Cargando…

Asset attack vectors : building effective vulnerability management strategies to protect organizations /

Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Haber, Morey J.
Otros Autores: Hibbert, Brad
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley, CA] : Apress, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1041108964
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 180619s2018 cau o 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d GW5XE  |d EBLCP  |d OCLCF  |d UAB  |d UMI  |d UPM  |d STF  |d TOH  |d VT2  |d DEBBG  |d CEF  |d CNCEN  |d YOU  |d WYU  |d OTZ  |d G3B  |d LVT  |d OCLCQ  |d S9I  |d U3W  |d K6U  |d CAUOI  |d SNK  |d MERER  |d OCLCQ  |d COO  |d UKAHL  |d OCLCQ  |d UHL  |d OCLCQ  |d VLY  |d BRF  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO 
019 |a 1043906268  |a 1047689910  |a 1050975451  |a 1055313994  |a 1058844492  |a 1066448676  |a 1081182482  |a 1086569228  |a 1097085649  |a 1113837253  |a 1162363101  |a 1206408683  |a 1228649118  |a 1237485720  |a 1240613108 
020 |a 9781484236277  |q (electronic bk.) 
020 |a 1484236270  |q (electronic bk.) 
020 |a 1484236262 
020 |a 9781484236260 
020 |z 9781484236260 
024 3 |a 9781484236260 
024 7 |a 10.1007/978-1-4842-3627-7  |2 doi 
029 1 |a AU@  |b 000063635661 
029 1 |a AU@  |b 000063679249 
029 1 |a CHNEW  |b 001063555 
029 1 |a CHVBK  |b 575141182 
029 1 |a GBVCP  |b 1029873070 
035 |a (OCoLC)1041108964  |z (OCoLC)1043906268  |z (OCoLC)1047689910  |z (OCoLC)1050975451  |z (OCoLC)1055313994  |z (OCoLC)1058844492  |z (OCoLC)1066448676  |z (OCoLC)1081182482  |z (OCoLC)1086569228  |z (OCoLC)1097085649  |z (OCoLC)1113837253  |z (OCoLC)1162363101  |z (OCoLC)1206408683  |z (OCoLC)1228649118  |z (OCoLC)1237485720  |z (OCoLC)1240613108 
037 |a CL0500000978  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Haber, Morey J. 
245 1 0 |a Asset attack vectors :  |b building effective vulnerability management strategies to protect organizations /  |c Morey J. Haber, Brad Hibbert. 
264 1 |a [Berkeley, CA] :  |b Apress,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed June 20, 2018). 
505 0 |a Intro; Table of Contents; About the Authors; About the Technical Reviewer; Acknowledgments; Preface; Introduction; Chapter 1: The Attack Chain; Chapter 2: The Vulnerability Landscape; Vulnerabilities; Configurations; Exploits; False Positives; False Negatives; Malware; Social Engineering; Phishing; Curiosity Killed the Cat; Nothing Bad Will Happen; Did You Know They Removed Gullible from the Dictionary?; It Can't Happen to Me; How to Determine if Your Email Is a Phishing Attack; Ransomware; Insider Threats; External Threats; Vulnerability Disclosure; Chapter 3: Threat Intelligence. 
505 8 |a Chapter 4: Credential Asset RisksChapter 5: Vulnerability Assessment; Active Vulnerability Scanning; Passive Scanners; Intrusive Vulnerability Scanning; Nonintrusive Scanning; Vulnerability Scanning Limitations and Shortcomings; Chapter 6: Configuration Assessment; Regulations; Frameworks; Benchmarks; Configuration Assessment Tools; SCAP; Chapter 7: Risk Measurement; CVE; CVSS; STIG; OVAL; IAVA; Chapter 8: Vulnerability States; Vulnerability Risk Based on State; The Three Vulnerability States; Active Vulnerabilities; Dormant Vulnerabilities; Carrier Vulnerabilities; State Prioritization. 
505 8 |a Chapter 9: Vulnerability AuthoritiesChapter 10: Penetration Testing; Chapter 11: Remediation; Microsoft; Apple; Cisco; Google; Oracle; Red Hat; Adobe; Open Source; Everyone Else; Chapter 12: The Vulnerability Management Program; Design; Develop; Deploy; Operate; Maturity; Maturity Categories; Descriptions; Chapter 13: Vulnerability Management Design; Crawl, Walk, Run, Sprint; Implement for Today, But Plan for Tomorrow; It's All About Business Value; Chapter 14: Vulnerability Management Development; Vulnerability Management Scope; Operating Systems; Client Applications; Web Applications. 
505 8 |a Network DevicesDatabases; Flat File Databases; Hypervisors; IaaS and PaaS; Mobile Devices; IoT; Industrial Control Systems (ICS) and SCADA; DevOps; Docker and Containers; Code Review; Tool Selection; The Vulnerability Management Process; Assessment; Measure; Remediation; Rinse and Repeat {Cycle}; End of Life; Common Vulnerability Lifecycle Mistakes; Mistake 1: Disjointed Vulnerability Management; Solution; Mistake 2: Relying on Remote Assessment Alone; Solution; Mistake 3: Unprotected Zero-Day Vulnerabilities; Solution; Mistake 4: Decentralized Visibility; Solution. 
505 8 |a Mistake 5: Compliance at the Expense of SecuritySolution; Common Challenges; Aging Infrastructure; Depth and Breadth of the Program; Building the Plan; Step 1: What to Assess?; Step 2: Assessment Configuration; Step 3: Assessment Frequency; Step 4: Establish Ownership; Step 5: Data and Risk Prioritization; Step 6: Reporting; Step 7: Remediation Management; Step 8: Verification and Measurements; Step 9: Third-Party Integration; Chapter 15: Vulnerability Management Deployment; Approach 1: Critical and High-Risk Vulnerabilities Only; Approach 2: Statistical Sampling. 
520 |a Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN--savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn: Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
700 1 |a Hibbert, Brad. 
776 0 8 |i Printed edition:  |z 9781484236260 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484236277/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35093490 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5430900 
938 |a EBSCOhost  |b EBSC  |n 1833754 
994 |a 92  |b IZTAP