The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
暫譯: 威脅狩獵的基礎:組織與設計有效的網路威脅狩獵以滿足商業需求

Maurice, Chad, Thompson, Jeremy, Copeland, William

  • 出版商: Packt Publishing
  • 出版日期: 2022-06-17
  • 售價: $1,770
  • 貴賓價: 9.5$1,682
  • 語言: 英文
  • 頁數: 246
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 180324299X
  • ISBN-13: 9781803242996
  • 相關分類: GAN 生成對抗網絡
  • 海外代購書籍(需單獨結帳)

商品描述

Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise

Key Features

- Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries
- Recognize processes and requirements for executing and conducting a hunt
- Customize a defensive cyber framework needed to grow and mature a hunt team

Book Description

Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case.

This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt.

By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity.

What you will learn

- Understand what is required to conduct a threat hunt
- Know everything your team needs to concentrate on for a successful hunt
- Discover why intelligence must be included in a threat hunt
- Recognize the phases of planning in order to prioritize efforts
- Balance the considerations concerning toolset selection and employment
- Achieve a mature team without wasting your resources

Who this book is for

This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.

商品描述(中文翻譯)

建立並成熟一支能夠重複追蹤和捕捉企業中最隱秘部分的高級對手的威脅獵捕團隊

主要特點

- 學習有效威脅獵捕團隊追求網路對手的基礎概念
- 認識執行和進行獵捕的流程和要求
- 自訂防禦性網路框架,以促進獵捕團隊的成長和成熟

書籍描述

威脅獵捕是一個將傳統網路防禦顛覆的概念。它將網路防禦的標準提升到不僅僅是關注已知威脅,還允許團隊追蹤以新穎方式進行攻擊的對手,這些方式在之前並未出現。要成功追蹤並消除這些高級攻擊者,需要對威脅獵捕框架的基礎概念和要求有扎實的理解。此外,為了在商業環境中自信地運用威脅獵捕,該團隊還需要能夠自訂該框架,以適應客戶的特定使用案例。

本書分解了威脅獵捕團隊的基本組成部分、獵捕的階段以及需要遵循的規劃、執行和恢復過程。它將引導您了解威脅獵捕的過程,從理解網路安全的基本知識開始,到建立成熟獵捕能力的深入要求。這些內容通過書面指導以及多個故事驅動的情境展示了有效進行威脅獵捕的正確(和不正確)方式。

在這本網路威脅獵捕書籍結束時,您將能夠識別出使不成熟的網路威脅獵捕團隊受限的過程,並系統性地推進獵捕能力到成熟階段。

您將學到的內容

- 了解進行威脅獵捕所需的條件
- 知道您的團隊需要專注於成功獵捕的所有事項
- 發現為何情報必須納入威脅獵捕
- 認識規劃階段以優先考量努力
- 平衡工具選擇和使用的考量
- 在不浪費資源的情況下實現成熟團隊

本書適合對象

本書適合任何有興趣學習如何組織和執行有效網路威脅獵捕的人,建立公司內部的額外防禦能力,並希望提升組織的網路安全姿態。對於任何尋求幫助獵捕團隊成長和演變的框架的人來說,本書也將非常有用。

目錄大綱

1. An Introduction to Threat Hunting
2. Requirements and Motivations
3. Team Construct
4. Communication Breakdown
5. Methodologies
6. Threat Intelligence
7. Planning
8. Defending the Defenders
9. Hardware and Toolsets
10. Data Analysis
11. Documentation
12. Deliverables
13. Post-Hunt Activity and Maturing A Team
14. Appendix

目錄大綱(中文翻譯)

1. An Introduction to Threat Hunting

2. Requirements and Motivations

3. Team Construct

4. Communication Breakdown

5. Methodologies

6. Threat Intelligence

7. Planning

8. Defending the Defenders

9. Hardware and Toolsets

10. Data Analysis

11. Documentation

12. Deliverables

13. Post-Hunt Activity and Maturing A Team

14. Appendix