Электронный архив

Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.

Показать сокращенную информацию

dc.contributor.author Bravo Cesar.
dc.contributor.author Kitchen Darren.
dc.date.accessioned 2024-01-26T21:40:23Z
dc.date.available 2024-01-26T21:40:23Z
dc.date.issued 2022
dc.identifier.citation Bravo и др. Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. - 1 online resource (528 pages) - URL: https://libweb.kpfu.ru/ebsco/pdf/3072391.pdf
dc.identifier.isbn 1800206097
dc.identifier.isbn 9781800206090
dc.identifier.uri https://dspace.kpfu.ru/xmlui/handle/net/178658
dc.description Performing random social engineering campaigns.
dc.description.tableofcontents Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password
dc.description.tableofcontents Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? -- Types of vulnerabilities -- USB HID vulnerabilities
dc.description.tableofcontents Types of USB HID attacks -- A false sense of security -- Protecting against USB HID attacks -- Managing cybersecurity risks -- Risk identification -- Risk assessment -- Risk response -- Risk monitoring -- The NIST Cybersecurity Framework -- Identify -- Protect -- Detect -- Respond -- Recover -- Creating an effective Business Continuity Plan (BCP) -- Creating a Business Impact Analysis (BIA) -- Business Continuity Planning (BCP) -- Implementing a best-in-class DRP -- Creating a DRP -- Implementing the DRP -- Summary -- Further reading
dc.description.tableofcontents Chapter 3: Comprehending Policies, Procedures, Compliance, and Audits -- Creating world-class cybersecurity policies and procedures -- Cybersecurity policies -- Cybersecurity procedures -- The CUDSE method -- Understanding and achieving compliance -- Types of regulations -- Achieving compliance -- Exploring, creating, and managing audits -- Internal cybersecurity audits -- External cybersecurity audits -- Data management during audits -- Types of cybersecurity audit -- What triggers an audit? -- Applying a CMM -- The goals of a CMM -- Characteristics of a good CMM -- The structure of a good CMM
dc.description.tableofcontents Analyzing the results -- Advantages of a CMM -- Summary -- Further reading -- Chapter 4: Patching Layer 8 -- Understanding layer 8 -- the insider threat -- The inadvertent user -- The malicious insider -- How do you spot a malicious insider? -- Protecting your infrastructure against malicious insiders -- Mastering the art of social engineering -- The social engineering cycle -- Social engineering techniques -- Types of social engineering attacks -- Defending against social engineering attacks (patching layer 8) -- Creating your training strategy -- Admin rights -- Implementing a strong BYOD policy
dc.language English
dc.language.iso en
dc.subject.other Computer security.
dc.subject.other Information technology -- Security measures.
dc.subject.other Computer Security
dc.subject.other Sécurité informatique.
dc.subject.other Technologie de l'information -- Sécurité -- Mesures.
dc.subject.other Computer security.
dc.subject.other Information technology -- Security measures.
dc.subject.other Electronic books.
dc.title Mastering Defensive Security: Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.
dc.type Book
dc.description.pages 1 online resource (528 pages)
dc.collection Электронно-библиотечные системы
dc.source.id EN05CEBSCO05C1888


Файлы в этом документе

Данный элемент включен в следующие коллекции

Показать сокращенную информацию

Поиск в электронном архиве


Расширенный поиск

Просмотр

Моя учетная запись

Статистика