Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Posted on
- Rob Slade, doting grandpa of R
August 26, 2005, 12:25 am
rate this thread
"Corporate Computer and Network Security", Raymond R. Panko, 2004,
%A Raymond R. Panko pankosecurity.com
%C One Lake St., Upper Saddle River, NJ 07458
%I Prentice Hall
%O 800-576-3800 +1-201-236-7139 fax: +1-201-236-7131
%O (Amazon.com product link shortened)
(Amazon.com product link shortened)
%O Audience a- Tech 2 Writing 1 (see revfaq.htm for explanation)
%P 522 p.
%T "Corporate Computer and Network Security"
In the preface (for teachers), Panko states that this is a text for a
security course. The book is said to be based on the CISSP (Certified
Information Systems Security Professional) "exam," although there is a
definite lack of material dealing with architecture, physical
security, and security management.
Chapter one is a list of possible attacks and security problems.
There are "Test Your Understanding" questions sprinkled throughout,
but they are mostly on the level of fact-based reading checks. (One
of the later examples asks "What is shoulder surfing?" immediately
under a paragraph on shoulder surfing.) There is also a chapter "1a"
with a collection of very terse "case studies" (one is only a sentence
in length). Access control and a tiny mention of physical security is
in chapter two. (As well as a very strange mention of wireless LANs:
the author considers WLAN access to be a factor of site security.)
There are odd and sometimes careless mistakes: "rters" is said to be
four characters. The emphasis seems to be on minutiae rather than
concepts. A lot of material is repeated: two separate paragraphs deal
with piggybacking, only five paragraphs apart. The facts are
generally correct, but the discussions are often misleading if not
wrong: a confusing deliberation of what is probably false acceptance
incorrectly refers to the situation as false rejection. Chapter three
reviews the TCP/IP protocol suite. (Again, the conceptual material is
weak: Panko asserts that the real world uses an amalgam of the OSI
[Open Systems Interconnection] and TCP/IP models, whereas the TCP/IP
protocol suite is generally described with reference to the OSI model.
Anyone who has actually used the OSI protocols knows why the rest of
the world uses TCP/IP.) Network attacks are discussed in chapter
four. (Oddly, in the midst of a list of net probing activities comes
a mention of looking up corporate information on the Security and
Exchange Commission's EDGAR database.) There is also a rather limited
section on malware. Chapter five looks at firewalls. Some generic
advice on hardening hosts or desktop computers is given in chapter
six. Chapters seven and eight contain miscellaneous references to
cryptographic ideas or practices. Most of the discussion of
application security, in chapter nine, is limited to Web and e-
commerce problems. Chapter ten is a rather mixed bag of incident
response, automated intrusion detection, and business continuity
planning. Security should be managed, says chapter eleven, but it
doesn't give an awful lot of help on how it can be done. Most of
chapter twelve looks at computer related laws.
The book seems to be a very loosely structured compilation of points
related to security. The lack of overall organization means that
material is often disjointed and repetitive. As with anything, in the
hands of a good teacher this could be used for a computer security
course text. In the hands of one who followed the text closely, the
course would be a bit ragged.
copyright Robert M. Slade, 2005 BKCPCNSC.RVW 20050614
email@example.com firstname.lastname@example.org email@example.com
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev /
or mirror http://sun.soci.niu.edu/~rslade /
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Book reviews: [Base URL]mnbk.htm
Review mailing list: send mail to firstname.lastname@example.org
Re: REVIEW: "Corporate Computer and Network Security", Raymond R. Panko
Another excellent review, Rob, but one comment:
In my experience, software guys often talk IP, but many network hardware
contractors still talk in OSI. Damned awkward for troubleshooting, just a
Might show more about the author's roots than anything else.
Hairy One Kenobi
Disclaimer: the opinions expressed in this opinion do not necessarily
reflect the opinions of the highly-opinionated person expressing the opinion
in the first place. So there!
- » SSRT051023 rev.0 - HP Openview Network Node Manager (OV NNM) Remote Unauthorized Access
- — Next thread in » General Computer Security
- » SSRT4874 rev.1 - HP-UX Ignite-UX Remote Unauthorized Access
- — Previous thread in » General Computer Security