دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [2 ed.]
نویسندگان: Tim Rains
سری:
ISBN (شابک) : 1804613673, 9781804613672
ناشر: Packt Publishing
سال نشر: 2023
تعداد صفحات: 584
[585]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 22 Mb
در صورت تبدیل فایل کتاب Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تهدیدات امنیت سایبری، روندها و استراتژیهای بدافزار: استراتژیهای کاهش خطر برای تهدیدات مدرن سازمان خود را کشف کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
استراتژیهای امنیت سایبری موثر را برای کمک به شما و تیم امنیتیتان برای محافظت، شناسایی و پاسخ به تهدیدات امروزی اجرا کنید
خرید کتاب چاپی یا Kindle شامل یک کتاب الکترونیکی رایگان در قالب PDF.
تیم رینز مشاور ارشد امنیت جهانی سابق مایکروسافت و رهبر سابق امنیت جهانی سرویس وب آمازون برای بخش عمومی جهانی است. او دو دهه گذشته را صرف مشاوره به سازمانهای بخش خصوصی و دولتی در سرتاسر جهان در مورد استراتژیهای امنیت سایبری کرده است.
تهدیدات امنیت سایبری، روندهای بدافزار و استراتژیها، نسخه دوم بر اساس موفقیت است. از اولین نسخه که به بسیاری از سازمانهای دولتی مشتاق، و متخصصان امنیت سایبری کمک کرده است تا استراتژیهای امنیت سایبری مبتنی بر دادهها را برای سازمانهای خود درک و توسعه دهند. در این نسخه، شما روندهای بلندمدت در افشای آسیبپذیریها و بهرهبرداری، تفاوتهای منطقهای در آلودگیهای بدافزار و عوامل اجتماعی-اقتصادی که زیربنای آنها هستند، و چگونگی تبدیل باجافزار از یک تهدید مبهم به مخوفترین تهدید در امنیت سایبری را بررسی خواهید کرد. همچنین بینشهای ارزشمندی در مورد نقشهایی که دولتها در امنیت سایبری ایفا میکنند، از جمله نقش آنها به عنوان بازیگران تهدید، و نحوه کاهش دسترسی دولت به دادهها به دست خواهید آورد. این کتاب با یک فرو رفتن عمیق در رویکردهای مدرن برای امنیت سایبری با استفاده از ابر به پایان میرسد.
در پایان این کتاب، درک بهتری از چشمانداز تهدید خواهید داشت. اطلاعات خوب تهدیدات سایبری و نحوه اندازه گیری اثربخشی استراتژی امنیت سایبری سازمان خود را بشناسید.
این کتاب برای کسانی است که به دنبال پیاده سازی یا بهبود استراتژی امنیت سایبری سازمان خود هستند. این شامل افسران ارشد امنیت اطلاعات (CISOs)، افسران ارشد امنیت (CSOs)، متخصصان انطباق و ممیزی، معماران امنیتی و متخصصان امنیت سایبری است. دانش پایه فناوری اطلاعات (IT)، اصول توسعه نرم افزار، و مفاهیم امنیت سایبری فرض شده است.
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats
Purchase of the print or Kindle book includes a free eBook in PDF format.
Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.
Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.
By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.
This book is for anyone who is looking to implement or improve their organization's cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.
Cover Copyright page Contributors Preface Chapter 1: Introduction Different types of CISOs: “The CISO Spectrum” How organizations get initially compromised and the cybersecurity fundamentals Unpatched vulnerabilities Security misconfigurations Weak, leaked, and stolen credentials Social engineering Insider threats Focus on the cybersecurity fundamentals Understanding the difference between attackers’ motivations and tactics Summary References Chapter 2: What to Know about Threat Intelligence What is threat intelligence? Where does CTI data come from? Using threat intelligence The key to using threat intelligence Threat intelligence sharing CTI sharing protocols Traffic Light Protocol STIX and TAXII Reasons not to share CTI How to identify credible cyber threat intelligence Data sources Time periods Recognizing hype Predictions about the future Vendors’ motives Summary References Chapter 3: Using Vulnerability Trends to Reduce Risk and Costs Introduction Vulnerability Management Primer Vulnerability Disclosure Data Sources Industry Vulnerability Disclosure Trends Vendor and Product Vulnerability Trends Reducing Risk and Costs – Measuring Vendor and Product Improvement Microsoft Vulnerability Trends Oracle Vulnerability Trends Google Vulnerability Trends Debian Vulnerability Trends Apple Vulnerability Trends Vendor Vulnerability Trend Summary Operating System Vulnerability Trends Google Android Vulnerability Trends Apple iOS Vulnerability Trends Mobile Operating System Summary Microsoft Windows 10 Vulnerability Trends Apple macOS Vulnerability Trends Desktop Operating System Summary Ubuntu Linux Vulnerability Trends Linux Kernel Vulnerability Trends Microsoft Windows Server 2016 Vulnerability Trends Server Operating System Summary Web Browser Vulnerability Trends Apple Safari Vulnerability Trends Google Chrome Vulnerability Trends Web Browser Summary Vulnerability Improvement Framework Summary Vulnerability Management Guidance Summary References Chapter 4: The Evolution of Malware Introduction Why is there so much malware on Windows compared to other platforms? Data sources The Malicious Software Removal Tool Real-time anti-malware tools Non-security data sources About malware How malware infections spread Trojans Potentially unwanted software Exploits and exploit kits Worms Ransomware Viruses Browser modifiers Measuring malware prevalence Global Windows malware infection analysis Regional Windows malware infection analysis The threat landscape in the Middle East and Northern Africa 10-year regional report card for the Middle East and Northern Africa The threat landscape in the European Union and Eastern Europe 10-year regional report card for the European Union 10-year regional report card for select Eastern European locations The threat landscape in select locations in Asia and Oceania 10-year regional report card for Asia and Oceania The threat landscape in select locations in the Americas 10-year regional report card for the Americas Regional Windows malware infection analysis conclusions What does this all mean for CISOs and enterprise security teams? Global malware evolution Global malware evolution conclusions The evolution of ransomware Delivery mechanisms Execution mechanisms Ransom payment methods Ransom demands and communications Business model The great debate – are anti-malware solutions really worthwhile? Summary References Chapter 5: Internet-Based Threats Introduction A typical attack Phishing attacks Mitigating phishing Drive-by download attacks Mitigating drive-by download attacks Malware-hosting sites Mitigating malware distribution Post compromise – botnets and DDoS attacks Summary References Chapter 6: The Roles Governments Play in Cybersecurity The pursuit of happiness Governments as cybersecurity market participants Governments as standards bodies Governments as enforcers Regulators Law enforcement Governments as defenders Public safety National security Military Summary References Chapter 7: Government Access to Data Understanding government access to data The signals intelligence scenario The unlawful government access to data scenario The lawful government access to data scenario Lawful government access to data The CLOUD Act and the PATRIOT Act Managing the risk of government access to data The volume of law enforcement requests The probability of US law enforcement accessing data in the cloud The GDPR, FISA Section 702, and Schrems II The Probability of US Intelligence Accessing Data in the Cloud Mitigating government access to data Setting and understanding the scope Setting realistic objectives Planning data protection controls Conclusion Summary References Chapter 8: Ingredients for a Successful Cybersecurity Strategy What is a cybersecurity strategy? Other ingredients for a successful strategy Business objective alignment Cybersecurity vision, mission, and imperatives Senior executive and board support Understand the risk appetite Realistic view of current cybersecurity capabilities and technical talent Compliance program and control framework alignment An effective relationship between cybersecurity and IT Security culture Summary References Chapter 9: Cybersecurity Strategies Introduction Measuring the efficacy of cybersecurity strategies Cybersecurity strategies Protect and Recover Strategy CFSS score Protect and Recover Strategy summary Endpoint Protection Strategy CFSS score Endpoint Protection Strategy summary Physical control and security clearances as a security strategy CFSS score Physical Control and Security Clearances Strategy summary Compliance as a Security Strategy CFSS score Compliance as a Security Strategy summary Application-Centric Strategy CFSS score Application-Centric Strategy summary Identity-Centric Strategy CFSS score Identity-Centric Strategy summary Data-Centric Strategy CFSS score Data-Centric Strategy summary Attack-Centric Strategy CFSS score Attack-Centric Strategy summary Zero Trust CFSS score Cybersecurity strategies summary DevOps and DevSecOps Summary References Chapter 10: Strategy Implementation Introduction What is an Intrusion Kill Chain? Modernizing the Kill Chain Mapping the Cybersecurity Usual Suspects Updating the matrix Intrusion Kill Chain or ATT&CK? Getting started Maturity of current cybersecurity capabilities Pervasiveness of current cybersecurity capabilities Who consumes the data? Cybersecurity license renewals Implementing this strategy Rationalizing the matrix – gaps, under-investments, and over-investments Identifying gaps Identifying areas of under-investment Identifying areas of over-investment Planning your implementation Designing control sets Attack phase – Reconnaissance I Example controls for Reconnaissance I Insights from ATT&CK Attack phase – Delivery Example controls for Delivery Insights from ATT&CK Attack phase – Exploitation Example controls for Exploitation Insights from ATT&CK Attack phase – Installation Example controls for Installation Insights from ATT&CK Attack phase – Command and Control (C2) Example controls for C2 Insights from ATT&CK Attack phase – Reconnaissance II Example controls for Reconnaissance II Insights from ATT&CK Attack phase – Actions on Objectives Example controls for Actions on Objectives Insights from ATT&CK Conclusion Summary References Chapter 11: Measuring Performance and Effectiveness Introduction Using vulnerability management data Assets under management versus total assets Known unpatched vulnerabilities Unpatched vulnerabilities by severity Vulnerabilities by product type Measuring the performance and efficacy of an Attack-Centric Strategy Performing intrusion reconstructions Using intrusion reconstruction results Identifying lame controls Learning from failure Identifying helpful vendors Informing internal assessments Adversary emulations leveraging ATT&CK Summary References Chapter 12: Modern Approaches to Security and Compliance Introduction How is cloud computing different? Cloud Service Providers versus Managed Service Providers Migrating to the cloud Cybersecurity assessment questionnaires Security and compliance game changers The power of APIs The advantages of automation Mitigating insider threat and social engineering Mitigating unpatched vulnerabilities Mitigating security misconfigurations Mitigating weak, leaked and stolen credentials Security and compliance game changers – summary Using cybersecurity strategies in the cloud Using the protect and recover strategy in the cloud Compliance as a Cybersecurity Strategy in the cloud Using the Attack-Centric Strategy in the cloud DevOps – A modern approach to security in the cloud Disaster Recovery in the cloud Encryption and key management Conclusion Summary References Packt page Other Books You May Enjoy Index