- Cybersecurity Threats,Malware Trends,and Strategies
- Tim Rains
- 339字
- 2021-06-30 14:49:11
What this book covers
Chapter 1, Ingredients for a Successful Cybersecurity Strategy, provides a detailed look at the ingredients that are necessary for a successful cybersecurity program.
Chapter 2, Using Vulnerability Trends to Reduce Risk and Costs, provides a unique 20-year view of vulnerabilities, using vulnerability disclosure data from the National Vulnerability Database. This will help the reader more accurately evaluate the efficacy of cybersecurity strategies discussed in later chapters.
Chapter 3, The Evolution of the Threat Landscape – Malware, provides a unique data-driven perspective of how malware has evolved around the world over a 10 year period. This helps the reader understand the types of malware threats they face and which malware threats are most, and least, prevalent.
Chapter 4, Internet-Based Threats, examines some of the way's attackers have been using the internet and how these methods have evolved over time. This chapter dives into phishing attacks, drive-by download attacks and malware hosting sites.
Chapter 5, Cybersecurity Strategies, discusses the major cybersecurity strategies employed in the industry for the past 20 years or so. This chapter introduces the Cybersecurity Fundamentals Scoring System, which enables the reader to estimate an efficacy score for any cybersecurity strategy.
Chapter 6, Strategy Implementation, provides an example of how one of the best cybersecurity strategies identified can be implemented. This chapter illustrates how an Attack-Centric Strategy, namely the Intrusion Kill Chain, can be implemented.
Chapter 7, Measuring Performance and Effectiveness, looks at the challenge that CISOs and security teams have always had and how to measure the effectiveness of their cybersecurity program. This chapter examines how to measure the performance and effectiveness of a cybersecurity strategy.
Chapter 8, The Cloud – A Modern Approach to Security and Compliance, provides an overview of how the cloud is a great cybersecurity talent amplifier. This chapter looks at how the cloud can mitigate the ways enterprises typically get compromised. Additionally, this chapter dives into how security teams can use encryption and key management to protect data in the cloud.
- 網(wǎng)絡(luò)安全與管理
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- CTF實戰(zhàn):技術(shù)、解題與進階
- Metasploit Penetration Testing Cookbook(Third Edition)
- 黑客攻防入門秘笈
- 工業(yè)控制網(wǎng)絡(luò)安全技術(shù)
- 移動APT:威脅情報分析與數(shù)據(jù)防護
- 硬黑客:智能硬件生死之戰(zhàn)
- ARM匯編與逆向工程:藍狐卷·基礎(chǔ)知識
- Mastering Reverse Engineering
- 電腦安全與攻防入門很輕松(實戰(zhàn)超值版)
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 信息安全工程與實踐
- 計算機網(wǎng)絡(luò)安全實驗指導(dǎo)
- 計算機病毒揭秘與對抗