top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam
Autore Donaldson Scott E.
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015
Descrizione fisica 1 online resource (508 p.)
Disciplina 004
Collana Expert's Voice in Cybersecurity
Soggetto topico Data protection
Data encryption (Computer science)
Security
Cryptology
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents at a Glance; Contents; Foreword; About the Authors; Acknowledgments ; Introduction; Part I: The Cybersecurity Challenge ; Chapter 1: Defining the Cybersecurity Challenge; The Cyberattacks of Today; The Sony Pictures Entertainment Breach of 2014; Advanced Persistent Threats; Waves of Malware; Types of Cyberattackers; Commodity Threats; Hacktivists; Organized Crime ; Espionage ; Cyberwar ; The Types of Cyberattacks; Confidentiality: Steal Data; Integrity: Modify Data (Steal Money); Availability: Deny Access; The Steps of a Cyberintrusion; Attack Trees and Attack Graphs
Lockheed Martin Kill Chain Mandiant Attack Life Cycle; Enterprise Cybersecurity Attack Sequence; Why Cyberintrusions Succeed; The Explosion in Connectivity; Consolidation of Enterprise IT; Defeat of Preventive Controls; Failure of Detective Controls; Compliance over Capability; The Gap in Cybersecurity Effectiveness; A New Cybersecurity Mindset; An Effective Enterprise Cybersecurity Program; Chapter 2: Meeting the Cybersecurity Challenge; Cybersecurity Frameworks; The Cybersecurity Process; Cybersecurity Challenges; The Risk Management Process
Considering Vulnerabilities, Threats, and Risks Risk Analysis and Mitigation; Cybersecurity Controls; Cybersecurity Capabilities; Cybersecurity and Enterprise IT; Emplacing Cyberdefenses ; H ow Cyberdefenses Interconnect; An Enterprise Cybersecurity Architecture; Part II: A New Enterprise Cybersecurity Architecture ; Chapter 3: Enterprise Cybersecurity Architecture; Systems Administration; S ystems Administration: Goal and Objectives ; Systems Administration: Threat Vectors ; Systems Administration: Capabilities; Network Security; Network Security: Goal and Objectives
Network Security: Threat Vectors Network Security: Capabilities ; Application Security; Application Security: Goal and Objectives ; Application Security: Threat Vectors ; Application Security: Capabilities ; Endpoint, Server, and Device Security; Endpoint, Server, and Device Security: Goal and Objectives ; Endpoint, Server, and Device Security: Threat Vectors ; Endpoint, Server, and Device Security: Capabilities ; Identity, Authentication, and Access Management; Identity, Authentication, and Access Management: Goal and Objectives
Identity, Authentication, and Access Management: Threat Vectors Identity, Authentication, and Access Management: Capabilities; Data Protection and Cryptography; Data Protection and Cryptography: Goal and Objectives ; Data Protection and Cryptography: Threat Vectors ; Data Protection and Cryptography: Capabilities ; Monitoring, Vulnerability, and Patch Management; Monitoring, Vulnerability, and Patch Management: Goal and Objectives ; Monitoring, Vulnerability, and Patch Management: Threat Vectors; Monitoring, Vulnerability, and Patch Management: Capabilities
High Availability, Disaster Recovery, and Physical Protection
Altri titoli varianti How to build a successful cyberdefense program against advanced threats
Record Nr. UNINA-9910300637303321
Donaldson Scott E.  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
Autore Donaldson Scott E
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Descrizione fisica 1 online resource (737 pages)
Disciplina 005.8
Collana The expert's voice in cybersecurity
Soggetto topico Data protection
Data encryption (Computer science)
Computer security
Security
Cryptology
Systems and Data Security
ISBN 9781484232583
1484232585
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: The Cybersecurity Challenge -- Chapter 1: Defining the Cybersecurity Challenge -- Chapter 2: Meeting the Cybersecurity Challenge -- Part II: A New Enterprise Cybersecurity Architecture -- Chapter 3: Enterprise Cybersecurity Architecture -- Chapter 4: Implementing Enterprise Cybersecurity -- Chapter 5: Operating Enterprise Cybersecurity -- Chapter 6: Enterprise Cybersecurity and the Cloud -- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD -- Part III: The Art of Cyber Defense -- Chapter 8: Building an Effective Defense -- Chapter 9: Responding to Incidents -- Chapter 10: Managing a Cybersecurity Crisis -- Part IV: Enterprise Cyber Defense Assessment -- Chapter 11: Assessing Enterprise Cybersecurity -- Chapter 12: Measuring a Cybersecurity Program -- Chapter 13: Mapping Against Cybersecurity Frameworks -- Part V: Enterprise Cybersecurity Program -- Chapter 14: Managing an Enterprise Cybersecurity Program -- Chapter 15: Looking to the Future -- Part VI: Appendices -- Appendix A: Sample Cybersecurity Policy -- Appendix B: Cybersecurity Operational Processes -- Appendix C: Object Measurement -- Appendix D: Cybersecurity Sample Assessment -- Appendix E: Cybersecurity Capability Value Scales.
Record Nr. UNINA-9910300362303321
Donaldson Scott E  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui