Freshly Printed - allow 10 days lead
Advanced Persistent Security
A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
Presents insights from seasoned professionals who discuss advanced countermeasures for deterring today’s cybercriminals
Ira Winkler (Author), Araceli Treu Gomes (Author)
9780128093160, Elsevier Science
Paperback, published 25 November 2016
260 pages
23.5 x 19 x 1.7 cm, 0.57 kg
"...this book couldn’t be more topical…it provides those who are tasked to implement an organization’s security strategy with an easy-to-follow plan of action to cover – and keep covering – all their bases." --Help Net Security "The authors propose methods for more adaptive and comprehensive approaches to information security…For those looking for a methodology to create a more robust information security program, Advanced Persistent Security is a valuable resource." --RSAConference.com
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.
1. What Is Advanced Persistent Security? Section 1. Concepts/Foundation 2. Cyberwarfare Concepts 3. What Is Proaction? 4. Risk Management 5. How to Hack Computers 6. Threat 7. Adversary Infrastructure Section 2. Protection 8. Governance 9. Vulnerabilities to Address 10. Countermeasures 11. Security Culture 12. What Is Threat Intelligence? Section 3. Detection 13. What Is Detection? 14. Detection Deficit Disorder 15. The Human Intrusion Detection System 16. Kill Chain Analysis Section 4. Reaction 17. Setting Reaction Strategy 18. Incident Response and Investigations Section 5. Implementation 19. Know Yourself 20. Know Your Adversaries 21. Define Your Strategy 22. Determining the Appropriate Countermeasures 23. Advanced Persistent Security
Subject Areas: Computer security [UR], Computer programming / software development [UM]