Читать книгу 8 Steps to Better Security - Kim Crawley - Страница 2

Оглавление

Table of Contents

Cover

Title Page

Foreword

Introduction

Chapter 1: Step 1: Foster a Strong Security Culture Kevin Mitnick, Human Hacker Extraordinaire The Importance of a Strong Security Culture Hackers Are the Bad Guys, Right? What Is Security Culture? How to Foster a Strong Security Culture Security Leaders on Security Culture What Makes a Good CISO? The Biggest Mistakes Businesses Make When It Comes to Cybersecurity The Psychological Phases of a Cybersecurity Professional

Chapter 2: Step 2: Build a Security Team Why Step 2 Is Controversial How to Hire the Right Security Team…the Right Way Security Team Tips from Security Leaders The “Culture Fit”—Yuck! Cybersecurity Budgets Design Your Perfect Security Team

Chapter 3: Step 3: Regulatory Compliance What Are Data Breaches, and Why Are They Bad? The Scary Truth Found in Data Breach Research An Introduction to Common Data Privacy Regulations Payment Card Industry Data Security Standard Governance, Risk Management, and Compliance More About Risk Management Threat Modeling

Chapter 4: Step 4: Frequent Security Testing What Is Security Testing? Security Testing Types What's Security Maturity? The Basics of Security Audits and Vulnerability Assessments A Concise Guide to Penetration Testing Security Leaders on Security Maturity Security Testing Is Crucial

Chapter 5: Step 5: Security Framework Application What Is Incident Response? Your Computer Security Incident Response Team Cybersecurity Frameworks

10  Chapter 6: Step 6: Control Your Data Assets The CIA Triad Access Control Patch Management Physical Security and Your Data Malware Cryptography Basics Bring Your Own Device and Working from Home Data Loss Prevention Managed Service Providers The Dark Web and Your Data Security Leaders on Cyber Defense Control Your Data

11  Chapter 7: Step 7: Understand the Human Factor Social Engineering Phishing What Can NFTs and ABA Teach Us About Social Engineering? How to Prevent Social Engineering Attacks on Your Business UI and UX Design Internal Threats Hacktivism Note

12  Chapter 8: Step 8: Build Redundancy and Resilience Understanding Data and Networks Building Capacity and Scalability with the Power of the Cloud Back It Up, Back It Up, Back It Up RAID What Ransomware Taught Business About Backups Business Continuity Disaster Recovery

13  Chapter 9: Afterword Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Keeping Your Business Cyber Secure

14  Index

15  Copyright

16  Dedication

17  About the Author

18  Acknowledgments

19  End User License Agreement

Guide

Cover

Title Page

Copyright

Dedication

About the Author

Acknowledgments

Foreword

Introduction

Table of Contents

10  Begin Reading

11  Index

12  End User License Agreement

Pages

i

xi

xii

xiii

xiv

xv

xvi

8 xvii

9 xviii

10 xix

11 xx

12  1

13  2

14  3

15  4

16  5

17  6

18  7

19  8

20  9

21  10

22  11

23  12

24  13

25  14

26  15

27  16

28  17

29  18

30  19

31  20

32  21

33  22

34  23

35  24

36  25

37 26

38 27

39  28

40  29

41  30

42  31

43  32

44  33

45  34

46  35

47  36

48  37

49  39

50  40

51  41

52  42

53  43

54  44

55  45

56 46

57  47

58  48

59  49

60  50

61  51

62  52

63  53

64  54

65  55

66  56

67  57

68  58

69  59

70  60

71  61

72  62

73  63

74  64

75  65

76  66

77  67

78 68

79 69

80  70

81  71

82  72

83  73

84  74

85  75

86  76

87  77

88  78

89  79

90  80

91  81

92  82

93  83

94  84

95  85

96  86

97  87

98  88

99  89

100  90

101  91

102  92

103  93

104  94

105  95

106  96

107  97

108  98

109  99

110  100

111  101

112 102

113  103

114 104

115 105

116 106

117  107

118  109

119  110

120  111

121  112

122  113

123  114

124  115

125  116

126  117

127  118

128  119

129  120

130  121

131  122

132  123

133  124

134  125

135  126

136  127

137  128

138  129

139  130

140  131

141  132

142  133

143  134

144  135

145  136

146  137

147  138

148  139

149  140

150  141

151  142

152  143

153  144

154  145

155  146

156  147

157  148

158  149

159  150

160  151

161  152

162  153

163  155

164  156

165  157

166  158

167  159

168  160

169  161

170  162

171  163

172  164

173  165

174  166

175  167

176  168

177  169

178  170

179  171

180  172

181  173

182  174

183  175

184  176

185 177

186 178

187  179

188  180

189 181

190  182

191  183

192 184

193  185

194  186

195 187

196  188

197  189

198  190

199  191

200 192

201  193

202  194

203  195

204  196

205 197

206  198

207  199

208 200

209 201

210 202

211 203

212 204

213  ii

214  iii

215  iv

216  v

217  205

8 Steps to Better Security

Подняться наверх