Advanced Persistent Security
-34 %

Advanced Persistent Security

A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
 Taschenbuch
Besorgungstitel | Lieferzeit:3-5 Tage I

Unser bisheriger Preis:ORGPRICE: 64,95 €

Jetzt 42,86 €*

Alle Preise inkl. MwSt. | zzgl. Versand
ISBN-13:
9780128093160
Einband:
Taschenbuch
Seiten:
260
Autor:
Ira Winkler
Gewicht:
570 g
Format:
235x191x mm
Sprache:
Englisch
Beschreibung:

Chapter 1. What Is Advanced Persistent Security?

Section 1. Concepts/Foundation

Introduction

Chapter 2. Cyberwarfare Concepts

Chapter 3. What Is Proaction?

Chapter 4. Risk Management

Chapter 5. How to Hack Computers

Chapter 6. Threat

Chapter 7. Adversary Infrastructure

Section 2. Protection

Introduction

Chapter 8. Governance

Chapter 9. Vulnerabilities to Address

Chapter 10. Countermeasures

Chapter 11. Security Culture

Chapter 12. What Is Threat Intelligence?

Section 3. Detection

Introduction

Chapter 13. What Is Detection?

Chapter 14. Detection Deficit Disorder

Chapter 15. The Human Intrusion Detection System

Chapter 16. Kill Chain Analysis

Section 4. Reaction

Introduction

Chapter 17. Setting Reaction Strategy

Chapter 18. Incident Response and Investigations

Section 5. Implementation

Introduction

Chapter 19. Know Yourself

Chapter 20. Know Your Adversaries

Chapter 21. Define Your Strategy

Chapter 22. Determining the Appropriate Countermeasures

Chapter 23. Advanced Persistent Security
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.

Contains practical and cost-effective recommendations for proactive and reactive protective measures
Teaches users how to establish a viable threat intelligence program
Focuses on how social networks present a double-edged sword against security programs