My Account Log in

1 option

Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor.

O'Reilly Online Learning: Academic/Public Library Edition Available online

O'Reilly Online Learning: Academic/Public Library Edition
Format:
Book
Author/Creator:
Winkler, Ira, author.
Treu Gomes, Araceli, author.
Contributor:
Shackleford, Dave, editor.
Series:
Gale eBooks
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer security.
Hacking.
Physical Description:
1 online resource (xvii, 241 pages)
Edition:
1st edition
Place of Publication:
Cambridge, MA : Syngress, [2017]
System Details:
text file
Summary:
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. Contains practical and cost-effective recommendations for proactive and reactive protective measures Teaches users how to establish a viable threat intelligence program Focuses on how social networks present a double-edged sword against security programs
Contents:
What is advanced persistent security?
Cyberwarfare concepts
What is proaction?
Risk management
How to hack computers
Threat
Adversary infrastructure
Governance
Vulnerabilities to address
Countermeasures
Security culture
What is threat intelligence?
What is detection?
Detection deficit disorder
The human intrusion detection system
Kill chain analysis
Setting reaction strategy
Incident response and investigations
Know yourself
Know your adversaries
Define your strategy
Determining the appropriate countermeasures
Advanced persistent security.
Notes:
Includes index.
Description based on print version record.
Includes bibliographical references and index.
OCLC:
962064634

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account