LEADER 00000cam a2200625 i 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu|||unuuu 008 230131s2023 enka ob 001 0 eng d 019 1377285771 020 9781804618950|q(electronic bk.) 020 1804618950|q(electronic bk.) 029 1 AU@|b000073351718 035 (OCoLC)1367350753|z(OCoLC)1377285771 037 9781804613672|bO'Reilly Media 037 10163046|bIEEE 040 ORMDA|beng|erda|epn|cORMDA|dEBLCP|dOCLCQ|dOCLCF|dN$T|dNBJ |dIEEEE|dOCLCQ|dOCLCO|dOCLCQ 049 INap 082 04 005.8 082 04 005.8|223/eng/20230131 099 |h[O'Reilly electronic resource] 100 1 Rains, Tim,|eauthor. 245 10 Cybersecurity threats, malware trends, and strategies : |bdiscover risk mitigation strategies for modern threats to your organization /|cTim Rains ; foreword by Timothy Youngblood.|h[O'Reilly electronic resource] 250 Second edition. 264 1 Birmingham, UK :|bPackt Publishing Ltd.,|c2023. 300 1 online resource (xvi, 555 pages) 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 490 1 Expert insight 504 Includes bibliographical references and index. 505 0 Chapter 1: Introduction -- Different types of CISOs: "The CISO Spectrum" -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between attackers' motivations and tactics -- Summary -- References -- Chapter 2: What to Know about Threat Intelligence -- What is threat intelligence? 505 8 Where does CTI data come from? -- Using threat intelligence -- The key to using threat intelligence -- Threat intelligence sharing -- CTI sharing protocols -- Traffic Light Protocol -- STIX and TAXII -- Reasons not to share CTI -- How to identify credible cyber threat intelligence -- Data sources -- Time periods -- Recognizing hype -- Predictions about the future -- Vendors' motives -- Summary -- References -- Chapter 3: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources 505 8 Industry Vulnerability Disclosure Trends -- Vendor and Product Vulnerability Trends -- Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Microsoft Vulnerability Trends -- Oracle Vulnerability Trends -- Google Vulnerability Trends -- Debian Vulnerability Trends -- Apple Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Google Android Vulnerability Trends -- Apple iOS Vulnerability Trends -- Mobile Operating System Summary -- Microsoft Windows 10 Vulnerability Trends -- Apple macOS Vulnerability Trends 505 8 Desktop Operating System Summary -- Ubuntu Linux Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Microsoft Windows Server 2016 Vulnerability Trends -- Server Operating System Summary -- Web Browser Vulnerability Trends -- Apple Safari Vulnerability Trends -- Google Chrome Vulnerability Trends -- Web Browser Summary -- Vulnerability Improvement Framework Summary -- Vulnerability Management Guidance -- Summary -- References -- Chapter 4: The Evolution of Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources 505 8 The Malicious Software Removal Tool -- Real-time anti- malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global Windows malware infection analysis -- Regional Windows malware infection analysis -- The threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa -- The threat landscape in the European Union and Eastern Europe 520 Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio- economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud. By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer security. 650 0 Cyberterrorism. 650 0 Malware (Computer software) 650 6 Sécurité informatique. 650 6 Cyberterrorisme. 650 6 Logiciels malveillants. 650 7 Computer security|2fast 650 7 Cyberterrorism|2fast 650 7 Malware (Computer software)|2fast 655 0 Electronic books. 700 1 Youngblood, Timothy,|ewriter of foreword. 830 0 Expert insight. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781804613672/?ar |zAvailable on O'Reilly for Public Libraries 938 ProQuest Ebook Central|bEBLB|nEBL30347745 938 EBSCOhost|bEBSC|n3536713 994 92|bJFN