Description |
1 online resource |
Contents |
Cover -- Copyright -- Packt Page -- Contributors -- Table of Contents -- Preface -- Chapter 1: Ingredients for a Successful Cybersecurity Strategy -- What is a cybersecurity strategy? -- How organizations get initially compromised and the cybersecurity fundamentals -- Unpatched vulnerabilities -- Security misconfigurations -- Weak, leaked, and stolen credentials -- Social engineering -- Insider threats -- Focus on the cybersecurity fundamentals -- Understanding the difference between the attacker's motivations and tactics -- Other ingredients for a successful strategy |
|
Business objective alignment -- Cybersecurity vision, mission, and imperatives -- Senior executive and board support -- Understand the risk appetite -- Realistic view of current cybersecurity capabilities and technical talent -- Compliance program and control framework alignment -- An effective relationship between cybersecurity and IT -- Security culture -- Chapter summary -- References -- Chapter 2: Using Vulnerability Trends to Reduce Risk and Costs -- Introduction -- Vulnerability Management Primer -- Vulnerability Disclosure Data Sources -- Industry Vulnerability Disclosure Trends |
|
Reducing Risk and Costs -- Measuring Vendor and Product Improvement -- Oracle Vulnerability Trends -- Apple Vulnerability Trends -- IBM Vulnerability Trends -- Google Vulnerability Trends -- Microsoft Vulnerability Trends -- Vendor Vulnerability Trend Summary -- Operating System Vulnerability Trends -- Microsoft Operating System Vulnerability Trends -- Windows XP Vulnerability Trends -- Windows 7 Vulnerability Trends -- Windows Server 2012 and 2016 Vulnerability Trends -- Windows 10 Vulnerability Trends -- Linux Kernel Vulnerability Trends -- Google Android Vulnerability Trends |
|
Apple macOS Vulnerability Trends -- Operating Systems Vulnerability Trend Summary -- Web Browser Vulnerability Trends -- Internet Explorer Vulnerability Trends -- Microsoft Edge Vulnerability Trends -- Google Chrome Vulnerability Trends -- Mozilla Firefox Vulnerability Trends -- Apple Safari Vulnerability Trends -- Web Browser Vulnerability Trend Summary -- Vulnerability Management Guidance -- Chapter summary -- References -- Chapter 3: The Evolution of the Threat Landscape -- Malware -- Introduction -- Why is there so much malware on Windows compared to other platforms? -- Data sources |
|
The Malicious Software Removal Tool -- Real-time anti-malware tools -- Non-security data sources -- About malware -- How malware infections spread -- Trojans -- Potentially unwanted software -- Exploits and exploit kits -- Worms -- Ransomware -- Viruses -- Browser modifiers -- Measuring malware prevalence -- Global windows malware infection analysis -- Regional windows malware infection analysis -- The long-term view of the threat landscape in the Middle East and Northern Africa -- 10-year regional report card for the Middle East and Northern Africa |
Summary |
It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has participated in over a two-decade career. |
Bibliography |
Includes bibliographical references and index. |
Subject |
Computer security.
|
|
Cyberterrorism.
|
|
Malware (Computer software)
|
|
Sécurité informatique. |
|
Cyberterrorisme. |
|
Logiciels malveillants. |
|
Computer security |
|
Cyberterrorism |
|
Malware (Computer software) |
Other Form: |
Print version: Rains, Tim Cybersecurity Threats, Malware Trends, and Strategies : Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks Birmingham : Packt Publishing, Limited,c2020 |
ISBN |
1800205899 (electronic bk.) |
|
9781800205895 (electronic bk.) |
|