- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 165字
- 2021-06-30 19:15:47
Summary
In this chapter, you learned more about the current threat landscape and how these new threats are used to compromise credentials, apps, and data. In many scenarios, old hacking techniques are used, such as phishing emails. However, with a more sophisticated approach. You also learned the current reality regarding the nationwide type of threat, and government-targeted attacks. In order to protect your organization against these new threats, you learned about key factors that can help you to enhance your security posture. It is essential that part of this enhancement shifts the attention from protection only to include detection and response. For that, the use of Red and Blue Team becomes imperative. The same concept applies to the assume breach methodology.
In the next chapter, you will continue to learn about the enhancement of your security posture. However, the chapter will focus on the incident response process. The incident response process is primordial for companies that need a better detection and response against cyber threats.
- Windows Server 2019 Cookbook
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- 零起點學Linux系統管理
- 網絡操作系統:Windows Server 2003管理與應用
- UNIX操作系統設計
- 開源安全運維平臺OSSIM疑難解析:入門篇
- Windows Phone 7.5 Data Cookbook
- Installing and Configuring Windows 10:70-698 Exam Guide
- 嵌入式Linux驅動程序和系統開發實例精講
- 無蘋果不生活 The New iPad隨身寶典
- 深入淺出Node.js
- Linux服務器配置與管理
- Django Project Blueprints
- Linux基礎使用與案例
- CentOS 6 Linux Server Cookbook