官术网_书友最值得收藏!

What this book covers

Chapter 1, Ingredients for a Successful Cybersecurity Strategy, provides a detailed look at the ingredients that are necessary for a successful cybersecurity program.

Chapter 2, Using Vulnerability Trends to Reduce Risk and Costs, provides a unique 20-year view of vulnerabilities, using vulnerability disclosure data from the National Vulnerability Database. This will help the reader more accurately evaluate the efficacy of cybersecurity strategies discussed in later chapters.

Chapter 3, The Evolution of the Threat Landscape – Malware, provides a unique data-driven perspective of how malware has evolved around the world over a 10 year period. This helps the reader understand the types of malware threats they face and which malware threats are most, and least, prevalent.

Chapter 4, Internet-Based Threats, examines some of the way's attackers have been using the internet and how these methods have evolved over time. This chapter dives into phishing attacks, drive-by download attacks and malware hosting sites.

Chapter 5, Cybersecurity Strategies, discusses the major cybersecurity strategies employed in the industry for the past 20 years or so. This chapter introduces the Cybersecurity Fundamentals Scoring System, which enables the reader to estimate an efficacy score for any cybersecurity strategy.

Chapter 6, Strategy Implementation, provides an example of how one of the best cybersecurity strategies identified can be implemented. This chapter illustrates how an Attack-Centric Strategy, namely the Intrusion Kill Chain, can be implemented.

Chapter 7, Measuring Performance and Effectiveness, looks at the challenge that CISOs and security teams have always had and how to measure the effectiveness of their cybersecurity program. This chapter examines how to measure the performance and effectiveness of a cybersecurity strategy.

Chapter 8, The Cloud – A Modern Approach to Security and Compliance, provides an overview of how the cloud is a great cybersecurity talent amplifier. This chapter looks at how the cloud can mitigate the ways enterprises typically get compromised. Additionally, this chapter dives into how security teams can use encryption and key management to protect data in the cloud.

主站蜘蛛池模板: 西乡县| 凤翔县| 新昌县| 白城市| 峡江县| 沧州市| 齐河县| 陵川县| 久治县| 磐安县| 弥勒县| 曲阜市| 东平县| 邢台市| 兴业县| 张家川| 乌鲁木齐市| 吉首市| 新和县| 林甸县| 平塘县| 昌乐县| 陇西县| 清水河县| 贡嘎县| 吉木萨尔县| 和龙市| 濉溪县| 清丰县| 宜都市| 钦州市| 湛江市| 荆州市| 大余县| 兴城市| 稷山县| 城口县| 尉犁县| 乐至县| 宜君县| 应城市|