Cover for Advanced Persistent Security

Advanced Persistent Security

A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Book2017

Authors:

Ira Winkler and Araceli Treu Gomes

Advanced Persistent Security

A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Book2017

 

Cover for Advanced Persistent Security

Authors:

Ira Winkler and Araceli Treu Gomes

Browse this book

Book description

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk asses ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    Chapter 1 - What Is Advanced Persistent Security?

    Pages 1-11

  3. Book chapterNo access

    Index

    Pages 235-241

About the book

Description

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.

Key Features

  • Contains practical and cost-effective recommendations for proactive and reactive protective measures
  • Teaches users how to establish a viable threat intelligence program
  • Focuses on how social networks present a double-edged sword against security programs
  • Contains practical and cost-effective recommendations for proactive and reactive protective measures
  • Teaches users how to establish a viable threat intelligence program
  • Focuses on how social networks present a double-edged sword against security programs

Details

ISBN

978-0-12-809316-0

Language

English

Published

2017

Copyright

Copyright © 2017 Elsevier Inc. All rights reserved.

Imprint

Syngress

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

Ira Winkler

Araceli Treu Gomes