LEADER 03027oam 2200493 450 001 9910583064103321 005 20190911100031.0 035 $a(OCoLC)962064634 035 $a(MiFhGG)GVRL02VN 035 $a(EXLCZ)993710000000918309 100 $a20160719h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced persistent security $ea cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies /$fIra Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor 205 $a1st edition 210 1$aCambridge, MA :$cSyngress,$d[2017] 210 4$d?2017 215 $a1 online resource (xvii, 241 pages) 225 0 $aGale eBooks 300 $aIncludes index. 311 $a0-12-809316-1 311 $a0-12-809365-X 320 $aIncludes bibliographical references and index. 327 $aWhat is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security. 330 $aAdvanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. Contains practical and cost-effective recommendations for proactive and reactive protective measures Teaches users how to establish a viable threat intelligence program Focuses on how social networks present a double-edged sword against security programs 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aHacking 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aHacking. 676 $a005.8 700 $aWinkler$b Ira$0953871 702 $aTreu Gomes$b Araceli 702 $aShackleford$b Dave 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910583064103321 996 $aAdvanced persistent security$92157078 997 $aUNINA