Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam
| Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam |
| Autore | Donaldson Scott E. |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015 |
| Descrizione fisica | 1 online resource (508 p.) |
| Disciplina | 004 |
| Collana | Expert's Voice in Cybersecurity |
| Soggetto topico |
Data protection
Data encryption (Computer science) Security Cryptology |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Contents at a Glance; Contents; Foreword; About the Authors; Acknowledgments ; Introduction; Part I: The Cybersecurity Challenge ; Chapter 1: Defining the Cybersecurity Challenge; The Cyberattacks of Today; The Sony Pictures Entertainment Breach of 2014; Advanced Persistent Threats; Waves of Malware; Types of Cyberattackers; Commodity Threats; Hacktivists; Organized Crime ; Espionage ; Cyberwar ; The Types of Cyberattacks; Confidentiality: Steal Data; Integrity: Modify Data (Steal Money); Availability: Deny Access; The Steps of a Cyberintrusion; Attack Trees and Attack Graphs
Lockheed Martin Kill Chain Mandiant Attack Life Cycle; Enterprise Cybersecurity Attack Sequence; Why Cyberintrusions Succeed; The Explosion in Connectivity; Consolidation of Enterprise IT; Defeat of Preventive Controls; Failure of Detective Controls; Compliance over Capability; The Gap in Cybersecurity Effectiveness; A New Cybersecurity Mindset; An Effective Enterprise Cybersecurity Program; Chapter 2: Meeting the Cybersecurity Challenge; Cybersecurity Frameworks; The Cybersecurity Process; Cybersecurity Challenges; The Risk Management Process Considering Vulnerabilities, Threats, and Risks Risk Analysis and Mitigation; Cybersecurity Controls; Cybersecurity Capabilities; Cybersecurity and Enterprise IT; Emplacing Cyberdefenses ; H ow Cyberdefenses Interconnect; An Enterprise Cybersecurity Architecture; Part II: A New Enterprise Cybersecurity Architecture ; Chapter 3: Enterprise Cybersecurity Architecture; Systems Administration; S ystems Administration: Goal and Objectives ; Systems Administration: Threat Vectors ; Systems Administration: Capabilities; Network Security; Network Security: Goal and Objectives Network Security: Threat Vectors Network Security: Capabilities ; Application Security; Application Security: Goal and Objectives ; Application Security: Threat Vectors ; Application Security: Capabilities ; Endpoint, Server, and Device Security; Endpoint, Server, and Device Security: Goal and Objectives ; Endpoint, Server, and Device Security: Threat Vectors ; Endpoint, Server, and Device Security: Capabilities ; Identity, Authentication, and Access Management; Identity, Authentication, and Access Management: Goal and Objectives Identity, Authentication, and Access Management: Threat Vectors Identity, Authentication, and Access Management: Capabilities; Data Protection and Cryptography; Data Protection and Cryptography: Goal and Objectives ; Data Protection and Cryptography: Threat Vectors ; Data Protection and Cryptography: Capabilities ; Monitoring, Vulnerability, and Patch Management; Monitoring, Vulnerability, and Patch Management: Goal and Objectives ; Monitoring, Vulnerability, and Patch Management: Threat Vectors; Monitoring, Vulnerability, and Patch Management: Capabilities High Availability, Disaster Recovery, and Physical Protection |
| Altri titoli varianti | How to build a successful cyberdefense program against advanced threats |
| Record Nr. | UNINA-9910300637303321 |
Donaldson Scott E.
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam
| Enterprise Cybersecurity Study Guide : How to Build a Successful Cyberdefense Program Against Advanced Threats / / by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam |
| Autore | Donaldson Scott E |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 |
| Descrizione fisica | 1 online resource (737 pages) |
| Disciplina | 005.8 |
| Collana | The expert's voice in cybersecurity |
| Soggetto topico |
Data protection
Data encryption (Computer science) Computer security Security Cryptology Systems and Data Security |
| ISBN |
9781484232583
1484232585 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part I: The Cybersecurity Challenge -- Chapter 1: Defining the Cybersecurity Challenge -- Chapter 2: Meeting the Cybersecurity Challenge -- Part II: A New Enterprise Cybersecurity Architecture -- Chapter 3: Enterprise Cybersecurity Architecture -- Chapter 4: Implementing Enterprise Cybersecurity -- Chapter 5: Operating Enterprise Cybersecurity -- Chapter 6: Enterprise Cybersecurity and the Cloud -- Chapter 7: Enterprise Cybersecurity for Mobile and BYOD -- Part III: The Art of Cyber Defense -- Chapter 8: Building an Effective Defense -- Chapter 9: Responding to Incidents -- Chapter 10: Managing a Cybersecurity Crisis -- Part IV: Enterprise Cyber Defense Assessment -- Chapter 11: Assessing Enterprise Cybersecurity -- Chapter 12: Measuring a Cybersecurity Program -- Chapter 13: Mapping Against Cybersecurity Frameworks -- Part V: Enterprise Cybersecurity Program -- Chapter 14: Managing an Enterprise Cybersecurity Program -- Chapter 15: Looking to the Future -- Part VI: Appendices -- Appendix A: Sample Cybersecurity Policy -- Appendix B: Cybersecurity Operational Processes -- Appendix C: Object Measurement -- Appendix D: Cybersecurity Sample Assessment -- Appendix E: Cybersecurity Capability Value Scales. |
| Record Nr. | UNINA-9910300362303321 |
Donaldson Scott E
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||