Read more
Zusatztext "Felicia has led the industry in addressing the problems patching systems represent! creating a comprehensive! process-oriented approach to gaining control over the security implications! as well as demonstrating a solution to managing the entire process? The framework Felicia is presenting herein can be applied to any size organization? It is my expectation that you will gain an enormous advantage from this book."Jim Tiller! CISM! CISA! CISSP! Chief Security Officer and Managing Vice President of Security Services for International Network Services (INS)! from the Foreword Informationen zum Autor Felicia M. Wetter Zusammenfassung A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. This volume provides CISOs, CIROs, and IT directors and managers with the support and guidance that they need to integrate an effective patch management process into their environments. Inhaltsverzeichnis INTRODUCTIONHow to Use This BookBackgroundGetting StartedTypes of PatchesProduct Vendors ResponsibilityVULNERABILITY TO PATCH TO EXPLOITWho Exploits! When! Why and HowTracking New Patch ReleasesWHAT TO PATCHDesktopsRemote UsersServersNetwork DevicesNETWORK AND SYSTEMS MANAGEMENT: ITILNetwork and Systems ManagementStarting with ProcessITILAssessing and Implementing IT OperationsSECURITY MANAGEMENTOverviewPreparing for Security OperationsEstablishing Security OperationsImplementing Security OperationsNext StepsVULNERABILITY MANAGEMENTWhat is Vulnerability Management?Vulnerability Management ProcessEstablishing Vulnerability ManagementNext StepsTOOLSProcess versus ToolsWhere to Use ThemHow to Determine Which One is BestTools EvaluatedTESTINGCommon Issues with TestingThe Testing ProcessPatch Ratings and How They Affect TestingPrioritizing the Test ProcessThe Test LabVirtual MachinesWrapping It UpPROCESS LIFE CYCLERoles and ResponsibilitiesAnalysisRemediationUpdate Operational EnvironmentTrackingPUTTING THE PROCESS IN PLACEPlanDesignImplementOperateMaintainPatch Management PolicyZERO-DAY ATTACKThe scenarioThe solutionPost MortemCONCLUSIONChallengesNext Steps ...