|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Develop a comprehensive plan for building a HIPAA-compliant
security operations center, designed to detect and respond to an
increasing number of healthcare data breaches and events. Using
risk analysis, assessment, and management data combined with
knowledge of cybersecurity program maturity, this book gives you
the tools you need to operationalize threat intelligence,
vulnerability management, security monitoring, and incident
response processes to effectively meet the challenges presented by
healthcare's current threats. Healthcare entities are bombarded
with data. Threat intelligence feeds, news updates, and messages
come rapidly and in many forms such as email, podcasts, and more.
New vulnerabilities are found every day in applications, operating
systems, and databases while older vulnerabilities remain
exploitable. Add in the number of dashboards, alerts, and data
points each information security tool provides and security teams
find themselves swimming in oceans of data and unsure where to
focus their energy. There is an urgent need to have a cohesive plan
in place to cut through the noise and face these threats.
Cybersecurity operations do not require expensive tools or large
capital investments. There are ways to capture the necessary data.
Teams protecting data and supporting HIPAA compliance can do this.
All that's required is a plan-which author Eric Thompson provides
in this book. What You Will Learn Know what threat intelligence is
and how you can make it useful Understand how effective
vulnerability management extends beyond the risk scores provided by
vendors Develop continuous monitoring on a budget Ensure that
incident response is appropriate Help healthcare organizations
comply with HIPAA Who This Book Is For Cybersecurity, privacy, and
compliance professionals working for organizations responsible for
creating, maintaining, storing, and protecting patient information.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
Build your organization's cyber defense system by effectively
implementing digital forensics and incident management techniques
Key Features Create a solid incident response framework and manage
cyber incidents effectively Perform malware analysis for effective
incident response Explore real-life scenarios that effectively use
threat intelligence and modeling techniques Book DescriptionAn
understanding of how digital forensics integrates with the overall
response to cybersecurity incidents is key to securing your
organization's infrastructure from attacks. This updated second
edition will help you perform cutting-edge digital forensic
activities and incident response. After focusing on the
fundamentals of incident response that are critical to any
information security team, you'll move on to exploring the incident
response framework. From understanding its importance to creating a
swift and effective response to security incidents, the book will
guide you with the help of useful examples. You'll later get up to
speed with digital forensic techniques, from acquiring evidence and
examining volatile memory through to hard drive examination and
network-based evidence. As you progress, you'll discover the role
that threat intelligence plays in the incident response process.
You'll also learn how to prepare an incident response report that
documents the findings of your analysis. Finally, in addition to
various incident response activities, the book will address malware
analysis, and demonstrate how you can proactively use your digital
forensic skills in threat hunting. By the end of this book, you'll
have learned how to efficiently investigate and report unwanted
security breaches and incidents in your organization. What you will
learn Create and deploy an incident response capability within your
own organization Perform proper evidence acquisition and handling
Analyze the evidence collected and determine the root cause of a
security incident Become well-versed with memory and log analysis
Integrate digital forensic techniques and procedures into the
overall incident response process Understand the different
techniques for threat hunting Write effective incident reports that
document the key findings of your analysis Who this book is forThis
book is for cybersecurity and information security professionals
who want to implement digital forensics and incident response in
their organization. You will also find the book helpful if you are
new to the concept of digital forensics and are looking to get
started with the fundamentals. A basic understanding of operating
systems and some knowledge of networking fundamentals are required
to get started with this book.
|
|