Chapter 28

Managing Advanced Persistent Threats

E. Eugene Schultz and Cuc Du

Over the years, information security managers have faced a multitude of security threats and risks, some of which have been minor, but many of which have been major in terms of the magnitude of potential impacts to the organizations that we have served. In many ways, we have been lucky, however. With the exception of viruses and worms, the threats against the computing systems and information that we have tried to protect have been transitory. If, in the past, someone tried to attack one or more of these assets, they either succeeded or failed, and if they failed, they generally moved on to their next target. A widely accepted axiom among information security professionals ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.