Book description
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.
Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.
- How and why organizations are being attacked
- How to develop a "Risk based Approach to Security"
- Tools for protecting data and preventing attacks
- Critical information on how to respond and recover from an intrusion
- The emerging threat to Cloud based networks
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Author Biography
- Preface
-
Section I. Understanding the Problem
-
Chapter 1. The Changing Threat
- Introduction
- The Current Landscape
- Organizations View on Security
- You will be Compromised
- The Cyber ShopLifter
- The New Defense in Depth
- Proactive vs Reactive
- Loss of Common Sense
- It is All About Risk
- What Was In Place?
- Pain Killer Security
- Reducing the Surface Space
- HTML Embedded Email
- Buffer Overflows
- Macros in Office Documents
- The Traditional Threat
- Common Cold
- Reactive Security
- Automation
- The Emerging Threat
- APT—Cyber Cancer
- Advanced Persistent Threat (APT)
- APT—Stealthy, Targeted, and Data Focused
- Characteristics of the APT
- Defending Against the APT
- APT vs Traditional Threat
- Sample APT Attacks
- APT Multi-Phased Approach
- Summary
-
Chapter 2. Why are Organizations Being Compromised?
- Introduction
- Doing Good Things and Doing the Right Things
- Security is Not Helpless
- Beyond Good or Bad
- Attackers are in Your Network
- Proactive, Predictive, and Adaptive
- Example of How to Win
- Data Centric Security
- Money Does Not Equal Security
- The New Approach to APT
- Selling Security to Your Executives
- Top Security Trends
- Summary
-
Chapter 3. How are Organizations Being Compromised?
- Introduction
- What are Attackers After?
- Attacker Process
- Reconnaissance
- Scanning
- Exploitation
- Create Backdoors
- Cover Their Tracks
- Compromising a Server
- Compromising a Client
- Insider Threat
- Traditional Security
- Firewalls
- Dropped Packets
- InBound Prevention and OutBound Detection
- Intrusion Detection
- Summary
- Chapter 4. Risk-Based Approach to Security
-
Chapter 1. The Changing Threat
- Section II. Emerging Trends
- Section III. The Future and How to Win
- Index
Product information
- Title: Advanced Persistent Threat
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9781597499552
You might also like
book
Advanced Persistent Security
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, …
book
Advanced Persistent Threat Hacking
Master the tactics and tools of the advanced persistent threat hacker In this book, IT security …
book
Enhanced Cyber Resilience Solution by Threat Detection using IBM Cloud Object Storage System and IBM QRadar SIEM
This Solution Redpaper™ publication explains how the features of IBM Cloud® Object Storage System reduces the …
book
The Foundations of Threat Hunting
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in …