CYBERSECURITY THREATS, MALWARE TRENDS, AND STRATEGIES MITIGATE EXPLOITS, MALWARE, PHISHING, AND OTHER SOCIAL ENGINEERING ATTACKS.: MITIGATE EXPLOITS, MALWARE, PHISHING, AND OTHER SOCIAL ENGINEERING ATTACKS. (2020)
- Record Type:
- Book
- Title:
- CYBERSECURITY THREATS, MALWARE TRENDS, AND STRATEGIES MITIGATE EXPLOITS, MALWARE, PHISHING, AND OTHER SOCIAL ENGINEERING ATTACKS.: MITIGATE EXPLOITS, MALWARE, PHISHING, AND OTHER SOCIAL ENGINEERING ATTACKS. (2020)
- Main Title:
- CYBERSECURITY THREATS, MALWARE TRENDS, AND STRATEGIES MITIGATE EXPLOITS, MALWARE, PHISHING, AND OTHER SOCIAL ENGINEERING ATTACKS.
- Other Names:
- Rains, Tim
- Contents:
- Cover -- Copyright -- Packt Page -- Contributors -- Table of Contents -- Preface -- Chapter 1: Ingredients for a Successful Cybersecurity Strategy -- What is a cybersecurity strategy? -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between the attacker's motivations and tactics -- Other ingredients for a successful strategy Business objective alignment -- Cybersecurity vision, mission, and imperatives -- Senior executive and board support -- Understand the risk appetite -- Realistic view of current cybersecurity capabilities and technical talent -- Compliance program and control framework alignment -- An effective relationship between cybersecurity and IT -- Security culture -- Chapter summary -- References -- Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources -- Industry Vulnerability Disclosure Trends Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Oracle Vulnerability Trends -- Apple Vulnerability Trends -- IBM Vulnerability Trends -- Google Vulnerability Trends -- Microsoft Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Microsoft Operating SystemCover -- Copyright -- Packt Page -- Contributors -- Table of Contents -- Preface -- Chapter 1: Ingredients for a Successful Cybersecurity Strategy -- What is a cybersecurity strategy? -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between the attacker's motivations and tactics -- Other ingredients for a successful strategy Business objective alignment -- Cybersecurity vision, mission, and imperatives -- Senior executive and board support -- Understand the risk appetite -- Realistic view of current cybersecurity capabilities and technical talent -- Compliance program and control framework alignment -- An effective relationship between cybersecurity and IT -- Security culture -- Chapter summary -- References -- Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources -- Industry Vulnerability Disclosure Trends Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Oracle Vulnerability Trends -- Apple Vulnerability Trends -- IBM Vulnerability Trends -- Google Vulnerability Trends -- Microsoft Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Microsoft Operating System Vulnerability Trends -- Windows XP Vulnerability Trends -- Windows 7 Vulnerability Trends -- Windows Server 2012 and 2016 Vulnerability Trends -- Windows 10 Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Google Android Vulnerability Trends Apple macOS Vulnerability Trends -- Operating Systems Vulnerability Trend Summary -- Web Browser Vulnerability Trends -- Internet Explorer Vulnerability Trends -- Microsoft Edge Vulnerability Trends -- Google Chrome Vulnerability Trends -- Mozilla Firefox Vulnerability Trends -- Apple Safari Vulnerability Trends -- Web Browser Vulnerability Trend Summary -- Vulnerability Management Guidance -- Chapter summary -- References -- Chapter 3: The Evolution of the Threat Landscape -- Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global windows malware infection analysis -- Regional windows malware infection analysis -- The long-term view of the threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa … (more)
- Publisher Details:
- S.l. : PACKT PUBLISHING
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
Cyberterrorism
Malware (Computer software)
Computer security
Cyberterrorism
Malware (Computer software)
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 1800205899
9781800205895 - Related ISBNs:
- 9781800206014
- Notes:
- Note: Includes bibliographical references and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.505354
- Ingest File:
- 03_079.xml