Defensive Security Handbook: Best Practices for Securing Infrastructure
暫譯: 防禦性安全手冊:基礎設施安全最佳實踐

Lee Brotherston, Amanda Berlin

買這商品的人也買了...

商品描述

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.

  • Learn fundamentals of starting or redesigning an InfoSec program
  • Create a base set of policies, standards, and procedures
  • Plan and design incident response, disaster recovery, compliance, and physical security
  • Bolster Microsoft and Unix systems, network infrastructure, and password management
  • Use segmentation practices and designs to compartmentalize your network
  • Explore automated process and tools for vulnerability management
  • Securely develop code to reduce exploitable errors
  • Understand basic penetration testing concepts through purple teaming
  • Delve into IDS, IPS, SOC, logging, and monitoring

商品描述(中文翻譯)

儘管高調的駭客攻擊、創紀錄的數據洩漏和勒索病毒攻擊不斷增加,許多組織仍然沒有預算來建立或外包資訊安全(InfoSec)計劃,迫使他們在工作中學習。對於那些被迫即興應變的公司,這本務實的指南提供了一本安全入門手冊,包含步驟、工具、流程和想法,幫助您以最低或無成本推動安全改進。

本書的每一章都提供針對特定問題的逐步指導,包括違規和災難、合規性、網路基礎設施和密碼管理、漏洞掃描和滲透測試等。網路工程師、系統管理員和安全專業人員將學習工具和技術,以幫助在可管理的範圍內改善安全性。

- 學習建立或重新設計 InfoSec 計劃的基本原則
- 建立一套基本的政策、標準和程序
- 計劃和設計事件響應、災難恢復、合規性和物理安全
- 加強 Microsoft 和 Unix 系統、網路基礎設施和密碼管理
- 使用分段實踐和設計來劃分您的網路
- 探索自動化流程和漏洞管理工具
- 安全地開發代碼以減少可利用的錯誤
- 通過紫隊(purple teaming)理解基本的滲透測試概念
- 深入了解 IDS、IPS、SOC、日誌記錄和監控