- Cybersecurity Threats,Malware Trends,and Strategies
- Tim Rains
- 145字
- 2021-06-30 14:49:12
1
Ingredients for a Successful Cybersecurity Strategy
There's no doubt that enterprises today, more than ever, need effective cybersecurity strategies. However a sound strategy is not in and of itself a guarantee of success. There are several ingredients that are necessary for a cybersecurity program to be successful. This chapter will describe what a cybersecurity strategy looks like and each of the necessary ingredients for success in detail.
Throughout this chapter, we'll cover the following topics:
- Defining the term cybersecurity strategy
- Common ways organizations become compromised, and how the mitigation of these are fundamental to effective cybersecurity
- Understanding the difference between an attacker's motivation and their tactics
- Additional guidance on formulating a successful cybersecurity strategy
Let's begin with a fundamental question that we'll need to answer before discussing cybersecurity strategy in any detail: what do we actually mean when we say "cybersecurity strategy"?
推薦閱讀
- 數(shù)據(jù)恢復(fù)方法及案例分析
- Kali Linux CTF Blueprints
- 信息系統(tǒng)安全檢測與風(fēng)險(xiǎn)評(píng)估
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- CTF競賽權(quán)威指南(Pwn篇)
- Kali Linux無線網(wǎng)絡(luò)滲透測試詳解
- 信息組織
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御
- 黑客攻防從入門到精通:絕招版(第2版)
- 互聯(lián)網(wǎng)域名國際化與安全技術(shù)導(dǎo)論
- 工業(yè)控制系統(tǒng)網(wǎng)絡(luò)安全實(shí)戰(zhàn)
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)基礎(chǔ)理論及關(guān)鍵技術(shù)
- 網(wǎng)絡(luò)設(shè)備安全與防火墻
- 計(jì)算機(jī)病毒技術(shù)及其防御
- Burp Suite Essentials