Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Haber, Morey J. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Hibbert, Brad (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Chapter 1: Privileges
  • Chapter 2: Shared Credentials
  • Chapter 3: Password Hacking
  • Chapter 4: Privilege Escalation
  • Chapter 5: Insider Threats
  • Chapter 6: Insider Threats
  • Chapter 7: Threat Hunting
  • Chapter 8: Data Centric Audit and Protection
  • Chapter 9: Privileged Monitoring
  • Chapter 10: Privilege Access Management
  • Chapter 11: PAM Architecture
  • Chapter 12: Break Glass
  • Chapter 13: Industrial Control Systems (ICS)
  • Chapter 14: Internet of Things (IoT)
  • Chapter 15: The Cloud
  • Chapter 16: Mobile Devices
  • Chapter 17: Ransomware
  • Chapter 18: Secured DevOps (SDevOps)
  • Chapter 19: Regulatory Compliance
  • Chapter 20: Sample PAM Use Cases
  • Chapter 21: Deployment Considerations
  • Chapter 22: Privileged Account Management Implementation
  • Chapter 23: Key Takeaways
  • Chapter 24: Conclusion
  • .