Book description
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats
Key Features
- Protect your financial environment with cybersecurity practices and methodologies
- Identify vulnerabilities such as data manipulation and fraudulent transactions
- Provide end-to-end protection within organizations
Book Description
Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security.
The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services.
By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures.
What you will learn
- Understand the cyber threats faced by organizations
- Discover how to identify attackers
- Perform vulnerability assessment, software testing, and pentesting
- Defend your financial cyberspace using mitigation techniques and remediation plans
- Implement encryption and decryption
- Understand how Artificial Intelligence (AI) affects cybersecurity
Who this book is for
Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- About Packt
- Foreword
- Contributors
- Preface
-
Introduction to Cybersecurity and the Economy
- What is cybersecurity – a brief technical description?
- The scope of cybersecurity
- General description of hacking groups and cyber espionage
- Cybersecurity objectives
- Financial repercussion of reputational damage caused by cyber attacks
- Digital economy and related threats
- Summary
- Further reading
- Cyber Crime - Who the Attackers Are
-
Counting the Costs
- The cost of a cybersecurity attack
- Breakdown of the costs of a cyber attack
- Breakdown of the cost of securing an organization
-
Bonus
- What is Microsoft offering?
- Windows 10 Defender Security Center
- Windows Defender
- Windows Defender Exploit Guard
- Controlled folder access
- Network protection
- Attack surface reduction
- Windows Defender Credential Guard
- Windows Defender Application Guard
- Windows Event Forwarding
- Windows Defender Advanced Threat Protection
- Protecting privileged identities
- Summary
- Further reading
- The Threat Landscape
- Phishing, Spamming, and Scamming to Steal Data and Money
- The Malware Plague
- Vulnerabilities and Exploits
- Attacking Online Banking Systems
- Vulnerable Networks and Services - a Gateway for Intrusion
- Responding to Service Disruption
- The Human Problem - Governance Fail
- Securing the Perimeter and Protecting the Assets
-
Threat and Vulnerability Management
- Vulnerability management strategy
- Defining vulnerabilities in a few steps
- The root cause of security issues
- Vulnerability management tools
- Implementation of vulnerability management
- Best practices for vulnerability management
-
Assess yourself
-
Tying vulnerability assessments into business impact
- Take an active role
- Identify and understand the business processes
- Pinpoint the applications and data
- Try to find hidden data sources
- Determine the hardware structure
- Map the network infrastructure to hardware
- Identify the controls
- Run the vulnerability scans
- Read the results of the scans
- Conduct penetration testing by third parties as well
-
Tying vulnerability assessments into business impact
- Understanding risk management
- Defense in depth approach
- Summary
- Further reading
- Audit, Risk Management, and Incident Handling
- Encryption and Cryptography for Protecting Data and Services
- The Rise of the Blockchain
- Artificial Intelligence and Cybersecurity
- The Quantum Future
- Other Books You May Enjoy
Product information
- Title: Hands-On Cybersecurity for Finance
- Author(s):
- Release date: January 2019
- Publisher(s): Packt Publishing
- ISBN: 9781788836296
You might also like
book
The Official (ISC)2 Guide to the CISSP CBK Reference, 5th Edition
The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this …
book
Threat Modeling: Designing for Security
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of …
book
AWS Certified Solutions Architect Official Study Guide
Validate your AWS skills. This is your opportunity to take the next step in your career …
book
Python Crash Course, 2nd Edition
This is the second edition of the best selling Python book in the world. Python Crash …