dc.contributor.author |
Bravo Cesar. |
|
dc.contributor.author |
Kitchen Darren. |
|
dc.date.accessioned |
2024-01-26T21:40:23Z |
|
dc.date.available |
2024-01-26T21:40:23Z |
|
dc.date.issued |
2022 |
|
dc.identifier.citation |
Bravo и др. Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. - 1 online resource (528 pages) - URL: https://libweb.kpfu.ru/ebsco/pdf/3072391.pdf |
|
dc.identifier.isbn |
1800206097 |
|
dc.identifier.isbn |
9781800206090 |
|
dc.identifier.uri |
https://dspace.kpfu.ru/xmlui/handle/net/178658 |
|
dc.description |
Performing random social engineering campaigns. |
|
dc.description.tableofcontents |
Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password |
|
dc.description.tableofcontents |
Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? -- Types of vulnerabilities -- USB HID vulnerabilities |
|
dc.description.tableofcontents |
Types of USB HID attacks -- A false sense of security -- Protecting against USB HID attacks -- Managing cybersecurity risks -- Risk identification -- Risk assessment -- Risk response -- Risk monitoring -- The NIST Cybersecurity Framework -- Identify -- Protect -- Detect -- Respond -- Recover -- Creating an effective Business Continuity Plan (BCP) -- Creating a Business Impact Analysis (BIA) -- Business Continuity Planning (BCP) -- Implementing a best-in-class DRP -- Creating a DRP -- Implementing the DRP -- Summary -- Further reading |
|
dc.description.tableofcontents |
Chapter 3: Comprehending Policies, Procedures, Compliance, and Audits -- Creating world-class cybersecurity policies and procedures -- Cybersecurity policies -- Cybersecurity procedures -- The CUDSE method -- Understanding and achieving compliance -- Types of regulations -- Achieving compliance -- Exploring, creating, and managing audits -- Internal cybersecurity audits -- External cybersecurity audits -- Data management during audits -- Types of cybersecurity audit -- What triggers an audit? -- Applying a CMM -- The goals of a CMM -- Characteristics of a good CMM -- The structure of a good CMM |
|
dc.description.tableofcontents |
Analyzing the results -- Advantages of a CMM -- Summary -- Further reading -- Chapter 4: Patching Layer 8 -- Understanding layer 8 -- the insider threat -- The inadvertent user -- The malicious insider -- How do you spot a malicious insider? -- Protecting your infrastructure against malicious insiders -- Mastering the art of social engineering -- The social engineering cycle -- Social engineering techniques -- Types of social engineering attacks -- Defending against social engineering attacks (patching layer 8) -- Creating your training strategy -- Admin rights -- Implementing a strong BYOD policy |
|
dc.language |
English |
|
dc.language.iso |
en |
|
dc.subject.other |
Computer security. |
|
dc.subject.other |
Information technology -- Security measures. |
|
dc.subject.other |
Computer Security |
|
dc.subject.other |
Sécurité informatique. |
|
dc.subject.other |
Technologie de l'information -- Sécurité -- Mesures. |
|
dc.subject.other |
Computer security. |
|
dc.subject.other |
Information technology -- Security measures. |
|
dc.subject.other |
Electronic books. |
|
dc.title |
Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. |
|
dc.type |
Book |
|
dc.description.pages |
1 online resource (528 pages) |
|
dc.collection |
Электронно-библиотечные системы |
|
dc.source.id |
EN05CEBSCO05C1888 |
|