Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
暫譯: 特權攻擊向量:建立有效的網路防禦策略以保護組織
Morey J. Haber, Brad Hibbert
相關主題
商品描述
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.
In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats.
There is no one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations.
Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact.
What You’ll Learn
- Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack
- Implement defensive and auditing strategies to mitigate the threats and risk
- Understand a 12-step privileged access management Implementation plan
- Consider deployment and scope, including risk, auditing, regulations, and oversight solutions
Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats
商品描述(中文翻譯)
請查看特權、密碼、漏洞和利用如何結合成為攻擊向量,並侵害任何組織。網路攻擊的數量和複雜性持續增加。這不再是「是否」會被攻擊的問題,而是「何時」會被攻擊的問題。攻擊者的目標是邊界網路,但近年來,他們已將重心重新放在最容易入侵的路徑上:用戶及其特權。
在幾十年前,整個企業可能只需透過少數幾個憑證就能夠有效管理。如今環境的複雜性意味著需要特權憑證來管理多種不同的帳戶類型(從域管理員和系統管理員到具有管理權限的工作站)、操作系統(Windows、Unix、Linux等)、目錄服務、數據庫、應用程式、雲端實例、網路硬體、物聯網(IoT)、社交媒體等。當這些特權憑證未被妥善管理時,將對外部駭客和內部威脅構成重大威脅。
沒有一種萬能的解決方案可以提供對所有攻擊向量和階段的保護。雖然一些新穎的解決方案可以幫助防護或檢測初始感染,但並不能保證能夠阻止100%的惡意活動。基於特權的攻擊的數量和頻率持續增加,並測試現有安全控制和解決方案實施的極限。
《特權攻擊向量》詳細說明了與不良特權管理相關的風險、駭客和內部人員所利用的技術,以及組織必須採取的防禦措施,以防止被攻擊、阻止橫向移動,並提高檢測駭客活動或內部威脅的能力,以減輕影響。
您將學到的內容:
- 知道身份、憑證、密碼和利用如何在攻擊中被利用來提升特權
- 實施防禦和審計策略以減輕威脅和風險
- 了解12步驟的特權訪問管理實施計劃
- 考慮部署和範圍,包括風險、審計、法規和監管解決方案
本書適合對象:
安全管理專業人士、新進安全專業人士以及希望了解和解決特權提升威脅的審計人員。