Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter networ...
Main Authors: | , |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Berkeley, CA :
Apress
2018.
|
Edition: | 1st ed. 2018. |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630445306719 |
Table of Contents:
- Chapter 1: Privileges
- Chapter 2: Shared Credentials
- Chapter 3: Password Hacking
- Chapter 4: Privilege Escalation
- Chapter 5: Insider Threats
- Chapter 6: Insider Threats
- Chapter 7: Threat Hunting
- Chapter 8: Data Centric Audit and Protection
- Chapter 9: Privileged Monitoring
- Chapter 10: Privilege Access Management
- Chapter 11: PAM Architecture
- Chapter 12: Break Glass
- Chapter 13: Industrial Control Systems (ICS)
- Chapter 14: Internet of Things (IoT)
- Chapter 15: The Cloud
- Chapter 16: Mobile Devices
- Chapter 17: Ransomware
- Chapter 18: Secured DevOps (SDevOps)
- Chapter 19: Regulatory Compliance
- Chapter 20: Sample PAM Use Cases
- Chapter 21: Deployment Considerations
- Chapter 22: Privileged Account Management Implementation
- Chapter 23: Key Takeaways
- Chapter 24: Conclusion
- .