Mastering Defensive Security Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.

Библиографическая информация
Главный автор: Bravo, Cesar
Другие авторы: Kitchen, Darren
Формат: Электронная книга
Язык:English
Публикация: Birmingham Packt Publishing, Limited, 2022.
Предметы:
Online-ссылка:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 04866cam a2200553 i 4500
001 koha001013651
003 OCoLC
005 20250222070008.0
006 m d
007 cr cnu---unuuu
008 211106s2022 alu o 000 0 eng d
035 |a koha001013651 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d UKMGB  |d OCLCF  |d UKAHL  |d OCLCO  |d ORMDA  |d OCLCO  |d YDX  |d OCLCQ  |d N$T 
015 |a GBC1F4937  |2 bnb 
016 7 |a 020328577  |2 Uk 
019 |a 1281977424 
020 |a 1800206097  |q (electronic book) 
020 |a 9781800206090  |q (electronic bk.) 
020 |z 9781800208162  |q (paperback) 
037 |a 9781800206090  |b Packt Publishing Pvt. Ltd 
037 |a 9781800208162  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b B73 2022 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
100 1 |a Bravo, Cesar.  |9 912177 
245 1 0 |a Mastering Defensive Security  |b Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure. 
264 1 |a Birmingham  |b Packt Publishing, Limited,  |c 2022. 
300 |a 1 online resource (528 pages) 
505 0 |a Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password 
505 8 |a Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? -- Types of vulnerabilities -- USB HID vulnerabilities 
505 8 |a Types of USB HID attacks -- A false sense of security -- Protecting against USB HID attacks -- Managing cybersecurity risks -- Risk identification -- Risk assessment -- Risk response -- Risk monitoring -- The NIST Cybersecurity Framework -- Identify -- Protect -- Detect -- Respond -- Recover -- Creating an effective Business Continuity Plan (BCP) -- Creating a Business Impact Analysis (BIA) -- Business Continuity Planning (BCP) -- Implementing a best-in-class DRP -- Creating a DRP -- Implementing the DRP -- Summary -- Further reading 
505 8 |a Chapter 3: Comprehending Policies, Procedures, Compliance, and Audits -- Creating world-class cybersecurity policies and procedures -- Cybersecurity policies -- Cybersecurity procedures -- The CUDSE method -- Understanding and achieving compliance -- Types of regulations -- Achieving compliance -- Exploring, creating, and managing audits -- Internal cybersecurity audits -- External cybersecurity audits -- Data management during audits -- Types of cybersecurity audit -- What triggers an audit? -- Applying a CMM -- The goals of a CMM -- Characteristics of a good CMM -- The structure of a good CMM 
505 8 |a Analyzing the results -- Advantages of a CMM -- Summary -- Further reading -- Chapter 4: Patching Layer 8 -- Understanding layer 8 -- the insider threat -- The inadvertent user -- The malicious insider -- How do you spot a malicious insider? -- Protecting your infrastructure against malicious insiders -- Mastering the art of social engineering -- The social engineering cycle -- Social engineering techniques -- Types of social engineering attacks -- Defending against social engineering attacks (patching layer 8) -- Creating your training strategy -- Admin rights -- Implementing a strong BYOD policy 
500 |a Performing random social engineering campaigns. 
653 0 |a Computer security. 
653 0 |a Information technology  |x Security measures. 
653 2 |a Computer Security 
653 6 |a Sécurité informatique. 
653 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
653 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
653 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Kitchen, Darren.  |9 912178 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/3072391.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013651 
910 |a EBSCO eBooks 
999 |c 1013651  |d 1013651 
039