دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1
نویسندگان: Kim Crawley
سری:
ISBN (شابک) : 1119811236, 9781119811237
ناشر: Wiley
سال نشر: 2021
تعداد صفحات: 227
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 5 مگابایت
در صورت تبدیل فایل کتاب 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب 8 گام برای امنیت بهتر: راهنمای انعطاف پذیری سایبری ساده برای تجارت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
با یک منبع در دسترس، کسب و کار خود را در برابر تهدیدات امنیت سایبری داخلی و خارجی سخت کنید.
در 8 گام برای امنیت بهتر: راهنمای انعطافپذیری سایبری ساده برای کسبوکار، محقق و نویسنده امنیت سایبری کیم کرولی نقشهای اساسی و عملی برای انعطافپذیری سایبری در هر مکانی ارائه میکند. سازمان. کراولی با ارائه درسهایی که در حین کار برای شرکتهای فناوری بزرگ مانند Sophos، AT&T، BlackBerry Cylance، Tripwire و Venafi آموخته است، جوهر امنیت سایبری کسبوکار را در هشت مرحله خلاصه میکند.
نوشته شده است تا برای افراد غیر فنی و همچنین متخصصان امنیتی قابل دسترسی باشد، و با اطلاعاتی از سایر رهبران صنعت امنیت، این کتاب مهم به شما کمک میکند:
مناسب برای CISO ها، رهبران امنیتی ، تجار غیر فنی و مدیران در هر سطحی، 8 گام برای امنیت بهتر همچنین یک منبع ضروری برای شرکتها در هر اندازه و در همه صنایع است.
Harden your business against internal and external cybersecurity threats with a single accessible resource.
In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps.
Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to:
Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.
Cover Title Page Copyright Page About the Author Acknowledgments Contents Foreword Introduction Chapter 1 Step 1: Foster a Strong Security Culture Kevin Mitnick, Human Hacker Extraordinaire The Importance of a Strong Security Culture Hackers Are the Bad Guys, Right? What Is Security Culture? How to Foster a Strong Security Culture Security Leaders on Security Culture What Makes a Good CISO? The Biggest Mistakes Businesses Make When It Comes to Cybersecurity The Psychological Phases of a Cybersecurity Professional Chapter 2 Step 2: Build a Security Team Why Step 2 Is Controversial How to Hire the Right Security Team. . .the Right Way Security Team Tips from Security Leaders The “Culture Fit”—Yuck! Cybersecurity Budgets Design Your Perfect Security Team Chapter 3 Step 3: Regulatory Compliance What Are Data Breaches, and Why Are They Bad? The Scary Truth Found in Data Breach Research An Introduction to Common Data Privacy Regulations The General Data Protection Regulation The California Consumer Privacy Act The Health Insurance Portability and Accountability Act The Gramm-Leach-Bliley Act Payment Card Industry Data Security Standard Governance, Risk Management, and Compliance More About Risk Management Threat Modeling Chapter 4 Step 4: Frequent Security Testing What Is Security Testing? Security Testing Types Security Audits Vulnerability Assessments Versus Penetration Testing Red Team Testing Bug Bounty Programs What’s Security Maturity? The Basics of Security Audits and Vulnerability Assessments Log Early, Log Often Prepare for Vulnerability Assessments and Security Audits A Concise Guide to Penetration Testing Penetration Testing Based on Network Knowledge Penetration Testing Based on Network Aspects Security Leaders on Security Maturity Security Testing Is Crucial Chapter 5 Step 5: Security Framework Application What Is Incident Response? Preparation Identification or Analysis Containment, Mitigation, or Eradication Recovery Post-incident Your Computer Security Incident Response Team Cybersecurity Frameworks NIST Cybersecurity Framework ISO 27000 Cybersecurity Frameworks CIS Controls COBIT Cybersecurity Framework Security Frameworks and Cloud Security Chapter 6 Step 6: Control Your Data Assets The CIA Triad Access Control Patch Management Physical Security and Your Data Malware Cryptography Basics Bring Your Own Device and Working from Home Managed Service Providers The Dark Web and Your Data Security Leaders on Cyber Defense Control Your Data Chapter 7 Step 7: Understand the Human Factor Social Engineering Phishing What Can NFTs and ABA Teach Us About Social Engineering? How to Prevent Social Engineering Attacks on Your Business UI and UX Design Internal Threats Hacktivism Chapter 8 Step 8: Build Redundancy and Resilience Understanding Data and Networks Building Capacity and Scalability with the Power of the Cloud Back It Up, Back It Up, Back It Up RAID What Ransomware Taught Business About Backups Business Continuity Disaster Recovery Chapter 9 Afterword Step 1 The Most Notorious Cyberattacker Was Actually a Con Man A Strong Security Culture Requires All Hands on Deck Hackers Are the Good Guys, Actually What Is Security Culture? What Makes a Good CISO? The Psychological Phases of a Cybersecurity Professional Recommended Readings Step 2 Tackling the Cybersecurity Skills Gap Myth Take “Culture Fit” Out of Your Vocabulary Your Cybersecurity Budget Recommended Readings Step 3 Data Breaches Data Privacy Regulations Risk Management Recommended Readings Step 4 Security Audits Vulnerability Assessments Penetration Testing Bug Bounty Programs Recommended Reading Step 5 Incident Response Cybersecurity Frameworks Recommended Reading Step 6 The CIA Triad Access Control Patch Management Physical Security Malware Cryptography BYOD and Working from Home Data Loss Prevention Managed Service Providers Recommended Reading Step 7 Social Engineering UI and UX Design Internal Threats Recommended Readings Step 8 Cloud Networks Data Backups Business Continuity and Disaster Recovery Recommended Readings Keeping Your Business Cyber Secure Index EULA