Think Like a Hacker: A Sysadmin's Guide to Cybersecurity by Michael Melone
Author:Michael Melone [Melone, Michael]
Language: eng
Format: epub, azw3
Publisher: Bitlatch Books
Published: 2017-06-27T22:00:00+00:00
Summary
Attackers and defenders each have assets which are available to them if they can leverage them. Being able to leverage these benefits is crucial to the success of that party, especially in the case of the defender. In the coming chapters, we will discuss how to design an enterprise service which enables the defender to maximize their benefits and reduce the utility of the attacker’s benefit wherever possible.
So you got Pwned
It happens all too often – suddenly a person in operations opens a ticket to troubleshoot a software issue and discovers malware, or a large amount of funds are unexplainably transferred from the corporate coffers, or perhaps a large amount of data becomes encrypted or goes missing. Sadly, cyberattacks are becoming more common, and it is important to understand how to respond to them.
Dealing with a targeted attack is very different than handling commodity malware (the malicious software one simply stumbles upon on the web occasionally). As previously discussed, addressing a targeted attack situation means addressing the human element as well as the malicious software. A determined human adversary can identify and respond to anomalies such as a handful of systems suddenly going offline, or one of their credentials becoming suddenly invalidated.
Successful eviction of a targeted attacker requires comprehensive planning and rapid execution. This section will discuss the intricacies involved in detecting attacker implants and ultimately evicting the emplaced attacker.
Download
Think Like a Hacker: A Sysadmin's Guide to Cybersecurity by Michael Melone.azw3
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(21660)
Hello! Python by Anthony Briggs(20890)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(19357)
Dependency Injection in .NET by Mark Seemann(18941)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(18567)
Kotlin in Action by Dmitry Jemerov(18354)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18164)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(17026)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16952)
Grails in Action by Glen Smith Peter Ledbrook(16143)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13828)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11830)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10650)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10591)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9754)
Hit Refresh by Satya Nadella(9101)
The Kubernetes Operator Framework Book by Michael Dame(8534)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8358)
Robo-Advisor with Python by Aki Ranin(8303)