Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risk...
Call Number: | Libro Electrónico |
---|---|
Main Authors: | , |
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Cambridge, MA :
Syngress,
[2017]
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- What is advanced persistent security?
- Cyberwarfare concepts
- What is proaction?
- Risk management
- How to hack computers
- Threat
- Adversary infrastructure
- Governance
- Vulnerabilities to address
- Countermeasures
- Security culture
- What is threat intelligence?
- What is detection?
- Detection deficit disorder
- The human intrusion detection system
- Kill chain analysis
- Setting reaction strategy
- Incident response and investigations
- Know yourself
- Know your adversaries
- Define your strategy
- Determining the appropriate countermeasures
- Advanced persistent security.