Cargando…

Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks /

It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rains, Tim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_on1156996260
003 OCoLC
005 20231017213018.0
006 m d
007 cr |||||||||||
008 200607s2020 enk o 000 0 eng d
040 |a YDX  |b eng  |c YDX  |d N$T  |d EBLCP  |d UKAHL  |d OCLCF  |d UMI  |d NLW  |d UKMGB  |d OG$  |d UAB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBC0G9118  |2 bnb 
016 7 |a 019807518  |2 Uk 
019 |a 1157083483  |a 1199337249 
020 |a 1800205899  |q (electronic bk.) 
020 |a 9781800205895  |q (electronic bk.) 
020 |z 9781800206014 
029 1 |a AU@  |b 000067299648 
029 1 |a UKMGB  |b 019807518 
035 |a (OCoLC)1156996260  |z (OCoLC)1157083483  |z (OCoLC)1199337249 
037 |a CL0501000152  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rains, Tim,  |e author. 
245 1 0 |a Cybersecurity threats, malware trends, and strategies :  |b mitigate exploits, malware, phishing, and other social engineering attacks /  |c Tim Rains. 
260 |a Birmingham :  |b Packt,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover -- Copyright -- Packt Page -- Contributors -- Table of Contents -- Preface -- Chapter 1: Ingredients for a Successful Cybersecurity Strategy -- What is a cybersecurity strategy? -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between the attacker's motivations and tactics -- Other ingredients for a successful strategy 
505 8 |a Business objective alignment -- Cybersecurity vision, mission, and imperatives -- Senior executive and board support -- Understand the risk appetite -- Realistic view of current cybersecurity capabilities and technical talent -- Compliance program and control framework alignment -- An effective relationship between cybersecurity and IT -- Security culture -- Chapter summary -- References -- Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources -- Industry Vulnerability Disclosure Trends 
505 8 |a Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Oracle Vulnerability Trends -- Apple Vulnerability Trends -- IBM Vulnerability Trends -- Google Vulnerability Trends -- Microsoft Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Microsoft Operating System Vulnerability Trends -- Windows XP Vulnerability Trends -- Windows 7 Vulnerability Trends -- Windows Server 2012 and 2016 Vulnerability Trends -- Windows 10 Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Google Android Vulnerability Trends 
505 8 |a Apple macOS Vulnerability Trends -- Operating Systems Vulnerability Trend Summary -- Web Browser Vulnerability Trends -- Internet Explorer Vulnerability Trends -- Microsoft Edge Vulnerability Trends -- Google Chrome Vulnerability Trends -- Mozilla Firefox Vulnerability Trends -- Apple Safari Vulnerability Trends -- Web Browser Vulnerability Trend Summary -- Vulnerability Management Guidance -- Chapter summary -- References -- Chapter 3: The Evolution of the Threat Landscape -- Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources 
505 8 |a The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global windows malware infection analysis -- Regional windows malware infection analysis -- The long-term view of the threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa 
520 |a It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has participated in over a two-decade career. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cyberterrorism. 
650 0 |a Malware (Computer software) 
650 6 |a Sécurité informatique. 
650 6 |a Cyberterrorisme. 
650 6 |a Logiciels malveillants. 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
776 0 8 |i Print version:  |a Rains, Tim  |t Cybersecurity Threats, Malware Trends, and Strategies : Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks  |d Birmingham : Packt Publishing, Limited,c2020 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781800206014/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 301311501 
938 |a EBSCOhost  |b EBSC  |n 2490088 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37439547 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6215711 
994 |a 92  |b IZTAP