O'Reilly logo

Advanced Persistent Threat by Eric Cole

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

Adaptive security, 34
asset identification and valuation, 268
behavioral analysis, 273274
cloud computing, 274
cost benefit analysis, 271272
critical security controls. See Critical security controls
crypto, 274
damage minimization and control with, 258261
attachments conversion, 259
external users to create internal email, 261
indication of internal/external email, 259
remove all executable content and/or html encoding, 260261
running email client/attachment in virtual machine, 258259
data, 262265
classification, 263
correlation, 273
discovery, 263264
encryption to key management, 274
isolation, 264
prioritization, 262
protection, 265
reduction, 264
endpoint security, 273
final security roadmap, 272
game plan, 265267
data or information, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required