|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Develop a comprehensive plan for building a HIPAA-compliant
security operations center, designed to detect and respond to an
increasing number of healthcare data breaches and events. Using
risk analysis, assessment, and management data combined with
knowledge of cybersecurity program maturity, this book gives you
the tools you need to operationalize threat intelligence,
vulnerability management, security monitoring, and incident
response processes to effectively meet the challenges presented by
healthcare's current threats. Healthcare entities are bombarded
with data. Threat intelligence feeds, news updates, and messages
come rapidly and in many forms such as email, podcasts, and more.
New vulnerabilities are found every day in applications, operating
systems, and databases while older vulnerabilities remain
exploitable. Add in the number of dashboards, alerts, and data
points each information security tool provides and security teams
find themselves swimming in oceans of data and unsure where to
focus their energy. There is an urgent need to have a cohesive plan
in place to cut through the noise and face these threats.
Cybersecurity operations do not require expensive tools or large
capital investments. There are ways to capture the necessary data.
Teams protecting data and supporting HIPAA compliance can do this.
All that's required is a plan-which author Eric Thompson provides
in this book. What You Will Learn Know what threat intelligence is
and how you can make it useful Understand how effective
vulnerability management extends beyond the risk scores provided by
vendors Develop continuous monitoring on a budget Ensure that
incident response is appropriate Help healthcare organizations
comply with HIPAA Who This Book Is For Cybersecurity, privacy, and
compliance professionals working for organizations responsible for
creating, maintaining, storing, and protecting patient information.
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Take your forensic abilities and investigation skills to the next
level using powerful tools that cater to all aspects of digital
forensic investigations, right from hashing to reporting Key
Features Perform evidence acquisition, preservation, and analysis
using a variety of Kali Linux tools Use PcapXray to perform
timeline analysis of malware and network activity Implement the
concept of cryptographic hashing and imaging using Kali Linux Book
DescriptionKali Linux is a Linux-based distribution that's widely
used for penetration testing and digital forensics. It has a wide
range of tools to help for digital forensics investigations and
incident response mechanisms. This updated second edition of
Digital Forensics with Kali Linux covers the latest version of Kali
Linux and The Sleuth Kit. You'll get to grips with modern
techniques for analysis, extraction, and reporting using advanced
tools such as FTK Imager, hex editor, and Axiom. Updated to cover
digital forensics basics and advancements in the world of modern
forensics, this book will also delve into the domain of operating
systems. Progressing through the chapters, you'll explore various
formats for file storage, including secret hiding places unseen by
the end user or even the operating system. The book will also show
you how to create forensic images of data and maintain integrity
using hashing tools. Finally, you'll cover advanced topics such as
autopsies and acquiring investigation data from networks, operating
system memory, and quantum cryptography. By the end of this book,
you'll have gained hands-on experience of implementing all the
pillars of digital forensics: acquisition, extraction, analysis,
and presentation, all using Kali Linux tools. What you will learn
Get up and running with powerful Kali Linux tools for digital
investigation and analysis Perform internet and memory forensics
with Volatility and Xplico Understand filesystems, storage, and
data fundamentals Become well-versed with incident response
procedures and best practices Perform ransomware analysis using
labs involving actual ransomware Carry out network forensics and
analysis using NetworkMiner and other tools Who this book is
forThis Kali Linux book is for forensics and digital investigators,
security analysts, or anyone interested in learning digital
forensics using Kali Linux. Basic knowledge of Kali Linux will be
helpful to gain a better understanding of the concepts covered.
Understand how to set up, configure, and use Azure Sentinel to
provide security incident and event management services for your
environment Key Features Secure your network, infrastructure, data,
and applications on Microsoft Azure effectively Integrate
artificial intelligence, threat analysis, and automation for
optimal security solutions Investigate possible security breaches
and gather forensic evidence to prevent modern cyber threats Book
DescriptionAzure Sentinel is a Security Information and Event
Management (SIEM) tool developed by Microsoft to integrate cloud
security and artificial intelligence (AI). Azure Sentinel not only
helps clients identify security issues in their environment, but
also uses automation to help resolve these issues. With this book,
you'll implement Azure Sentinel and understand how it can help find
security incidents in your environment with integrated artificial
intelligence, threat analysis, and built-in and community-driven
logic. This book starts with an introduction to Azure Sentinel and
Log Analytics. You'll get to grips with data collection and
management, before learning how to create effective Azure Sentinel
queries to detect anomalous behaviors and patterns of activity. As
you make progress, you'll understand how to develop solutions that
automate the responses required to handle security incidents.
Finally, you'll grasp the latest developments in security, discover
techniques to enhance your cloud security architecture, and explore
how you can contribute to the security community. By the end of
this book, you'll have learned how to implement Azure Sentinel to
fit your needs and be able to protect your environment from cyber
threats and other security issues. What you will learn Understand
how to design and build a security operations center Discover the
key components of a cloud security architecture Manage and
investigate Azure Sentinel incidents Use playbooks to automate
incident responses Understand how to set up Azure Monitor Log
Analytics and Azure Sentinel Ingest data into Azure Sentinel from
the cloud and on-premises devices Perform threat hunting in Azure
Sentinel Who this book is forThis book is for solution architects
and system administrators who are responsible for implementing new
solutions in their infrastructure. Security analysts who need to
monitor and provide immediate security solutions or threat hunters
looking to learn how to use Azure Sentinel to investigate possible
security breaches and gather forensic evidence will also benefit
from this book. Prior experience with cloud security, particularly
Azure, is necessary.
|
You may like...
Die Verevrou
Jan van Tonder
Paperback
R350
R312
Discovery Miles 3 120
Book Lovers
Emily Henry
Paperback
(4)
R275
R254
Discovery Miles 2 540
Hauntings
Niq Mhlongo
Paperback
R280
R259
Discovery Miles 2 590
|