Table of Contents
Preface
Part 1: Understanding Defense in Depth – The Core Principle
1
Navigating Risk, Classifying Assets, and Unveiling Threats
Foundations of security principles
Brief history of information security
The CIA Triad – Confidentiality, integrity, and availability
Security standards, policies, and guidelines
Evolution of cyber threats and attack strategies
Security controls
Risk-based approach to security
Understanding risk management
Risk analysis
Threat modeling
Balancing risk with business needs
Identifying threat actors and understanding their motivations
Types of attackers
Threat actor motivations
Real-world examples
Security through the ages
Trends in security
The rise of cloud computing
Security is omnipresent
Summary ...
Get The Complete Guide to Defense in Depth now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.