- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 165字
- 2021-06-30 19:15:47
Summary
In this chapter, you learned more about the current threat landscape and how these new threats are used to compromise credentials, apps, and data. In many scenarios, old hacking techniques are used, such as phishing emails. However, with a more sophisticated approach. You also learned the current reality regarding the nationwide type of threat, and government-targeted attacks. In order to protect your organization against these new threats, you learned about key factors that can help you to enhance your security posture. It is essential that part of this enhancement shifts the attention from protection only to include detection and response. For that, the use of Red and Blue Team becomes imperative. The same concept applies to the assume breach methodology.
In the next chapter, you will continue to learn about the enhancement of your security posture. However, the chapter will focus on the incident response process. The incident response process is primordial for companies that need a better detection and response against cyber threats.
- 從零開始寫Linux內(nèi)核:一書學(xué)透核心原理與實(shí)現(xiàn)
- BPEL and Java Cookbook
- 嵌入式Linux系統(tǒng)開發(fā):基于Yocto Project
- Docker+Kubernetes應(yīng)用開發(fā)與快速上云
- Moodle 3.x Teaching Techniques(Third Edition)
- AutoCAD 2014中文版從入門到精通
- CentOS 6 Linux Server Cookbook
- Building Telephony Systems With Asterisk
- VMware Horizon Mirage Essentials
- Office 365 User Guide
- Linux指令從初學(xué)到精通
- Linux網(wǎng)絡(luò)操作系統(tǒng)項(xiàng)目教程(RHEL 6.4/CentOS 6.4)(第2版)
- 物聯(lián)網(wǎng)操作系統(tǒng)AliOS Things探索與實(shí)踐
- OpenStack Trove Essentials
- 深入理解嵌入式Linux設(shè)備驅(qū)動(dòng)程序