Book description
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
- Contains practical and cost-effective recommendations for proactive and reactive protective measures
- Teaches users how to establish a viable threat intelligence program
- Focuses on how social networks present a double-edged sword against security programs
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Authors
- Introduction
- Chapter 1. What Is Advanced Persistent Security?
- Section 1. Concepts/Foundation
- Section 2. Protection
- Section 3. Detection
- Section 4. Reaction
-
Section 5. Implementation
- Introduction
-
Chapter 19. Know Yourself
- Is There Proper Governance in Place?
- How Many People Are There in the Enterprise?
- What Is the Range of Job Functions?
- What Information Is Involved?
- What Industry Are You in?
- What Is Your Technology Posture?
- Are There Special Technologies in Use?
- Do You Understand Your Network?
- Perform a Security Assessment
- What Is Your Physical Security Posture?
- How Is Data Transported?
- Who Are Your Adversaries?
- What Is the Security Posture of Similar Enterprises?
- Summary
- Chapter 20. Know Your Adversaries
- Chapter 21. Define Your Strategy
- Chapter 22. Determining the Appropriate Countermeasures
- Chapter 23. Advanced Persistent Security
- Index
Product information
- Title: Advanced Persistent Security
- Author(s):
- Release date: November 2016
- Publisher(s): Syngress
- ISBN: 9780128093658
You might also like
book
Advanced Persistent Threat
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The …
book
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve …
book
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …