Cargando…

To improve cybersecurity, think like a hacker /

In the past several years, the list of companies whose internal systems have been hacked has grown rapidly. It now includes such high-profile businesses as Target, JPMorgan Chase, Home Depot, Sony Pictures, Ashley Madison, and Yahoo. No industry appears to be safe from attacks. Unfortunately, the au...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Esteves, José, 1970- (Autor), Ramalho, Elisabete (Autor), Haro, Guillermo de (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Cambridge, Massachusetts] : MIT Sloan Management Review, 2017.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn983730517
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170422s2017 maua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCA  |d CEF  |d KSU  |d OCLCQ  |d ERF  |d UKBTH  |d UHL  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1112558959  |a 1112928606  |a 1113231138  |a 1129364614  |a 1138967901 
024 8 |a 53863MIT58314 
029 1 |a GBVCP  |b 1004855958 
029 1 |a AU@  |b 000067094140 
035 |a (OCoLC)983730517  |z (OCoLC)1112558959  |z (OCoLC)1112928606  |z (OCoLC)1113231138  |z (OCoLC)1129364614  |z (OCoLC)1138967901 
037 |a CL0500000851  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Esteves, José,  |d 1970-  |e author. 
245 1 0 |a To improve cybersecurity, think like a hacker /  |c José Esteves, Elisabete Ramalho, Guillermo de Haro. 
264 1 |a [Cambridge, Massachusetts] :  |b MIT Sloan Management Review,  |c 2017. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from cover (Safari, viewed April 21, 2017). 
500 |a "Reprint #58314." 
504 |a Includes bibliographical references. 
520 |a In the past several years, the list of companies whose internal systems have been hacked has grown rapidly. It now includes such high-profile businesses as Target, JPMorgan Chase, Home Depot, Sony Pictures, Ashley Madison, and Yahoo. No industry appears to be safe from attacks. Unfortunately, the authors say, investment in security measures is only part of the answer; traditional methodologies can only do so much. To be effective, managers in charge of cybersecurity need to adjust their mindsets and become as open and adaptive as possible. In this article, the authors present a framework drawn from the knowledge and opinions of experts, including interviews with more than 20 experienced hackers. As the authors explain, hackers have two different mindsets depending on the stage of the attack: explorative and exploitative. An exploration mindset used in the early stages of an attack combines deliberate and intuitive thinking and relies on intensive experimentation. Once access to a system is gained, hackers adopt an exploitation mindset. An attack typically involves four steps: Step 1: Identifying Vulnerabilities If hackers think your company is worth attacking, they will examine it thoroughly for weaknesses, surveying the network information, organizational information, and security policies. Companies can protect themselves by adopting an iterative and adaptive process and making a point of conducting a high-level “footprint” of their systems on a regular basis. They should also make sure that employees are well informed on policies regarding sharing of information. Step 2: Scanning and Testing After a hacker has broken into your network, weaknesses in the applications running on those systems could become avenues for further unauthorized access. To protect your company, examine your network and identify potential weaknesses. Step 3: Gaining Access Hackers often play on both sophisticated technical knowledge and social skills to breach company security. Companies need to consider how a hacker could gain access to their systems. Step 4: Maintaining Access Hackers try to retain their “ownership” of the system and access for future attacks. Organizations need to remain vigilant for suspicious activity in system logs and to ensure that monitoring systems are always up to date. “Cybersecurity is a game of cat and mouse in which the cat always makes the first move,” the authors write. The more you can think like a hacker, the better able you will ... 
542 |f Copyright © 2017 MIT Sloan Management Review  |g 2017 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cyber intelligence (Computer security) 
650 6 |a Sécurité informatique. 
650 6 |a Surveillance des menaces informatiques. 
650 7 |a Computer security  |2 fast 
650 7 |a Cyber intelligence (Computer security)  |2 fast 
700 1 |a Ramalho, Elisabete,  |e author. 
700 1 |a Haro, Guillermo de,  |e author. 
773 0 |a MIT Sloan management review  |g Vol. 58, no. 3 (Spring 2017) 
856 4 0 |u https://learning.oreilly.com/library/view/~/53863MIT58314/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP