Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterNo access
Section I - Understanding the Problem
Pages 1-2 - Book chapterNo access
Chapter 1 - The Changing Threat
Pages 3-26 - Book chapterNo access
Chapter 2 - Why are Organizations Being Compromised?
Pages 27-49 - Book chapterNo access
Chapter 3 - How are Organizations Being Compromised?
Pages 51-76 - Book chapterNo access
Chapter 4 - Risk-Based Approach to Security
Pages 77-96 - Book chapterNo access
Section II - Emerging Trends
Page 97 - Book chapterNo access
Chapter 5 - Protecting Your Data
Pages 99-121 - Book chapterNo access
Chapter 6 - Prevention is Ideal but Detection is a Must
Pages 123-144 - Book chapterNo access
Chapter 7 - Incident Response: Respond and Recover
Pages 145-172 - Book chapterNo access
Chapter 8 - Technologies for Success
Pages 173-205 - Book chapterNo access
Section III - The Future and How to Win
Pages 207-208 - Book chapterNo access
Chapter 9 - The Changing Landscape: Cloud and Mobilization
Pages 209-222 - Book chapterNo access
Chapter 10 - Proactive Security and Reputational Ranking
Pages 223-241 - Book chapterNo access
Chapter 11 - Focusing in on the Right Security
Pages 243-254 - Book chapterNo access
Chapter 12 - Implementing Adaptive Security
Pages 255-282 - Book chapterNo access
Index
Pages 283-290
About the book
Description
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.
Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.
Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.
Key Features
- How and why organizations are being attacked
- How to develop a "Risk based Approach to Security"
- Tools for protecting data and preventing attacks
- Critical information on how to respond and recover from an intrusion
- The emerging threat to Cloud based networks
- How and why organizations are being attacked
- How to develop a "Risk based Approach to Security"
- Tools for protecting data and preventing attacks
- Critical information on how to respond and recover from an intrusion
- The emerging threat to Cloud based networks
Details
ISBN
978-1-59749-949-1
Language
English
Published
2013
Copyright
Copyright © 2012 Elsevier Inc. All rights reserved
Imprint
Syngress