Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Winkler, Ira
Treu Gomes, Araceli

45,77 €(IVA inc.)

Today's high-caliber cybercriminals conduct extremely well-planned and executed attacks on organizations throughout the globe. This new normal requires a sophisticated security program to both proactively and reactively mitigate these attacks. Written by top cyber security professionals, Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and how to prioritize the right countermeasures. Advanced Persistent Security discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. Practical and cost-effective recommendations for proactive and reactive protective measuresLearn how to establish a viable threat intelligence programFocuses on how social networks present a double-edged sword against security programs INDICE: Chapter 1 What is APS? Section 1 Concepts/Foundations Chapter 2 Cyberwarfare Concepts Chapter 3 Proaction Chapter 4 Risk Management Chapter 5 How to Hack Computers Chapter 6 Threat Chapter 7 Adversary Infrastructure Section 2 Protection Chapter 8 Governance Chapter 9 Vulnerabilities to Address Chapter 10 Countermeasures Chapter 11 Security Culture Chapter 12 Threat Intelligence Section 3 Detection Chapter 13 What is Detection and Where Does It Happen? (Ari) Chapter 14 The Nature of the Problem Chapter 15 The Human Intrusion Detection System Chapter 16 Kill Chain Analysis (Ari) Section 4 Reaction Chapter 17 Setting Reaction Strategy Chapter 18 Incident Response and Investigations Section 5 Implementation Chapter 19 Know Yourself Chapter 20 Know Your Adversaries Chapter 21 Define Your Strategy Chapter 22 Determining Appropriate Countermeasures

  • ISBN: 978-0-12-809316-0
  • Editorial: Syngress
  • Encuadernacion: Rústica
  • Páginas: 240
  • Fecha Publicación: 30/11/2016
  • Nº Volúmenes: 1
  • Idioma: Inglés