Book description
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
- Contains practical and cost-effective recommendations for proactive and reactive protective measures
- Teaches users how to establish a viable threat intelligence program
- Focuses on how social networks present a double-edged sword against security programs
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Authors
- Introduction
- Chapter 1. What Is Advanced Persistent Security?
- Section 1. Concepts/Foundation
- Section 2. Protection
- Section 3. Detection
- Section 4. Reaction
-
Section 5. Implementation
- Introduction
-
Chapter 19. Know Yourself
- Is There Proper Governance in Place?
- How Many People Are There in the Enterprise?
- What Is the Range of Job Functions?
- What Information Is Involved?
- What Industry Are You in?
- What Is Your Technology Posture?
- Are There Special Technologies in Use?
- Do You Understand Your Network?
- Perform a Security Assessment
- What Is Your Physical Security Posture?
- How Is Data Transported?
- Who Are Your Adversaries?
- What Is the Security Posture of Similar Enterprises?
- Summary
- Chapter 20. Know Your Adversaries
- Chapter 21. Define Your Strategy
- Chapter 22. Determining the Appropriate Countermeasures
- Chapter 23. Advanced Persistent Security
- Index
Product information
- Title: Advanced Persistent Security
- Author(s):
- Release date: November 2016
- Publisher(s): Syngress
- ISBN: 9780128093658
You might also like
book
Advanced Persistent Threat
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The …
book
Enhanced Cyber Resilience Solution by Threat Detection using IBM Cloud Object Storage System and IBM QRadar SIEM
This Solution Redpaper™ publication explains how the features of IBM Cloud® Object Storage System reduces the …
book
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical …
book
Executing Windows Command Line Investigations
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus …