Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...
Κύριοι συγγραφείς: | , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2018.
|
Έκδοση: | 1st ed. 2018. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Chapter 1: Privileges
- Chapter 2: Shared Credentials
- Chapter 3: Password Hacking
- Chapter 4: Privilege Escalation
- Chapter 5: Insider Threats
- Chapter 6: Insider Threats
- Chapter 7: Threat Hunting
- Chapter 8: Data Centric Audit and Protection
- Chapter 9: Privileged Monitoring
- Chapter 10: Privilege Access Management
- Chapter 11: PAM Architecture
- Chapter 12: Break Glass
- Chapter 13: Industrial Control Systems (ICS)
- Chapter 14: Internet of Things (IoT)
- Chapter 15: The Cloud
- Chapter 16: Mobile Devices
- Chapter 17: Ransomware
- Chapter 18: Secured DevOps (SDevOps)
- Chapter 19: Regulatory Compliance
- Chapter 20: Sample PAM Use Cases
- Chapter 21: Deployment Considerations
- Chapter 22: Privileged Account Management Implementation
- Chapter 23: Key Takeaways
- Chapter 24: Conclusion
- .