Cargando…

Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization /

Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rains, Tim (Autor)
Otros Autores: Youngblood, Timothy (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing Ltd., 2023.
Edición:Second edition.
Colección:Expert insight.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1367350753
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 230131s2023 enka ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d EBLCP  |d OCLCQ  |d OCLCF  |d N$T  |d NBJ  |d IEEEE  |d OCLCQ 
019 |a 1377285771 
020 |a 9781804618950  |q (electronic bk.) 
020 |a 1804618950  |q (electronic bk.) 
020 |z 9781804613672 
029 1 |a AU@  |b 000073351718 
035 |a (OCoLC)1367350753  |z (OCoLC)1377285771 
037 |a 9781804613672  |b O'Reilly Media 
037 |a 10163046  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230131 
049 |a UAMI 
100 1 |a Rains, Tim,  |e author. 
245 1 0 |a Cybersecurity threats, malware trends, and strategies :  |b discover risk mitigation strategies for modern threats to your organization /  |c Tim Rains ; foreword by Timothy Youngblood. 
250 |a Second edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing Ltd.,  |c 2023. 
300 |a 1 online resource (xvi, 555 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Expert insight 
504 |a Includes bibliographical references and index. 
520 |a Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy. 
505 0 |a Chapter 1: Introduction -- Different types of CISOs: "The CISO Spectrum" -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between attackers' motivations and tactics -- Summary -- References -- Chapter 2: What to Know about Threat Intelligence -- What is threat intelligence? 
505 8 |a Where does CTI data come from? -- Using threat intelligence -- The key to using threat intelligence -- Threat intelligence sharing -- CTI sharing protocols -- Traffic Light Protocol -- STIX and TAXII -- Reasons not to share CTI -- How to identify credible cyber threat intelligence -- Data sources -- Time periods -- Recognizing hype -- Predictions about the future -- Vendors' motives -- Summary -- References -- Chapter 3: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources 
505 8 |a Industry Vulnerability Disclosure Trends -- Vendor and Product Vulnerability Trends -- Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Microsoft Vulnerability Trends -- Oracle Vulnerability Trends -- Google Vulnerability Trends -- Debian Vulnerability Trends -- Apple Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Google Android Vulnerability Trends -- Apple iOS Vulnerability Trends -- Mobile Operating System Summary -- Microsoft Windows 10 Vulnerability Trends -- Apple macOS Vulnerability Trends 
505 8 |a Desktop Operating System Summary -- Ubuntu Linux Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Microsoft Windows Server 2016 Vulnerability Trends -- Server Operating System Summary -- Web Browser Vulnerability Trends -- Apple Safari Vulnerability Trends -- Google Chrome Vulnerability Trends -- Web Browser Summary -- Vulnerability Improvement Framework Summary -- Vulnerability Management Guidance -- Summary -- References -- Chapter 4: The Evolution of Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources 
505 8 |a The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global Windows malware infection analysis -- Regional Windows malware infection analysis -- The threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa -- The threat landscape in the European Union and Eastern Europe 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cyberterrorism. 
650 0 |a Malware (Computer software) 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
650 7 |a Malware (Computer software)  |2 fast  |0 (OCoLC)fst01748230 
655 0 |a Electronic books. 
700 1 |a Youngblood, Timothy,  |e writer of foreword. 
830 0 |a Expert insight. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781804613672/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30347745 
938 |a EBSCOhost  |b EBSC  |n 3536713 
994 |a 92  |b IZTAP