Advanced Persistent Threat

دانلود کتاب Advanced Persistent Threat

57000 تومان موجود

کتاب تهدید مداوم پیشرفته نسخه زبان اصلی

دانلود کتاب تهدید مداوم پیشرفته بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 3


توضیحاتی در مورد کتاب Advanced Persistent Threat

نام کتاب : Advanced Persistent Threat
عنوان ترجمه شده به فارسی : تهدید مداوم پیشرفته
سری :
ناشر : Syngress
سال نشر : 2012
تعداد صفحات : 292
ISBN (شابک) : 9781597499491
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 5 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.

توضیحاتی در مورد کتاب :


جدیدترین تهدید برای امنیت به عنوان تهدید پایدار پیشرفته یا APT طبقه بندی شده است. APT اکثر دستگاه‌های امنیتی فعلی یک سازمان را دور می‌زند و معمولاً توسط یک گروه سازمان‌یافته، مانند یک دولت ملی خارجی یا گروه سرکش، با توانایی و قصد هدف قرار دادن مداوم و مؤثر یک نهاد خاص و ایجاد ویرانی انجام می‌شود. اکثر سازمان ها نمی دانند که چگونه با آن برخورد کنند و چه چیزی برای محافظت از شبکه خود در برابر سازش لازم است. اریک کول در کتاب تهدید مداوم پیشرفته: درک خطر و نحوه محافظت از سازمان خود درباره اطلاعات مهمی که خوانندگان باید در مورد APT بدانند و چگونگی جلوگیری از قربانی شدن صحبت می کند. Advanced Persistent Threat اولین کتابچه راهنمای جامعی است که در مورد چگونگی نفوذ مهاجمان به سیستم ها و اقدامات لازم برای محافظت و دفاع در برابر این نفوذها بحث می کند. Advanced Persistent Threat آنچه شما باید بدانید را پوشش می دهد از جمله: . چگونه و چرا سازمان ها مورد حمله قرار می گیرند. چگونه یک "رویکرد مبتنی بر ریسک برای امنیت" ایجاد کنیم. ابزارهایی برای محافظت از داده ها و جلوگیری از حملات. اطلاعات مهم در مورد نحوه پاسخگویی و بازیابی از یک نفوذ. تهدید در حال ظهور برای شبکه های مبتنی بر ابر

فهرست مطالب :


Front Cover Half Title Advanced PersistentThreat Copyright Dedication Contents Author Biography Preface Understanding the Problem 1 The Changing Threat Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buffer Overflows Macros in Office Documents The Traditional Threat Common Cold Reactive Security Automation The Emerging Threat APT—Cyber Cancer Advanced Persistent Threat (APT) APT—Stealthy, Targeted, and Data Focused Characteristics of the APT Defending Against the APT APT vs Traditional Threat Sample APT Attacks APT Multi-Phased Approach Summary 2 Why are Organizations Being Compromised? Introduction Doing Good Things and Doing the Right Things Security is Not Helpless Beyond Good or Bad Attackers are in Your Network Proactive, Predictive, and Adaptive Example of How to Win Data Centric Security Money Does Not Equal Security The New Approach to APT Selling Security to Your Executives Top Security Trends Summary 3 How are Organizations Being Compromised? Introduction What are Attackers After? Attacker Process Reconnaissance Scanning Exploitation Create Backdoors Cover Their Tracks Compromising a Server Compromising a Client Insider Threat Traditional Security Firewalls Dropped Packets InBound Prevention and OutBound Detection Intrusion Detection Summary 4 Risk-Based Approach to Security Introduction Products vs. Solutions Learning from the Past What is Risk? Focused Security Formal Risk Model Threat External vs. Internal Threat Vulnerability Known and Unknown Vulnerabilities Putting the Pieces Back Together Insurance Model Calculating Risk Summary Emerging Trends 5 Protecting Your Data Introduction Data Discovery Protected Enclaves Everything Starts with Your Data CIA Data Classification Data Classification Mistake 1 Data Classification Rule 1 Data Classification Mistake 2 Data Classification Rule 2 Data Classification Mistake 3 Data Classification Rule 3 Encryption Types of Encryption Goals of Encryption Data at Rest Data at Motion Encryption—More Than You Bargained For Network Segmentation and De-Scoping Encryption Free Zone Summary 6 Prevention is Ideal but Detection is a Must Introduction Inbound Prevention Outbound Detection Network vs. Host Making Hard Decisions Is AV/Host Protection Dead? Summary 7 Incident Response: Respond and Recover Introduction The New Rule Suicidal Mindset Incident Response Events/Audit Trails Sample Incidents 6-Step Process Preparation Identification Containment Eradication Recovery Lesson Learned Forensic Overview Summary 8 Technologies for Success Introduction Integrated Approach to APT How Bad is the Problem? Trying to Hit a Moving Target Finding the Needle in the Haystack Understand What You Have Identifying APT Assessment and Discovery Analysis and Remediation Program Review Minimizing the Problem End to End Solution for the APT Summary The Future and How to Win 9 The Changing Landscape: Cloud and Mobilization Introduction You Cannot Fight the Cloud Is the Cloud Really New? What is the Cloud? Securing the Cloud Reducing Cloud Computing Risks Mobilization—BYOD (Bring Your Own Device) Dealing with Future Technologies Summary 10 Proactive Security and Reputational Ranking Introduction Facing Reality Predicting Attacks to Become Proactive Advanced Persistent Threat Changing How You Think About Security The Problem has Changed The APT Defendable Network Summary 11 Focusing in on the Right Security Introduction What is the Problem That is Being Solved? If the Offense Knows More Than the Defense You Will Loose Enhancing User Awareness Virtualized Sandboxing Patching White Listing Summary 12 Implementing Adaptive Security Introduction Focusing on the Human Focusing on the Data Game Plan Prioritizing Risks Key Emerging Technologies The Critical Controls Summary Index A B C D E F H I M N O P R S T U V W Z main.pdf Copyright

توضیحاتی در مورد کتاب به زبان اصلی :


The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. Advanced Persistent Threat covers what you need to know including: . How and why organizations are being attacked . How to develop a "Risk based Approach to Security" . Tools for protecting data and preventing attacks . Critical information on how to respond and recover from an intrusion . The emerging threat to Cloud based networks



پست ها تصادفی