Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
Outsourcing
Options
Chapter List
Outsourcing Network Monitoring
Outsourcing Disaster Prevention
Outsourcing Proactive Security
More Information
Resources (links)
Discussions
FAQs
Errata
Sample Pages
Buy The Book
at amazon.com

Summary

Some businesses find it easier and more cost effective to outsource security needs. In the physical security realm, this means hiring a security agency. In the world of network security,companies provide the digital equivalent. This part looks at the types of security needs that can be outsourced, and the issues involved.

Key Points

  • When you outsource something, you’re extending trust. How well do you know the people you’re trusting?
  • It’s crucial to ensure that your organization’s security philosophies and policies are understood and embraced by all of your outsource providers.

Connections

This part examines how outsourcing in general can impact information security. The three chapters here focus on outsourcing security technologies and services:

More Information

The above information is an excerpt from "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.

Below, you'll find links to online resources that supplement this portion of the book.


Resources

(websites, books, etc.)

Discussions

FAQs

Errata

Sample Pages