Listing 1 - 10 of 78 << page
of 8
>>
Sort by

Multi
Security and Privacy in New Computing Environments : 5th EAI International Conference, SPNCE 2022, Xi'an, China, December 30-31, 2022, Proceedings
Authors: --- ---
ISBN: 9783031306235 9783031306228 9783031306242 Year: 2023 Publisher: Cham Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.


Multi
Cloud Attack Vectors : Building Effective Cyber-Defense Strategies to Protect Cloud Resources
Authors: --- ---
ISBN: 9781484282366 9781484282359 9781484282373 9781484291023 1484282361 Year: 2022 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years, attackers have realigned their efforts, focusing on remaining undetected, monetization after exploitation, and publicly shaming organizations after a breach. New, innovative, and useful products continue to emerge and offer some cloud protection, but they also have distinct limitations. No single, standalone solution or strategy can effectively protect against all cloud attack vectors or identify all malicious activity. The simple fact is that the cloud is based on a company’s assets being offered as services. As a result, the best security any organization can achieve is to establish controls and procedures in conjunction with services that are licensed in the cloud. Cloud Attack Vectors details the risks associated with cloud deployments, the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and shows how to improve detection of malicious activity. What You’ll Learn Know the key definitions pertaining to cloud technologies, threats, and cybersecurity solutions Understand how entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment Implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments Develop a comprehensive model for documenting risk, compliance, and reporting based on your cloud implementation.


Multi
How to Catch a Phish : A Practical Guide to Detecting Phishing Emails
Author:
ISBN: 9781484293614 9781484293607 9781484293621 9798868806698 1484293614 Year: 2023 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis Identify what information is in an email header Review header information and extract key indicators or patterns used for detection Identify signs of a suspicious or malicious email message Detect the tactics that attackers use in phishing emails Safely examine email links and attachments Use a variety of free and simple tools to analyze email messages.


Multi
Rational cybersecurity for business : the security leaders' guide to business alignment
Author:
ISBN: 9781484259528 1484259521 Year: 2020 Publisher: Springer Nature

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. You will: Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan.


Multi
Wireshark for Network Forensics : An Essential Guide for IT and Cloud Professionals
Authors: ---
ISBN: 9781484290019 9781484290002 9781484290026 9781484294475 1484290011 Year: 2023 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. You will: Review Wireshark analysis and network forensics Study traffic capture and its analytics from mobile devices Analyze various access technology and cloud traffic Write your own dissector for any new or proprietary packet formats Capture secured application traffic for analysis.


Multi
Beginning AWS Security : Build Secure, Effective, and Efficient AWS Architecture
Author:
ISBN: 9781484296813 9781484296806 9781484296820 1484296818 Year: 2023 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Improve cloud security within your organization by leveraging AWS’s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. You’ll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization’s needs. You’ll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization’s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not “one and done” Reinforce the need for updates and monitoring as a continued part of AWS security.


Multi
Design and Deploy a Secure Azure Environment : Mapping the NIST Cybersecurity Framework to Azure Services
Author:
ISBN: 9781484296783 9781484296776 9781484296790 1484296788 Year: 2023 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF. The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint. After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF. What You Will Learn Design and deploy security for infrastructure, data, and applications Design and deploy an identify solution Design and deploy a protect solution Design and deploy a detect solution Design and deploy a respond solution Design and deploy a recover solution.


Periodical
Windows IT security.
ISSN: 15554686 19450575 Year: 2005 Publisher: Loveland, CO : Penton Media


Multi
Managing IT Service Security : Methods and Recipes for User Organizations and Providers Along the Supply Chain
Author:
ISBN: 9783031555336 9783031555329 9783031555343 Year: 2024 Publisher: Cham Springer Nature, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers.


Multi
Apache Essentials : Install, Configure, Maintain
Author:
ISBN: 9781484283240 9781484283233 9781484283257 1484283244 Year: 2022 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Take a friendly, non-technical approach to installing, configuring, and maintaining a web server for development and testing on Mac OS, Linux, and Windows. This new edition uses straightforward language to demystify the mechanics of the web, leading the reader through a complex topic via simple, iterative steps. The book reflects current, relevant Apache configurations and web application frameworks, and prepares the reader for working in professional web development environments. You'll begin by reviewing a brief history of Apache that focuses on the necessary foundation to understand what these web servers are and why they are used. You'll then install a basic Apache setup on your operating system that loads a static HTML file for display in a browser. Next you'll work through progressively more detailed configurations towards a modern, secure application development environment for the two most commonly implemented development frameworks: a PHP-based framework such as Laravel or a NodeJS application. In the end, Apache Essentials, second edition will show novice web developers and UX professionals how to quickly and confidently build and test their website changes safely and securely. You will: Install and configure Apache to support your development Support common development frameworks using specific configuration guides Set up a secure web server for testing Use logs for troubleshooting and why that’s important.

Listing 1 - 10 of 78 << page
of 8
>>
Sort by