|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
A comprehensive guide for cybersecurity professionals to acquire
unique insights on the evolution of the threat landscape and how
you can address modern cybersecurity challenges in your
organisation Key Features Protect your organization from
cybersecurity threats with field-tested strategies Discover the
most common ways enterprises initially get compromised Measure the
effectiveness of your organization's current cybersecurity program
against cyber attacks Book DescriptionAfter scrutinizing numerous
cybersecurity strategies, Microsoft's former Global Chief Security
Advisor in this book helps you understand the efficacy of popular
cybersecurity strategies and more. Cybersecurity Threats, Malware
Trends, and Strategies offers an unprecedented long-term view of
the global threat landscape by examining the twenty-year trend in
vulnerability disclosures and exploitation, nearly a decade of
regional differences in malware infections, the socio-economic
factors that underpin them, and how global malware has evolved.
This will give you further perspectives into malware protection for
your organization. It also examines internet-based threats that
CISOs should be aware of. The book will provide you with an
evaluation of the various cybersecurity strategies that have
ultimately failed over the past twenty years, along with one or two
that have actually worked. It will help executives and security and
compliance professionals understand how cloud computing is a game
changer for them. By the end of this book, you will know how to
measure the effectiveness of your organization's cybersecurity
strategy and the efficacy of the vendors you employ to help you
protect your organization and yourself. What you will learn
Discover cybersecurity strategies and the ingredients critical to
their success Improve vulnerability management by reducing risks
and costs for your organization Learn how malware and other threats
have evolved over the past decade Mitigate internet-based threats,
phishing attacks, and malware distribution sites Weigh the pros and
cons of popular cybersecurity strategies of the past two decades
Implement and then measure the outcome of a cybersecurity strategy
Learn how the cloud provides better security capabilities than
on-premises IT environments Who this book is forThis book is
designed to benefit engineers, leaders, or any professional with
either a responsibility for cyber security within their
organization, or an interest in working in this ever-growing field.
Develop your red team skills by learning essential foundational
tactics, techniques, and procedures, and boost the overall security
posture of your organization by leveraging the homefield advantage
Key Features Build, manage, and measure an offensive red team
program Leverage the homefield advantage to stay ahead of your
adversaries Understand core adversarial tactics and techniques, and
protect pentesters and pentesting assets Book DescriptionIt's now
more important than ever for organizations to be ready to detect
and respond to security events and breaches. Preventive measures
alone are not enough for dealing with adversaries. A well-rounded
prevention, detection, and response program is required. This book
will guide you through the stages of building a red team program,
including strategies and homefield advantage opportunities to boost
security. The book starts by guiding you through establishing,
managing, and measuring a red team program, including effective
ways for sharing results and findings to raise awareness.
Gradually, you'll learn about progressive operations such as
cryptocurrency mining, focused privacy testing, targeting
telemetry, and even blue team tooling. Later, you'll discover
knowledge graphs and how to build them, then become well-versed
with basic to advanced techniques related to hunting for
credentials, and learn to automate Microsoft Office and browsers to
your advantage. Finally, you'll get to grips with protecting assets
using decoys, auditing, and alerting with examples for major
operating systems. By the end of this book, you'll have learned how
to build, manage, and measure a red team program effectively and be
well-versed with the fundamental operational techniques required to
enhance your existing skills. What you will learn Understand the
risks associated with security breaches Implement strategies for
building an effective penetration testing team Map out the
homefield using knowledge graphs Hunt credentials using indexing
and other practical techniques Gain blue team tooling insights to
enhance your red team skills Communicate results and influence
decision makers with appropriate data Who this book is forThis is
one of the few detailed cybersecurity books for penetration
testers, cybersecurity analysts, security leaders and strategists,
as well as red team members and chief information security officers
(CISOs) looking to secure their organizations from adversaries. The
program management part of this book will also be useful for
beginners in the cybersecurity domain. To get the most out of this
book, some penetration testing experience, and software engineering
and debugging skills are necessary.
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
A comprehensive guide to Android forensics, from setting up the
workstation to analyzing key artifacts Key Features Get up and
running with modern mobile forensic strategies and techniques
Analyze the most popular Android applications using free and open
source forensic tools Learn malware detection and analysis
techniques to investigate mobile cybersecurity incidents Book
DescriptionMany forensic examiners rely on commercial, push-button
tools to retrieve and analyze data, even though there is no tool
that does either of these jobs perfectly. Learning Android
Forensics will introduce you to the most up-to-date Android
platform and its architecture, and provide a high-level overview of
what Android forensics entails. You will understand how data is
stored on Android devices and how to set up a digital forensic
examination environment. As you make your way through the chapters,
you will work through various physical and logical techniques to
extract data from devices in order to obtain forensic evidence. You
will also learn how to recover deleted data and forensically
analyze application data with the help of various open source and
commercial tools. In the concluding chapters, you will explore
malware analysis so that you'll be able to investigate
cybersecurity incidents involving Android malware. By the end of
this book, you will have a complete understanding of the Android
forensic process, you will have explored open source and commercial
forensic tools, and will have basic skills of Android malware
identification and analysis. What you will learn Understand Android
OS and architecture Set up a forensics environment for Android
analysis Perform logical and physical data extractions Learn to
recover deleted data Explore how to analyze application data
Identify malware on Android devices Analyze Android malware Who
this book is forIf you are a forensic analyst or an information
security professional wanting to develop your knowledge of Android
forensics, then this is the book for you. Some basic knowledge of
the Android mobile platform is expected.
Updated and revised edition of the bestselling guide to developing
defense strategies against the latest threats to cybersecurity Key
Features Covers the latest security threats and defense strategies
for 2020 Introduces techniques and skillsets required to conduct
threat hunting and deal with a system breach Provides new
information on Cloud Security Posture Management, Microsoft Azure
Threat Protection, Zero Trust Network strategies, Nation State
attacks, the use of Azure Sentinel as a cloud-based SIEM for
logging and investigation, and much more Book
DescriptionCybersecurity - Attack and Defense Strategies, Second
Edition is a completely revised new edition of the bestselling
book, covering the very latest security threats and defense
mechanisms including a detailed overview of Cloud Security Posture
Management (CSPM) and an assessment of the current threat
landscape, with additional focus on new IoT threats and
cryptomining. Cybersecurity starts with the basics that
organizations need to know to maintain a secure posture against
outside threat and design a robust cybersecurity program. It takes
you into the mindset of a Threat Actor to help you better
understand the motivation and the steps of performing an actual
attack - the Cybersecurity kill chain. You will gain hands-on
experience in implementing cybersecurity using new techniques in
reconnaissance and chasing a user's identity that will enable you
to discover how a system is compromised, and identify and then
exploit the vulnerabilities in your own system. This book also
focuses on defense strategies to enhance the security of a system.
You will also discover in-depth tools, including Azure Sentinel, to
ensure there are security controls in each network layer, and how
to carry out the recovery process of a compromised system. What you
will learn The importance of having a solid foundation for your
security posture Use cyber security kill chain to understand the
attack strategy Boost your organization's cyber resilience by
improving your security policies, hardening your network,
implementing active sensors, and leveraging threat intelligence
Utilize the latest defense tools, including Azure Sentinel and Zero
Trust Network strategy Identify different types of cyberattacks,
such as SQL injection, malware and social engineering threats such
as phishing emails Perform an incident investigation using Azure
Security Center and Azure Sentinel Get an in-depth understanding of
the disaster recovery process Understand how to consistently
monitor security and implement a vulnerability management strategy
for on-premises and hybrid cloud Learn how to perform log analysis
using the cloud to identify suspicious activities, including logs
from Amazon Web Services and Azure Who this book is forFor the IT
professional venturing into the IT security domain, IT pentesters,
security consultants, or those looking to perform ethical hacking.
Prior knowledge of penetration testing is beneficial.
|
|