Book description
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
- Contains practical and cost-effective recommendations for proactive and reactive protective measures
- Teaches users how to establish a viable threat intelligence program
- Focuses on how social networks present a double-edged sword against security programs
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Authors
- Introduction
- Chapter 1. What Is Advanced Persistent Security?
- Section 1. Concepts/Foundation
- Section 2. Protection
- Section 3. Detection
- Section 4. Reaction
-
Section 5. Implementation
- Introduction
-
Chapter 19. Know Yourself
- Is There Proper Governance in Place?
- How Many People Are There in the Enterprise?
- What Is the Range of Job Functions?
- What Information Is Involved?
- What Industry Are You in?
- What Is Your Technology Posture?
- Are There Special Technologies in Use?
- Do You Understand Your Network?
- Perform a Security Assessment
- What Is Your Physical Security Posture?
- How Is Data Transported?
- Who Are Your Adversaries?
- What Is the Security Posture of Similar Enterprises?
- Summary
- Chapter 20. Know Your Adversaries
- Chapter 21. Define Your Strategy
- Chapter 22. Determining the Appropriate Countermeasures
- Chapter 23. Advanced Persistent Security
- Index
Product information
- Title: Advanced Persistent Security
- Author(s):
- Release date: November 2016
- Publisher(s): Syngress
- ISBN: 9780128093658
You might also like
book
Cybersecurity Attacks – Red Team Strategies
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Hunting Cyber Criminals
The skills and tools for collecting, verifying and correlating information from different types of systems is …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …