|
Showing 1 - 14 of
14 matches in All Departments
This book is a second edition. The last one reviewed the evolution
of the Cloud, important Cloud concepts and terminology, and the
threats that are posed on a daily basis to it. A deep dive into the
components of Microsoft Azure were also provided, as well as Risk
Mitigation strategies, and protecting data that resides in a Cloud
environment. In this second edition, we extend this knowledge
gained to discuss the concepts of Microsoft Azure. We also examine
how Microsoft is playing a huge role in Artificial Intelligence and
Machine Learning with its relationship with OpenAI. An overview
into ChatGPT is also provided, along with a very serious discussion
of the Social Implications for Artificial Intelligence.
The COVID-19 pandemic has had so many unprecedented consequences.
The great global shift from office work to remote work is one such
consequence, with which many information security professionals are
struggling. Office workers have been hastily given equipment that
has not been properly secured or must use personal devices to
perform office work. The proliferation of videoconferencing has
brought about new types of cyber-attacks. When the pandemic struck,
many organizations found they had no, or old and unworkable,
business continuity and disaster recovery plans. Business Recovery
and Continuity in a Mega Disaster: Cybersecurity Lessons Learned
from the COVID-19 Pandemic reviews the COVID-19 pandemic and
related information security issues. It then develops a series of
lessons learned from this reviews and explains how organizations
can prepare for the next global mega disaster. The following
presents some of the key lessons learned: The lack of vetting for
third party suppliers and vendors The lack of controls surrounding
data privacy, especially as it relates to the personal identifiable
information (PPI) data sets The intermingling of home and corporate
networks The lack of a secure remote workforce The emergence of
supply chain attacks (e.g., Solar Winds) To address the issues
raised in these lessons learned, CISOs and their security teams
must have tools and methodologies in place to address the
following: The need for incident response, disaster recovery, and
business continuity plans The need for effective penetration
testing The importance of threat hunting The need for endpoint
security The need to use the SOAR model The importance of a
zero-trust framework This book provides practical coverage of these
topics to prepare information security professionals for any type
of future disaster. The COVID-19 pandemic has changed the entire
world to unprecedented and previously unimaginable levels. Many
businesses, especially in the United States, were completely caught
off guard, and they had no concrete plans put into place, from a
cybersecurity standpoint, for how to deal with this mega disaster.
This how-to book fully prepares CIOs, CISOs, and their teams for
the next disaster, whether natural or manmade, with the various
lessons that have been learned thus far from the COVID-19 pandemic.
Written by an author that has real world experience in launching a
cyber consulting company. Comprehensive coverage ranging all the
way from the legal formation to be used to which segment of the
Cybersecurity Industry should be targeted. Explains how CISOs can
market their services and get key customers.
This book is a second edition. The last one reviewed the evolution
of the Cloud, important Cloud concepts and terminology, and the
threats that are posed on a daily basis to it. A deep dive into the
components of Microsoft Azure were also provided, as well as Risk
Mitigation strategies, and protecting data that resides in a Cloud
environment. In this second edition, we extend this knowledge
gained to discuss the concepts of Microsoft Azure. We also examine
how Microsoft is playing a huge role in Artificial Intelligence and
Machine Learning with its relationship with OpenAI. An overview
into ChatGPT is also provided, along with a very serious discussion
of the Social Implications for Artificial Intelligence.
Written by an author that has real world experience in launching a
cyber consulting company. Comprehensive coverage ranging all the
way from the legal formation to be used to which segment of the
Cybersecurity Industry should be targeted. Explains how CISOs can
market their services and get key customers.
The COVID-19 pandemic has had so many unprecedented consequences.
The great global shift from office work to remote work is one such
consequence, with which many information security professionals are
struggling. Office workers have been hastily given equipment that
has not been properly secured or must use personal devices to
perform office work. The proliferation of videoconferencing has
brought about new types of cyber-attacks. When the pandemic struck,
many organizations found they had no, or old and unworkable,
business continuity and disaster recovery plans. Business Recovery
and Continuity in a Mega Disaster: Cybersecurity Lessons Learned
from the COVID-19 Pandemic reviews the COVID-19 pandemic and
related information security issues. It then develops a series of
lessons learned from this reviews and explains how organizations
can prepare for the next global mega disaster. The following
presents some of the key lessons learned: The lack of vetting for
third party suppliers and vendors The lack of controls surrounding
data privacy, especially as it relates to the personal identifiable
information (PPI) data sets The intermingling of home and corporate
networks The lack of a secure remote workforce The emergence of
supply chain attacks (e.g., Solar Winds) To address the issues
raised in these lessons learned, CISOs and their security teams
must have tools and methodologies in place to address the
following: The need for incident response, disaster recovery, and
business continuity plans The need for effective penetration
testing The importance of threat hunting The need for endpoint
security The need to use the SOAR model The importance of a
zero-trust framework This book provides practical coverage of these
topics to prepare information security professionals for any type
of future disaster. The COVID-19 pandemic has changed the entire
world to unprecedented and previously unimaginable levels. Many
businesses, especially in the United States, were completely caught
off guard, and they had no concrete plans put into place, from a
cybersecurity standpoint, for how to deal with this mega disaster.
This how-to book fully prepares CIOs, CISOs, and their teams for
the next disaster, whether natural or manmade, with the various
lessons that have been learned thus far from the COVID-19 pandemic.
Remote workforces using VPNs, cloud-based infrastructure and
critical systems, and a proliferation in phishing attacks and
fraudulent websites are all raising the level of risk for every
company. It all comes down to just one thing that is at stake: how
to gauge a company's level of cyber risk and the tolerance level
for this risk. Loosely put, this translates to how much uncertainty
an organization can tolerate before it starts to negatively affect
mission critical flows and business processes. Trying to gauge this
can be a huge and nebulous task for any IT security team to
accomplish. Making this task so difficult are the many frameworks
and models that can be utilized. It is very confusing to know which
one to utilize in order to achieve a high level of security.
Complicating this situation further is that both quantitative and
qualitative variables must be considered and deployed into a cyber
risk model. Assessing and Insuring Cybersecurity Risk provides an
insight into how to gauge an organization's particular level of
cyber risk, and what would be deemed appropriate for the
organization's risk tolerance. In addition to computing the level
of cyber risk, an IT security team has to determine the appropriate
controls that are needed to mitigate cyber risk. Also to be
considered are the standards and best practices that the IT
security team has to implement for complying with such regulations
and mandates as CCPA, GDPR, and the HIPAA. To help a security team
to comprehensively assess an organization's cyber risk level and
how to insure against it, the book covers: The mechanics of cyber
risk Risk controls that need to be put into place The issues and
benefits of cybersecurity risk insurance policies GDPR, CCPA, and
the the CMMC Gauging how much cyber risk and uncertainty an
organization can tolerate is a complex and complicated task, and
this book helps to make it more understandable and manageable.
Remote workforces using VPNs, cloud-based infrastructure and
critical systems, and a proliferation in phishing attacks and
fraudulent websites are all raising the level of risk for every
company. It all comes down to just one thing that is at stake: how
to gauge a company's level of cyber risk and the tolerance level
for this risk. Loosely put, this translates to how much uncertainty
an organization can tolerate before it starts to negatively affect
mission critical flows and business processes. Trying to gauge this
can be a huge and nebulous task for any IT security team to
accomplish. Making this task so difficult are the many frameworks
and models that can be utilized. It is very confusing to know which
one to utilize in order to achieve a high level of security.
Complicating this situation further is that both quantitative and
qualitative variables must be considered and deployed into a cyber
risk model. Assessing and Insuring Cybersecurity Risk provides an
insight into how to gauge an organization's particular level of
cyber risk, and what would be deemed appropriate for the
organization's risk tolerance. In addition to computing the level
of cyber risk, an IT security team has to determine the appropriate
controls that are needed to mitigate cyber risk. Also to be
considered are the standards and best practices that the IT
security team has to implement for complying with such regulations
and mandates as CCPA, GDPR, and the HIPAA. To help a security team
to comprehensively assess an organization's cyber risk level and
how to insure against it, the book covers: The mechanics of cyber
risk Risk controls that need to be put into place The issues and
benefits of cybersecurity risk insurance policies GDPR, CCPA, and
the the CMMC Gauging how much cyber risk and uncertainty an
organization can tolerate is a complex and complicated task, and
this book helps to make it more understandable and manageable.
The world of cybersecurity and the landscape that it possesses is
changing on a dynamic basis. It seems like that hardly one threat
vector is launched, new variants of it are already on the way. IT
Security teams in businesses and corporations are struggling daily
to fight off any cyberthreats that they are experiencing. On top of
this, they are also asked by their CIO or CISO to model what future
Cyberattacks could potentially look like, and ways as to how the
lines of defenses can be further enhanced. IT Security teams are
overburdened and are struggling to find ways in order to keep up
with what they are being asked to do. Trying to model the
cyberthreat landscape is a very laborious process, because it takes
a lot of time to analyze datasets from many intelligence feeds.
What can be done to accomplish this Herculean task? The answer lies
in Artificial Intelligence (AI). With AI, an IT Security team can
model what the future Cyberthreat landscape could potentially look
like in just a matter of minutes. As a result, this gives valuable
time for them not only to fight off the threats that they are
facing, but to also come up with solutions for the variants that
will come out later. Practical AI for Cybersecurity explores the
ways and methods as to how AI can be used in cybersecurity, with an
emphasis upon its subcomponents of machine learning, computer
vision, and neural networks. The book shows how AI can be used to
help automate the routine and ordinary tasks that are encountered
by both penetration testing and threat hunting teams. The result is
that security professionals can spend more time finding and
discovering unknown vulnerabilities and weaknesses that their
systems are facing, as well as be able to come up with solid
recommendations as to how the systems can be patched up quickly.
Web applications occupy a large space within the IT infrastructure
of a business or a corporation. They simply just don't touch a
front end or a back end; today's web apps impact just about every
corner of it. Today's web apps have become complex, which has made
them a prime target for sophisticated cyberattacks. As a result,
web apps must be literally tested from the inside and out in terms
of security before they can be deployed and launched to the public
for business transactions to occur. The primary objective of this
book is to address those specific areas that require testing before
a web app can be considered to be completely secure. The book
specifically examines five key areas: Network security: This
encompasses the various network components that are involved in
order for the end user to access the particular web app from the
server where it is stored at to where it is being transmitted to,
whether it is a physical computer itself or a wireless device (such
as a smartphone). Cryptography: This area includes not only
securing the lines of network communications between the server
upon which the web app is stored at and from where it is accessed
from but also ensuring that all personally identifiable information
(PII) that is stored remains in a ciphertext format and that its
integrity remains intact while in transmission. Penetration
testing: This involves literally breaking apart a Web app from the
external environment and going inside of it, in order to discover
all weaknesses and vulnerabilities and making sure that they are
patched before the actual Web app is launched into a production
state of operation. Threat hunting: This uses both skilled analysts
and tools on the Web app and supporting infrastructure to
continuously monitor the environment to find all security holes and
gaps. The Dark Web: This is that part of the Internet that is not
openly visible to the public. As its name implies, this is the
"sinister" part of the Internet, and in fact, where much of the PII
that is hijacked from a web app cyberattack is sold to other
cyberattackers in order to launch more covert and damaging threats
to a potential victim. Testing and Securing Web Applications breaks
down the complexity of web application security testing so this
critical part of IT and corporate infrastructure remains safe and
in operation.
Web applications occupy a large space within the IT infrastructure
of a business or a corporation. They simply just don't touch a
front end or a back end; today's web apps impact just about every
corner of it. Today's web apps have become complex, which has made
them a prime target for sophisticated cyberattacks. As a result,
web apps must be literally tested from the inside and out in terms
of security before they can be deployed and launched to the public
for business transactions to occur. The primary objective of this
book is to address those specific areas that require testing before
a web app can be considered to be completely secure. The book
specifically examines five key areas: Network security: This
encompasses the various network components that are involved in
order for the end user to access the particular web app from the
server where it is stored at to where it is being transmitted to,
whether it is a physical computer itself or a wireless device (such
as a smartphone). Cryptography: This area includes not only
securing the lines of network communications between the server
upon which the web app is stored at and from where it is accessed
from but also ensuring that all personally identifiable information
(PII) that is stored remains in a ciphertext format and that its
integrity remains intact while in transmission. Penetration
testing: This involves literally breaking apart a Web app from the
external environment and going inside of it, in order to discover
all weaknesses and vulnerabilities and making sure that they are
patched before the actual Web app is launched into a production
state of operation. Threat hunting: This uses both skilled analysts
and tools on the Web app and supporting infrastructure to
continuously monitor the environment to find all security holes and
gaps. The Dark Web: This is that part of the Internet that is not
openly visible to the public. As its name implies, this is the
"sinister" part of the Internet, and in fact, where much of the PII
that is hijacked from a web app cyberattack is sold to other
cyberattackers in order to launch more covert and damaging threats
to a potential victim. Testing and Securing Web Applications breaks
down the complexity of web application security testing so this
critical part of IT and corporate infrastructure remains safe and
in operation.
The world of cybersecurity and the landscape that it possesses is
changing on a dynamic basis. It seems like that hardly one threat
vector is launched, new variants of it are already on the way. IT
Security teams in businesses and corporations are struggling daily
to fight off any cyberthreats that they are experiencing. On top of
this, they are also asked by their CIO or CISO to model what future
Cyberattacks could potentially look like, and ways as to how the
lines of defenses can be further enhanced. IT Security teams are
overburdened and are struggling to find ways in order to keep up
with what they are being asked to do. Trying to model the
cyberthreat landscape is a very laborious process, because it takes
a lot of time to analyze datasets from many intelligence feeds.
What can be done to accomplish this Herculean task? The answer lies
in Artificial Intelligence (AI). With AI, an IT Security team can
model what the future Cyberthreat landscape could potentially look
like in just a matter of minutes. As a result, this gives valuable
time for them not only to fight off the threats that they are
facing, but to also come up with solutions for the variants that
will come out later. Practical AI for Cybersecurity explores the
ways and methods as to how AI can be used in cybersecurity, with an
emphasis upon its subcomponents of machine learning, computer
vision, and neural networks. The book shows how AI can be used to
help automate the routine and ordinary tasks that are encountered
by both penetration testing and threat hunting teams. The result is
that security professionals can spend more time finding and
discovering unknown vulnerabilities and weaknesses that their
systems are facing, as well as be able to come up with solid
recommendations as to how the systems can be patched up quickly.
Most biometric books are either extraordinarily technical for
technophiles or extremely elementary for the lay person. Striking a
balance between the two, Biometric Technology: Authentication,
Biocryptography, and Cloud-Based Architecture is ideal for
business, IT, or security managers that are faced with the task of
making purchasing, migration, or adoption decisions. It brings
biometrics down to an understandable level, so that you can
immediately begin to implement the concepts discussed. Exploring
the technological and social implications of widespread biometric
use, the book considers the science and technology behind
biometrics as well as how it can be made more affordable for small
and medium-sized business. It also presents the results of recent
research on how the principles of cryptography can make biometrics
more secure. Covering biometric technologies in the cloud,
including security and privacy concerns, the book includes a
chapter that serves as a "how-to manual" on procuring and deploying
any type of biometric system. It also includes specific examples
and case studies of actual biometric deployments of localized and
national implementations in the U.S. and other countries. The book
provides readers with a technical background on the various
biometric technologies and how they work. Examining optimal
application in various settings and their respective strengths and
weaknesses, it considers ease of use, false positives and
negatives, and privacy and security issues. It also covers emerging
applications such as biocryptography. Although the text can be
understood by just about anybody, it is an ideal resource for
corporate-level executives who are considering implementing
biometric technologies in their organizations.
Most biometric books are either extraordinarily technical for
technophiles or extremely elementary for the lay person. Striking a
balance between the two, Biometric Technology: Authentication,
Biocryptography, and Cloud-Based Architecture is ideal for
business, IT, or security managers that are faced with the task of
making purchasing, migration, or adoption decisions. It brings
biometrics down to an understandable level, so that you can
immediately begin to implement the concepts discussed. Exploring
the technological and social implications of widespread biometric
use, the book considers the science and technology behind
biometrics as well as how it can be made more affordable for small
and medium-sized business. It also presents the results of recent
research on how the principles of cryptography can make biometrics
more secure. Covering biometric technologies in the cloud,
including security and privacy concerns, the book includes a
chapter that serves as a "how-to manual" on procuring and deploying
any type of biometric system. It also includes specific examples
and case studies of actual biometric deployments of localized and
national implementations in the U.S. and other countries. The book
provides readers with a technical background on the various
biometric technologies and how they work. Examining optimal
application in various settings and their respective strengths and
weaknesses, it considers ease of use, false positives and
negatives, and privacy and security issues. It also covers emerging
applications such as biocryptography. Although the text can be
understood by just about anybody, it is an ideal resource for
corporate-level executives who are considering implementing
biometric technologies in their organizations.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|