Security and Privacy in a Networked World/Technology: A mighty knight with no pants

Mitnick: Technology, training, procedures

Introduction
The metaphor used in the title is unfortunately valid for many places - some (more visible) parts could be well-protected, while others that are not so visible are in deep neglect.

...

Tools

 * Firewalls
 * Vulnerability scanners
 * Intrusion detection systems
 * Logging and auditng
 * Password checkers
 * Sniffers

Additional reading and links

 * ANONYMOUS. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. 3rd ed. Sams Publishing, 2001.
 * MCCARTHY, Linda. IT Security: Risking the Corporation. Prentice Hall 2001.