Vai al contenuto principale della pagina

Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Winkler Ira Visualizza persona
Titolo: Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor Visualizza cluster
Pubblicazione: Cambridge, MA : , : Syngress, , [2017]
�2017
Edizione: 1st edition
Descrizione fisica: 1 online resource (xvii, 241 pages)
Disciplina: 005.8
Soggetto topico: Computer networks - Security measures
Computer security
Hacking
Persona (resp. second.): Treu GomesAraceli
ShacklefordDave
Note generali: Includes index.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: What is advanced persistent security? -- Cyberwarfare concepts -- What is proaction? -- Risk management -- How to hack computers -- Threat -- Adversary infrastructure -- Governance -- Vulnerabilities to address -- Countermeasures -- Security culture -- What is threat intelligence? -- What is detection? -- Detection deficit disorder -- The human intrusion detection system -- Kill chain analysis -- Setting reaction strategy -- Incident response and investigations -- Know yourself -- Know your adversaries -- Define your strategy -- Determining the appropriate countermeasures -- Advanced persistent security.
Sommario/riassunto: Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. Contains practical and cost-effective recommendations for proactive and reactive protective measures Teaches users how to establish a viable threat intelligence program Focuses on how social networks present a double-edged sword against security programs
Titolo autorizzato: Advanced persistent security  Visualizza cluster
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910583064103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui