舉報

會員
Cybersecurity Threats,Malware Trends,and Strategies
最新章節:
Index
CybersecurityThreats,MalwareTrends,andStrategiessharesnumerousinsightsaboutthethreatsthatbothpublicandprivatesectororganizationsfaceandthecybersecuritystrategiesthatcanmitigatethem.Thebookprovidesanunprecedentedlong-termviewoftheglobalthreatlandscapebyexaminingthetwenty-yeartrendinvulnerabilitydisclosuresandexploitation,nearlyadecadeofregionaldifferencesinmalwareinfections,thesocio-economicfactorsthatunderpinthem,andhowglobalmalwarehasevolved.Thiswillgiveyoufurtherperspectivesintomalwareprotectionforyourorganization.Italsoexaminesinternet-basedthreatsthatCISOsshouldbeawareof.Thebookwillprovideyouwithanevaluationofthevariouscybersecuritystrategiesthathaveultimatelyfailedoverthepasttwentyyears,alongwithoneortwothathaveactuallyworked.Itwillhelpexecutivesandsecurityandcomplianceprofessionalsunderstandhowcloudcomputingisagamechangerforthem.Bytheendofthisbook,youwillknowhowtomeasuretheeffectivenessofyourorganization’scybersecuritystrategyandtheefficacyofthevendorsyouemploytohelpyouprotectyourorganizationandyourself.
目錄(78章)
倒序
- 封面
- Cybersecurity Threats Malware Trends and Strategies
- Why subscribe?
- Contributors
- About the author
- About the reviewer
- Preface
- Who this book is for?
- What this book covers
- To get the most out of this book
- Conventions used
- Get in touch
- 1 Ingredients for a Successful Cybersecurity Strategy
- What is a cybersecurity strategy?
- How organizations get initially compromised and the cybersecurity fundamentals
- Understanding the difference between the attacker's motivations and tactics
- Other ingredients for a successful strategy
- Chapter summary
- References
- 2 Using Vulnerability Trends to Reduce Risk and Costs
- Introduction
- Vulnerability Management Primer
- Chapter summary
- References
- 3 The Evolution of the Threat Landscape – Malware
- Introduction
- Why is there so much malware on Windows compared to other platforms?
- Data sources
- About malware
- Global Windows malware infection analysis
- Regional Windows malware infection analysis
- Global malware evolution
- The great debate – are anti-malware solutions really worthwhile?
- Threat intelligence best practices and tips
- Chapter summary
- References
- 4 Internet-Based Threats
- Introduction
- A typical attack
- Phishing attacks
- Drive-by download attacks
- Malware hosting sites
- Post compromise – botnets and DDoS attacks
- Chapter summary
- References
- 5 Cybersecurity Strategies
- Introduction
- Measuring the efficacy of cybersecurity strategies
- Cybersecurity strategies
- Chapter summary
- References
- 6 Strategy Implementation
- Introduction
- What is an Intrusion Kill Chain?
- Modernizing the kill chain
- Getting started
- Implementing this strategy
- Conclusion
- Chapter summary
- References
- 7 Measuring Performance and Effectiveness
- Introduction
- Using vulnerability management data
- Measuring performance and efficacy of an Attack-Centric Strategy
- Chapter summary
- References
- 8 The Cloud – A Modern Approach to Security and Compliance
- Introduction
- How is cloud computing different?
- Security and compliance game changers
- Using cybersecurity strategies in the cloud
- Encryption and key management
- Conclusion
- Chapter summary
- References
- Other Books You May Enjoy
- Leave a review - let other readers know what you think
- Index 更新時間:2021-06-30 14:49:26
推薦閱讀
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 網絡安全技術與實訓(第4版)(微課版)
- Learning Devise for Rails
- 云原生安全技術實踐指南
- API安全技術與實戰
- Web安全之深度學習實戰
- 網絡安全應急響應實戰
- 黑客攻防實戰從入門到精通
- 信息安全工程與實踐
- 網絡安全實戰詳解(企業專供版)
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 信息系統安全等級化保護原理與實踐
- 云計算安全:關鍵技術、原理及應用
- Manga Studio 5 Beginner's Guide
- Hands-On Bug Hunting for Penetration Testers
- 反黑風暴:黑客社會工程學攻防演練
- 云原生安全
- 從實踐中學習TCP/IP協議
- 智能制造的信息安全
- 計算機網絡安全
- 商用密碼權威指南:技術詳解、產品開發與工程實踐
- INSTANT Citrix Security How-to
- Binary Analysis Cookbook
- 網絡靶場與攻防演練
- 計算機病毒學
- 物聯網安全與隱私保護
- Cuckoo Malware Analysis
- 云計算安全
- 網絡攻擊與防御技術
- Learn Computer Forensics