Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations, 2/e (Paperback)
暫譯: 特權攻擊向量:建立有效的網路防禦策略以保護組織,第二版(平裝本)
Haber, Morey J.
- 出版商: Apress
- 出版日期: 2020-06-14
- 售價: $2,840
- 貴賓價: 9.5 折 $2,698
- 語言: 英文
- 頁數: 362
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1484259130
- ISBN-13: 9781484259139
-
相關分類:
Wireless-networks、物聯網 IoT、資訊安全
-
相關翻譯:
特權攻擊向量, 2/e (Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations, 2/e) (簡中版)
買這商品的人也買了...
-
$1,368Murach's SQL Server 2019 for Developers
-
$1,380$1,311 -
$1,900$1,805
商品描述
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges.
In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today's environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere.
There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations.
Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials.
This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access.
What You Will Learn
- Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack
- Implement defensive and monitoring strategies to mitigate privilege threats and risk
- Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journey
- Develop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity
Who This Book Is For
Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems
商品描述(中文翻譯)
了解如何將特權、弱密碼、管理權限和遠端存取結合起來,作為攻擊向量來突破任何組織。網路攻擊的數量和複雜性持續增加。這不是一個是否的問題,而是何時,您的組織將會被攻破。威脅行為者針對的是最小阻力的路徑:用戶及其特權。
在幾十年前,整個企業可能只需通過少數幾個憑證就能夠有效管理。如今環境的複雜性導致許多不同帳戶類型的特權憑證激增,例如域和本地管理員、操作系統(Windows、Unix、Linux、macOS等)、目錄服務、數據庫、應用程序、雲實例、網絡硬體、物聯網(IoT)、社交媒體等等。當這些特權憑證未被管理時,將對外部黑客和內部威脅構成重大威脅。我們幾乎在每個地方都經歷著特權帳戶的擴展宇宙。
沒有一種解決方案或策略可以提供您所需的保護,以防範所有攻擊向量和階段。雖然一些新穎的產品將有助於防範或檢測特權攻擊,但它們並不能保證能夠阻止100%的惡意活動。基於特權的攻擊的數量和頻率持續增加,並測試現有安全控制和解決方案實施的極限。
特權攻擊向量詳細說明了與不良特權管理相關的風險、威脅行為者利用的技術,以及組織應採取的防禦措施,以防範事件、保護側向移動,並提高檢測因不當使用特權憑證而產生的惡意活動的能力。
這一修訂和擴展的第二版涵蓋了新的攻擊向量,更新了特權存取管理(PAM)的定義,提出了新的防禦策略,測試了成功實施的經驗步驟,並包括了最小特權端點管理和特權遠端存取的新學科。
您將學到什麼
- 了解身份、帳戶、憑證、密碼和漏洞如何在攻擊中被利用來提升特權
- 實施防禦和監控策略以減輕特權威脅和風險
- 理解一個10步驟的通用特權管理實施計劃,以指導您成功進行特權存取管理之旅
- 開發一個全面的模型,用於根據特權會話活動記錄風險、合規性和報告
本書適合誰閱讀
安全管理專業人士、新的安全專業人士以及希望理解和解決特權存取管理問題的審計員
作者簡介
Morey J. Haber is Chief Technology Officer at BeyondTrust. He has more than 20 years of IT industry experience, and has authored three Apress books: Asset Attack Vectors and Identity Attack Vectors, as well as the first edition of Privileged Attack Vectors. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology management solutions for vulnerability, and privileged and remote access. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
作者簡介(中文翻譯)
Morey J. Haber 是 BeyondTrust 的首席技術官。他在 IT 行業擁有超過 20 年的經驗,並且是三本 Apress 書籍的作者:Asset Attack Vectors 和 Identity Attack Vectors,以及 Privileged Attack Vectors 的第一版。他於 2012 年加入 BeyondTrust,成為 eEye Digital Security 收購的一部分。目前,他負責 BeyondTrust 的技術管理解決方案,涵蓋漏洞管理、特權訪問和遠端訪問。2004 年,他以安全工程總監的身份加入 eEye,負責與《財富》500 強客戶的戰略業務討論和漏洞管理架構。在加入 eEye 之前,他是 Computer Associates, Inc. (CA) 的開發經理,負責新產品的測試周期和指定客戶帳戶。他的職業生涯始於政府承包商,擔任可靠性和可維護性工程師,負責建造飛行和訓練模擬器。他在紐約州立大學石溪分校獲得電機工程學士學位。