      • The Open Innovation Marketplace: Creating Value in...
      • Joomla! 1.5: Beginner's Guide
      • Moral Intelligence 2.0: Enhancing Business Perform...
      • Celtx: Open Source Screenwriting Beginner's Guide
      • The New World of Wireless: How to Compete in the 4...
      • php/architect's Guide to PHP 5 Migration
      • Oracle PeopleSoft Enterprise Financial Management ...
      • Programming Cocoa with Ruby: Create Compelling Mac...
      • Marketing in the Moment: The Practical Guide to Us...
      • Designing for XOOPS: A Quickstart for Designers
      • Galaxy Tab: The Missing Manual: Covers Samsung Tou...
      • Fuzzy Database Modeling with XML (Advances in Data...
      • Operators, Geometry and Quanta: Methods of Spectra...
      • Astronomy at the Frontiers of Science (Integrated ...
      • Visual Basic .NET and XML: Harness the Power of XM...
      • Death by China: Confronting the Dragon - A Global ...
      • The Other Side of Wall Street: In Business It Pays...
      • WebSphere Application Server Administration Using ...
      • Joomla! 1.6 First Look
      • iClone 4.31 3D Animation Beginner's Guide
      • CMMI for Acquisition: Guidelines for Improving the...
      • The Facebook Marketing Book
      • Microsoft Visual Basic 2008 Step by Step
      • Railo 3 Beginner's Guide
      • Silverlight 4 User Interface Cookbook
      • Topology, Geometry and Gauge fields: Foundations (...
      • Agile Career Development: Lessons and Approaches f...
      • Cocoa Programming: A Quick-Start Guide for Develop...
      • Professional C# 2005 with .NET 3.0 (Wrox Professio...
      • System Center Opalis Integration Server 6.3 Unleashed
      • Profiting with Iron Condor Options: Strategies fro...
      • iPad All-in-One For Dummies
      • Deliver First Class Web Sites: 101 Essential Check...
      • Mastering Autodesk Revit MEP 2012
      • Building Enterprise Ready Telephony Systems with s...
      • Sams Teach Yourself Mac OS X Lion in 10 Minutes (S...
      • iPhone Forensics: Recovering Evidence, Personal Da...
      • Composing Digital Music For Dummies
      • Blow-up Theories for Semilinear Parabolic Equation...
      • Optical Fiber Telecommunications, Vol. 5, Part B: ...
      • Beginning BlackBerry Development (Books for Profes...
      • BPEL PM and OSB Operational Management with Oracle...
      • Oracle Siebel CRM 8 Developer's Handbook
      • Put Option Strategies for Smarter Trading: How to ...
      • Drupal Multimedia
      • Protect Your Wealth from the Ravages of Inflation:...
      • Beginning PHP and MySQL: From Novice to Professional
      • Sakai CLE Courseware Management: The Official Guide
      • ASP.Net MVC in Action
      • Predictable Magic: Unleash the Power of Design Str...
      • Understanding IBM SOA Foundation Suite: Learning V...
      • Beginning Microsoft Office 2010 (Expert's Voice in...
      • Apache MyFaces 1.2 Web Application Development
      • VMware VI and vSphere SDK: Managing the VMware Inf...
      • The Guild Leader's Handbook: Strategies and Guidan...
      • Ubuntu Kung Fu: Tips, Tricks, Hints, and Hacks
Powered by Blogger.

About Me

Unknown
View my complete profile