Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization /
Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing Ltd.,
2023.
|
Edición: | Second edition. |
Colección: | Expert insight.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Chapter 1: Introduction
- Different types of CISOs: "The CISO Spectrum"
- How organizations get initially compromised and the cybersecurity fundamentals
- Unpatched vulnerabilities
- Security misconfigurations
- Weak, leaked, and stolen credentials
- Social engineering
- Insider threats
- Focus on the cybersecurity fundamentals
- Understanding the difference between attackers' motivations and tactics
- Summary
- References
- Chapter 2: What to Know about Threat Intelligence
- What is threat intelligence?
- Where does CTI data come from?
- Using threat intelligence
- The key to using threat intelligence
- Threat intelligence sharing
- CTI sharing protocols
- Traffic Light Protocol
- STIX and TAXII
- Reasons not to share CTI
- How to identify credible cyber threat intelligence
- Data sources
- Time periods
- Recognizing hype
- Predictions about the future
- Vendors' motives
- Summary
- References
- Chapter 3: Using Vulnerability Trends to Reduce Risk and Costs
- Introduction
- Vulnerability Management Primer
- Vulnerability Disclosure Data Sources
- Industry Vulnerability Disclosure Trends
- Vendor and Product Vulnerability Trends
- Reducing Risk and Costs
- Measuring Vendor and Product Improvement
- Microsoft Vulnerability Trends
- Oracle Vulnerability Trends
- Google Vulnerability Trends
- Debian Vulnerability Trends
- Apple Vulnerability Trends
- Vendor Vulnerability Trend Summary
- Operating System Vulnerability Trends
- Google Android Vulnerability Trends
- Apple iOS Vulnerability Trends
- Mobile Operating System Summary
- Microsoft Windows 10 Vulnerability Trends
- Apple macOS Vulnerability Trends
- Desktop Operating System Summary
- Ubuntu Linux Vulnerability Trends
- Linux Kernel Vulnerability Trends
- Microsoft Windows Server 2016 Vulnerability Trends
- Server Operating System Summary
- Web Browser Vulnerability Trends
- Apple Safari Vulnerability Trends
- Google Chrome Vulnerability Trends
- Web Browser Summary
- Vulnerability Improvement Framework Summary
- Vulnerability Management Guidance
- Summary
- References
- Chapter 4: The Evolution of Malware
- Introduction
- Why is there so much malware on Windows compared to other platforms?
- Data sources
- The Malicious Software Removal Tool
- Real-time anti-malware tools
- Non-security data sources
- About malware
- How malware infections spread
- Trojans
- Potentially unwanted software
- Exploits and exploit kits
- Worms
- Ransomware
- Viruses
- Browser modifiers
- Measuring malware prevalence
- Global Windows malware infection analysis
- Regional Windows malware infection analysis
- The threat landscape in the Middle East and Northern Africa
- 10-year regional report card for the Middle East and Northern Africa
- The threat landscape in the European Union and Eastern Europe