Book description
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats
Key Features
- Protect your financial environment with cybersecurity practices and methodologies
- Identify vulnerabilities such as data manipulation and fraudulent transactions
- Provide end-to-end protection within organizations
Book Description
Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security.
The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services.
By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures.
What you will learn
- Understand the cyber threats faced by organizations
- Discover how to identify attackers
- Perform vulnerability assessment, software testing, and pentesting
- Defend your financial cyberspace using mitigation techniques and remediation plans
- Implement encryption and decryption
- Understand how Artificial Intelligence (AI) affects cybersecurity
Who this book is for
Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
Publisher resources
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- About Packt
- Foreword
- Contributors
- Preface
-
Introduction to Cybersecurity and the Economy
- What is cybersecurity – a brief technical description?
- The scope of cybersecurity
- General description of hacking groups and cyber espionage
- Cybersecurity objectives
- Financial repercussion of reputational damage caused by cyber attacks
- Digital economy and related threats
- Summary
- Further reading
- Cyber Crime - Who the Attackers Are
-
Counting the Costs
- The cost of a cybersecurity attack
- Breakdown of the costs of a cyber attack
- Breakdown of the cost of securing an organization
-
Bonus
- What is Microsoft offering?
- Windows 10 Defender Security Center
- Windows Defender
- Windows Defender Exploit Guard
- Controlled folder access
- Network protection
- Attack surface reduction
- Windows Defender Credential Guard
- Windows Defender Application Guard
- Windows Event Forwarding
- Windows Defender Advanced Threat Protection
- Protecting privileged identities
- Summary
- Further reading
- The Threat Landscape
- Phishing, Spamming, and Scamming to Steal Data and Money
- The Malware Plague
- Vulnerabilities and Exploits
- Attacking Online Banking Systems
- Vulnerable Networks and Services - a Gateway for Intrusion
- Responding to Service Disruption
- The Human Problem - Governance Fail
- Securing the Perimeter and Protecting the Assets
-
Threat and Vulnerability Management
- Vulnerability management strategy
- Defining vulnerabilities in a few steps
- The root cause of security issues
- Vulnerability management tools
- Implementation of vulnerability management
- Best practices for vulnerability management
-
Assess yourself
-
Tying vulnerability assessments into business impact
- Take an active role
- Identify and understand the business processes
- Pinpoint the applications and data
- Try to find hidden data sources
- Determine the hardware structure
- Map the network infrastructure to hardware
- Identify the controls
- Run the vulnerability scans
- Read the results of the scans
- Conduct penetration testing by third parties as well
-
Tying vulnerability assessments into business impact
- Understanding risk management
- Defense in depth approach
- Summary
- Further reading
- Audit, Risk Management, and Incident Handling
- Encryption and Cryptography for Protecting Data and Services
- The Rise of the Blockchain
- Artificial Intelligence and Cybersecurity
- The Quantum Future
- Other Books You May Enjoy
Product information
- Title: Hands-On Cybersecurity for Finance
- Author(s):
- Release date: January 2019
- Publisher(s): Packt Publishing
- ISBN: 9781788836296
You might also like
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Cybersecurity Career Master Plan
Start your Cybersecurity career with expert advice on how to get certified, find your first job, …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness …