Introduction to Network ProtectionChapter 1 of Protect Your Windows Network from Perimeter to Data by Jesper Johansson and Steve Riley explains how you can best protect your systems network by balancing security and usability/usefulness. (ISBN 0321336437, Copyright 2005. Reproduced with permission from Pearson publishing as Addison-Wesley Professional. Click here for a detailed description and to learn how to purchase this title.)
About the Authors:
Steve Riley is a Senior Program Manager in Microsoft's Security Business and Technology Unit in Redmond, Washington. Steve specializes in network and host security, communication protocols, network design, and information security policies and process. His customers include various ISPs and ASPs around the United States, as well as traditional enterprise IT customers, for whom he has conducted security assessments and risk analyses, deployed technologies for prevention and detection, and designed highly available network architectures. Steve is a frequent and popular speaker at conferences worldwide, often appearing in Asia one week and Europe the next. When not evangelizing the benefits of Microsoft security technology, he spends time with customers to better understand the security pain they face and show how some of that pain can be eliminated.
Jesper Johansson is Program Manager for Security Policy at Microsoft. In this position, Jesper is responsible for the tools customers use to implement security policies, such as the Security Configuration Wizard, Security Configuration Editor, and related tools. He has delivered speeches on network security all over the world and is a frequent speaker at conferences and workshops, particularly in places that lend themselves to great diving. He has a Ph.D. in Management Information Systems and is a Certified Information Systems Security Professional (CISSP) and a certified Information Systems Security Architecture Professional (ISSAP).
This was first published in August 2005