Contents

Introduction

Part I Cyber Network Security Concepts

Chapter 1 Executive Summary

Why Start with Antipatterns?

Security Architecture

Antipattern: Signature-Based Malware Detection versus Polymorphic Threats

Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection

Antipattern: Document-Driven Certification and Accreditation

Antipattern: Proliferating IA Standards with No Proven Benefits

Antipattern: Policy-Driven Security Certifications Do Not Address the Threat

Refactored Solution: Security Training Roadmap

Summary

Assignments

Chapter 2 The Problems: Cyber Antipatterns

Antipatterns Concept

Forces in Cyber Antipatterns

Cyber Antipattern Templates

Micro-Antipattern Templates

Full Cyber Antipattern Template

Cybersecurity Antipattern Catalog

Can't Patch Dumb

Unpatched Applications

Never Read the Logs

Networks Always Play by the Rules

Hard on the Outside, Gooey in the Middle

Webify Everything

No Time for Security

Summary

Assignments

Chapter 3 Enterprise Security Using the Zachman Framework

What Is Architecture? Why Do We Need It?

Enterprises Are Complex and Changing

The Zachman Framework for Enterprise Architecture

Primitive Models versus Composite Models

How Does the Zachman Framework Help with Cybersecurity?

Everyone Has Their Own Specifications

The Goldmine Is in Row 2

Frameworks for Row 3

Architectural Problem Solving Patterns

Business Question Analysis

Document Mining

Hierarchy Formation

Enterprise Workshop

Matrix Mining

Nominal Group Technique ...

Get Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.