Building an Intelligence-Led Security Program Paperback
暫譯: 建立以智慧為導向的安全計畫 平裝本
Allan Liska
- 出版商: Syngress Media
- 出版日期: 2014-12-05
- 售價: $2,710
- 貴賓價: 9.5 折 $2,575
- 語言: 英文
- 頁數: 200
- 裝訂: Paperback
- ISBN: 0128021454
- ISBN-13: 9780128021453
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
相關主題
商品描述
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.
Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents.
The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
- Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company.
- Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence.
- Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
商品描述(中文翻譯)
最近五年前,保護網路意味著安裝防火牆、入侵偵測系統,以及在桌面上安裝防毒軟體。不幸的是,攻擊者變得更加靈活和有效,這意味著傳統的安全程序已經不再有效。
今天有效的網路安全程序將這些最佳實踐與情報結合起來。添加網路威脅情報可以幫助安全團隊發現傳統安全平台未檢測到的事件,並將看似不相關的事件進行關聯。正確實施的情報還能使安全從業人員的工作變得更輕鬆,幫助他們更有效地優先處理和回應安全事件。
當前努力的問題在於,許多安全從業人員不知道如何正確實施以情報為主導的程序,或擔心這超出了他們的預算。《建立以情報為主導的安全程序》是第一本展示如何在任何預算下在企業中實施以情報為主導的程序的書籍。它將教你如何實施安全資訊和事件管理系統,收集和分析日誌,以及如何實踐真正的網路威脅情報。你將學會如何深入了解你的網路,以便以最佳方式保護它。
- 提供建立以情報為主導的資訊安全程序以保護公司的路線圖和方向。
- 學習如何通過日誌和客戶監控來理解你的網路,以便有效評估威脅情報。
- 學習如何使用流行工具,如 BIND、SNORT、squid、STIX、TAXII、CyBox 和 splunk 來進行網路情報。