Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Modern cybersecurity practices = exploring and implementing agile cybersecurity frameworks and strategies for your organization /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Modern cybersecurity practices / Pascal Ackerman.
Reminder of title:
exploring and implementing agile cybersecurity frameworks and strategies for your organization /
Author:
Ackerman, Pascal.
Description:
1 online resource (410 pages)
Subject:
COMPUTERS / Security / Viruses & Malware. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000092.html
ISBN:
9789389328257
Modern cybersecurity practices = exploring and implementing agile cybersecurity frameworks and strategies for your organization /
Ackerman, Pascal.
Modern cybersecurity practices
exploring and implementing agile cybersecurity frameworks and strategies for your organization /[electronic resource] :Pascal Ackerman. - 1 online resource (410 pages)
Includes bibliographical references and index.
Modern cybersecurity practices : exploring and implementing agile cybersecurity frameworks and strategies for your organization -- About the Author -- Acknowledgement -- Preface -- Errata -- Table of Contents -- Part I Setting the Stage - System Pwnage -- Chapter 1 What’s at Stake? -- Chapter 2 Example Attack - The Initial Breach -- Chapter 3 Example Attack - Lateral Movement -- Chapter 4 Example Attack - Data Exfiltration -- Chapter 5 Example Attack - Going Out with a Bang -- Part II Security Program Implementation -- Chapter 6 Scrutinizing the Example Attack -- Chapter 7 Adhere to a Security Standard -- Chapter 8 Defining Security Policies, Procedures, Standards, and Guidelines -- Chapter 9 Kicking Off the Security Program -- Part III Security Monitoring for Continuous Improvement -- Chapter 10 Passive Security Monitoring -- Chapter 11 Active Security Monitoring -- Chapter 12 Threat Hunting -- Chapter 13 The Continuous Battle.
Access restricted to authorized users and institutions.
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer. After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture. After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS' and endpoint protection solutions.
Mode of access: World Wide Web.
ISBN: 9789389328257Subjects--Topical Terms:
1483841
COMPUTERS / Security / Viruses & Malware.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9
Dewey Class. No.: 004
Modern cybersecurity practices = exploring and implementing agile cybersecurity frameworks and strategies for your organization /
LDR
:03649nam a2200289 i 4500
001
1157284
006
m eo d
007
cr cn |||m|||a
008
250717s2020 ob 000 0 eng d
020
$a
9789389328257
020
$a
9789389328264
035
$a
BPB0000092
041
0
$a
eng
050
0 0
$a
QA76.9
082
0 0
$a
004
100
1
$a
Ackerman, Pascal.
$3
1483848
245
1 0
$a
Modern cybersecurity practices
$h
[electronic resource] :
$b
exploring and implementing agile cybersecurity frameworks and strategies for your organization /
$c
Pascal Ackerman.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2020.
264
4
$c
©2020
300
$a
1 online resource (410 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Modern cybersecurity practices : exploring and implementing agile cybersecurity frameworks and strategies for your organization -- About the Author -- Acknowledgement -- Preface -- Errata -- Table of Contents -- Part I Setting the Stage - System Pwnage -- Chapter 1 What’s at Stake? -- Chapter 2 Example Attack - The Initial Breach -- Chapter 3 Example Attack - Lateral Movement -- Chapter 4 Example Attack - Data Exfiltration -- Chapter 5 Example Attack - Going Out with a Bang -- Part II Security Program Implementation -- Chapter 6 Scrutinizing the Example Attack -- Chapter 7 Adhere to a Security Standard -- Chapter 8 Defining Security Policies, Procedures, Standards, and Guidelines -- Chapter 9 Kicking Off the Security Program -- Part III Security Monitoring for Continuous Improvement -- Chapter 10 Passive Security Monitoring -- Chapter 11 Active Security Monitoring -- Chapter 12 Threat Hunting -- Chapter 13 The Continuous Battle.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer. After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture. After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS' and endpoint protection solutions.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / System Administration / Windows Administration.
$2
bisacsh
$3
1483849
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000092.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login