Показать сокращенную информацию
dc.contributor.author | Bravo Cesar. | |
dc.contributor.author | Kitchen Darren. | |
dc.date.accessioned | 2024-01-26T21:40:23Z | |
dc.date.available | 2024-01-26T21:40:23Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Bravo и др. Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. - 1 online resource (528 pages) - URL: https://libweb.kpfu.ru/ebsco/pdf/3072391.pdf | |
dc.identifier.isbn | 1800206097 | |
dc.identifier.isbn | 9781800206090 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/178658 | |
dc.description | Performing random social engineering campaigns. | |
dc.description.tableofcontents | Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password | |
dc.description.tableofcontents | Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? -- Types of vulnerabilities -- USB HID vulnerabilities | |
dc.description.tableofcontents | Types of USB HID attacks -- A false sense of security -- Protecting against USB HID attacks -- Managing cybersecurity risks -- Risk identification -- Risk assessment -- Risk response -- Risk monitoring -- The NIST Cybersecurity Framework -- Identify -- Protect -- Detect -- Respond -- Recover -- Creating an effective Business Continuity Plan (BCP) -- Creating a Business Impact Analysis (BIA) -- Business Continuity Planning (BCP) -- Implementing a best-in-class DRP -- Creating a DRP -- Implementing the DRP -- Summary -- Further reading | |
dc.description.tableofcontents | Chapter 3: Comprehending Policies, Procedures, Compliance, and Audits -- Creating world-class cybersecurity policies and procedures -- Cybersecurity policies -- Cybersecurity procedures -- The CUDSE method -- Understanding and achieving compliance -- Types of regulations -- Achieving compliance -- Exploring, creating, and managing audits -- Internal cybersecurity audits -- External cybersecurity audits -- Data management during audits -- Types of cybersecurity audit -- What triggers an audit? -- Applying a CMM -- The goals of a CMM -- Characteristics of a good CMM -- The structure of a good CMM | |
dc.description.tableofcontents | Analyzing the results -- Advantages of a CMM -- Summary -- Further reading -- Chapter 4: Patching Layer 8 -- Understanding layer 8 -- the insider threat -- The inadvertent user -- The malicious insider -- How do you spot a malicious insider? -- Protecting your infrastructure against malicious insiders -- Mastering the art of social engineering -- The social engineering cycle -- Social engineering techniques -- Types of social engineering attacks -- Defending against social engineering attacks (patching layer 8) -- Creating your training strategy -- Admin rights -- Implementing a strong BYOD policy | |
dc.language | English | |
dc.language.iso | en | |
dc.subject.other | Computer security. | |
dc.subject.other | Information technology -- Security measures. | |
dc.subject.other | Computer Security | |
dc.subject.other | Sécurité informatique. | |
dc.subject.other | Technologie de l'information -- Sécurité -- Mesures. | |
dc.subject.other | Computer security. | |
dc.subject.other | Information technology -- Security measures. | |
dc.subject.other | Electronic books. | |
dc.title | Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. | |
dc.type | Book | |
dc.description.pages | 1 online resource (528 pages) | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C1888 |