Cargando…

Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks /

It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rains, Tim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Copyright
  • Packt Page
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Ingredients for a Successful Cybersecurity Strategy
  • What is a cybersecurity strategy?
  • How organizations get initially compromised and the cybersecurity fundamentals
  • Unpatched vulnerabilities
  • Security misconfigurations
  • Weak, leaked, and stolen credentials
  • Social engineering
  • Insider threats
  • Focus on the cybersecurity fundamentals
  • Understanding the difference between the attacker's motivations and tactics
  • Other ingredients for a successful strategy
  • Business objective alignment
  • Cybersecurity vision, mission, and imperatives
  • Senior executive and board support
  • Understand the risk appetite
  • Realistic view of current cybersecurity capabilities and technical talent
  • Compliance program and control framework alignment
  • An effective relationship between cybersecurity and IT
  • Security culture
  • Chapter summary
  • References
  • Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs
  • Introduction
  • Vulnerability Management Primer
  • Vulnerability Disclosure Data Sources
  • Industry Vulnerability Disclosure Trends
  • Reducing Risk and Costs
  • Measuring Vendor and Product Improvement
  • Oracle Vulnerability Trends
  • Apple Vulnerability Trends
  • IBM Vulnerability Trends
  • Google Vulnerability Trends
  • Microsoft Vulnerability Trends
  • Vendor Vulnerability Trend Summary
  • Operating System Vulnerability Trends
  • Microsoft Operating System Vulnerability Trends
  • Windows XP Vulnerability Trends
  • Windows 7 Vulnerability Trends
  • Windows Server 2012 and 2016 Vulnerability Trends
  • Windows 10 Vulnerability Trends
  • Linux Kernel Vulnerability Trends
  • Google Android Vulnerability Trends
  • Apple macOS Vulnerability Trends
  • Operating Systems Vulnerability Trend Summary
  • Web Browser Vulnerability Trends
  • Internet Explorer Vulnerability Trends
  • Microsoft Edge Vulnerability Trends
  • Google Chrome Vulnerability Trends
  • Mozilla Firefox Vulnerability Trends
  • Apple Safari Vulnerability Trends
  • Web Browser Vulnerability Trend Summary
  • Vulnerability Management Guidance
  • Chapter summary
  • References
  • Chapter 3: The Evolution of the Threat Landscape
  • Malware
  • Introduction
  • Why is there so much malware on Windows compared to other platforms?
  • Data sources
  • The Malicious Software Removal Tool
  • Real-time anti-malware tools
  • Non-security data sources
  • About malware
  • How malware infections spread
  • Trojans
  • Potentially unwanted software
  • Exploits and exploit kits
  • Worms
  • Ransomware
  • Viruses
  • Browser modifiers
  • Measuring malware prevalence
  • Global windows malware infection analysis
  • Regional windows malware infection analysis
  • The long-term view of the threat landscape in the Middle East and Northern Africa
  • 10-year regional report card for the Middle East and Northern Africa