|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn983730517 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
170422s2017 maua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCA
|d CEF
|d KSU
|d OCLCQ
|d ERF
|d UKBTH
|d UHL
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1112558959
|a 1112928606
|a 1113231138
|a 1129364614
|a 1138967901
|
024 |
8 |
|
|a 53863MIT58314
|
029 |
1 |
|
|a GBVCP
|b 1004855958
|
029 |
1 |
|
|a AU@
|b 000067094140
|
035 |
|
|
|a (OCoLC)983730517
|z (OCoLC)1112558959
|z (OCoLC)1112928606
|z (OCoLC)1113231138
|z (OCoLC)1129364614
|z (OCoLC)1138967901
|
037 |
|
|
|a CL0500000851
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Esteves, José,
|d 1970-
|e author.
|
245 |
1 |
0 |
|a To improve cybersecurity, think like a hacker /
|c José Esteves, Elisabete Ramalho, Guillermo de Haro.
|
264 |
|
1 |
|a [Cambridge, Massachusetts] :
|b MIT Sloan Management Review,
|c 2017.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed April 21, 2017).
|
500 |
|
|
|a "Reprint #58314."
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a In the past several years, the list of companies whose internal systems have been hacked has grown rapidly. It now includes such high-profile businesses as Target, JPMorgan Chase, Home Depot, Sony Pictures, Ashley Madison, and Yahoo. No industry appears to be safe from attacks. Unfortunately, the authors say, investment in security measures is only part of the answer; traditional methodologies can only do so much. To be effective, managers in charge of cybersecurity need to adjust their mindsets and become as open and adaptive as possible. In this article, the authors present a framework drawn from the knowledge and opinions of experts, including interviews with more than 20 experienced hackers. As the authors explain, hackers have two different mindsets depending on the stage of the attack: explorative and exploitative. An exploration mindset used in the early stages of an attack combines deliberate and intuitive thinking and relies on intensive experimentation. Once access to a system is gained, hackers adopt an exploitation mindset. An attack typically involves four steps: Step 1: Identifying Vulnerabilities If hackers think your company is worth attacking, they will examine it thoroughly for weaknesses, surveying the network information, organizational information, and security policies. Companies can protect themselves by adopting an iterative and adaptive process and making a point of conducting a high-level “footprint” of their systems on a regular basis. They should also make sure that employees are well informed on policies regarding sharing of information. Step 2: Scanning and Testing After a hacker has broken into your network, weaknesses in the applications running on those systems could become avenues for further unauthorized access. To protect your company, examine your network and identify potential weaknesses. Step 3: Gaining Access Hackers often play on both sophisticated technical knowledge and social skills to breach company security. Companies need to consider how a hacker could gain access to their systems. Step 4: Maintaining Access Hackers try to retain their “ownership” of the system and access for future attacks. Organizations need to remain vigilant for suspicious activity in system logs and to ensure that monitoring systems are always up to date. “Cybersecurity is a game of cat and mouse in which the cat always makes the first move,” the authors write. The more you can think like a hacker, the better able you will ...
|
542 |
|
|
|f Copyright © 2017 MIT Sloan Management Review
|g 2017
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyber intelligence (Computer security)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Surveillance des menaces informatiques.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Cyber intelligence (Computer security)
|2 fast
|
700 |
1 |
|
|a Ramalho, Elisabete,
|e author.
|
700 |
1 |
|
|a Haro, Guillermo de,
|e author.
|
773 |
0 |
|
|a MIT Sloan management review
|g Vol. 58, no. 3 (Spring 2017)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/53863MIT58314/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|