- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 165字
- 2021-06-30 19:15:47
Summary
In this chapter, you learned more about the current threat landscape and how these new threats are used to compromise credentials, apps, and data. In many scenarios, old hacking techniques are used, such as phishing emails. However, with a more sophisticated approach. You also learned the current reality regarding the nationwide type of threat, and government-targeted attacks. In order to protect your organization against these new threats, you learned about key factors that can help you to enhance your security posture. It is essential that part of this enhancement shifts the attention from protection only to include detection and response. For that, the use of Red and Blue Team becomes imperative. The same concept applies to the assume breach methodology.
In the next chapter, you will continue to learn about the enhancement of your security posture. However, the chapter will focus on the incident response process. The incident response process is primordial for companies that need a better detection and response against cyber threats.
- Cybersecurity:Attack and Defense Strategies
- Red Hat Enterprise Linux 8系統管理實戰
- UNIX操作系統設計
- Linux網絡操作系統與實訓(第三版)
- Mastering Distributed Tracing
- 精解Windows8
- Python基礎教程(第3版)
- Docker+Kubernetes應用開發與快速上云
- 蘋果OS X Mavericks 10.9應用大全
- Fedora 12 Linux應用基礎
- RHCSARHCE 紅帽Linux認證學習指南(第7版)EX200 & EX300
- Linux系統最佳實踐工具:命令行技術
- 從實踐中學習Windows滲透測試
- Linux應用大全 基礎與管理
- Java EE 7 Developer Handbook