Cybersecurity threats, malware trends, and strategies : mitigate exploits, malware, phishing, and other social engineering attacks /
It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt,
2020.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Copyright
- Packt Page
- Contributors
- Table of Contents
- Preface
- Chapter 1: Ingredients for a Successful Cybersecurity Strategy
- What is a cybersecurity strategy?
- How organizations get initially compromised and the cybersecurity fundamentals
- Unpatched vulnerabilities
- Security misconfigurations
- Weak, leaked, and stolen credentials
- Social engineering
- Insider threats
- Focus on the cybersecurity fundamentals
- Understanding the difference between the attacker's motivations and tactics
- Other ingredients for a successful strategy
- Business objective alignment
- Cybersecurity vision, mission, and imperatives
- Senior executive and board support
- Understand the risk appetite
- Realistic view of current cybersecurity capabilities and technical talent
- Compliance program and control framework alignment
- An effective relationship between cybersecurity and IT
- Security culture
- Chapter summary
- References
- Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs
- Introduction
- Vulnerability Management Primer
- Vulnerability Disclosure Data Sources
- Industry Vulnerability Disclosure Trends
- Reducing Risk and Costs
- Measuring Vendor and Product Improvement
- Oracle Vulnerability Trends
- Apple Vulnerability Trends
- IBM Vulnerability Trends
- Google Vulnerability Trends
- Microsoft Vulnerability Trends
- Vendor Vulnerability Trend Summary
- Operating System Vulnerability Trends
- Microsoft Operating System Vulnerability Trends
- Windows XP Vulnerability Trends
- Windows 7 Vulnerability Trends
- Windows Server 2012 and 2016 Vulnerability Trends
- Windows 10 Vulnerability Trends
- Linux Kernel Vulnerability Trends
- Google Android Vulnerability Trends
- Apple macOS Vulnerability Trends
- Operating Systems Vulnerability Trend Summary
- Web Browser Vulnerability Trends
- Internet Explorer Vulnerability Trends
- Microsoft Edge Vulnerability Trends
- Google Chrome Vulnerability Trends
- Mozilla Firefox Vulnerability Trends
- Apple Safari Vulnerability Trends
- Web Browser Vulnerability Trend Summary
- Vulnerability Management Guidance
- Chapter summary
- References
- Chapter 3: The Evolution of the Threat Landscape
- Malware
- Introduction
- Why is there so much malware on Windows compared to other platforms?
- Data sources
- The Malicious Software Removal Tool
- Real-time anti-malware tools
- Non-security data sources
- About malware
- How malware infections spread
- Trojans
- Potentially unwanted software
- Exploits and exploit kits
- Worms
- Ransomware
- Viruses
- Browser modifiers
- Measuring malware prevalence
- Global windows malware infection analysis
- Regional windows malware infection analysis
- The long-term view of the threat landscape in the Middle East and Northern Africa
- 10-year regional report card for the Middle East and Northern Africa