更新时间:2021-06-30 14:49:26
封面
Cybersecurity Threats Malware Trends and Strategies
Why subscribe?
Contributors
About the author
About the reviewer
Preface
Who this book is for?
What this book covers
To get the most out of this book
Conventions used
Get in touch
1 Ingredients for a Successful Cybersecurity Strategy
What is a cybersecurity strategy?
How organizations get initially compromised and the cybersecurity fundamentals
Understanding the difference between the attacker's motivations and tactics
Other ingredients for a successful strategy
Chapter summary
References
2 Using Vulnerability Trends to Reduce Risk and Costs
Introduction
Vulnerability Management Primer
3 The Evolution of the Threat Landscape – Malware
Why is there so much malware on Windows compared to other platforms?
Data sources
About malware
Global Windows malware infection analysis
Regional Windows malware infection analysis
Global malware evolution
The great debate – are anti-malware solutions really worthwhile?
Threat intelligence best practices and tips
4 Internet-Based Threats
A typical attack
Phishing attacks
Drive-by download attacks
Malware hosting sites
Post compromise – botnets and DDoS attacks
5 Cybersecurity Strategies
Measuring the efficacy of cybersecurity strategies
Cybersecurity strategies
6 Strategy Implementation
What is an Intrusion Kill Chain?
Modernizing the kill chain
Getting started
Implementing this strategy
Conclusion
7 Measuring Performance and Effectiveness
Using vulnerability management data
Measuring performance and efficacy of an Attack-Centric Strategy
8 The Cloud – A Modern Approach to Security and Compliance
How is cloud computing different?
Security and compliance game changers
Using cybersecurity strategies in the cloud
Encryption and key management
Other Books You May Enjoy
Leave a review - let other readers know what you think
Index