Preface |
|
iii | |
|
|
vii | |
Summary |
|
ix | |
Acknowledgments |
|
xiii | |
Abbreviations |
|
xv | |
|
|
1 | (4) |
|
Chapter Two Core Concepts |
|
|
5 | (8) |
|
Goal: Reduce the Expected Cost of Cyberattacks |
|
|
7 | (3) |
|
Ring 1 Four Basic Strategies |
|
|
9 | (1) |
|
The Basis of Our Approach |
|
|
10 | (1) |
|
The Benefits of Our Approach |
|
|
10 | (3) |
|
|
13 | (8) |
|
|
13 | (2) |
|
Ring 2 Neutralize Attacks |
|
|
15 | (2) |
|
Ring 2 Increase Resilience |
|
|
17 | (1) |
|
Ring 2 Accelerate Recovery |
|
|
18 | (3) |
|
|
21 | (28) |
|
Ring 3 Resilience → Take Resilience Steps |
|
|
21 | (1) |
|
Ring 3 Resilience → Conform to Resilience Guidelines |
|
|
22 | (1) |
|
Ring 3 Resilience → Improve Cross-System Engineering |
|
|
23 | (1) |
|
Ring 3 Recovery → Generate Rapid Response Plans |
|
|
24 | (1) |
|
Ring 3 Recovery → Increase Response Competence |
|
|
25 | (1) |
|
Ring 3 Recovery → Build the Ability to Restore Systems |
|
|
25 | (1) |
|
Ring 3 Exposure → Reduce the Number of Networked Machines |
|
|
26 | (1) |
|
Ring 3 Neutralize Attack → Reduce the Number of Cyberattack Attempts |
|
|
27 | (2) |
|
Ring 3 Neutralize Attack → Counter the Insider Threat |
|
|
29 | (1) |
|
Ring 3 Neutralize Attack → Develop Mitigations for Specific Known Threats |
|
|
30 | (1) |
|
Ring 3 Neutralize Attack → Block Cyberattacks |
|
|
30 | (4) |
|
Ring 3 Neutralize Attack → Ensure the Quality of a System's Hardware and Software |
|
|
34 | (4) |
|
Ring 3 Neutralize Attack → Systematically Reduce Risks Inherent in the Network |
|
|
38 | (2) |
|
Ring 3 Neutralize Attack → Improve the Security-Related Competence of System Administrators |
|
|
40 | (4) |
|
Ring 3 Neutralize Attack → Test Systems Against Simulated Attacks |
|
|
44 | (1) |
|
Ring 3 Neutralize Attack → Defend Against DDOS Attacks |
|
|
45 | (1) |
|
Ring 3 Neutralize Attack → Reduce the Amount of Material Exfiltrated by Attacks |
|
|
46 | (3) |
|
Chapter Five Using This Work |
|
|
49 | (4) |
|
|
49 | (1) |
|
|
49 | (1) |
|
Improving the Cyberdefensive Actions |
|
|
50 | (1) |
|
Applying the Model to Broader IT Compliance Efforts |
|
|
51 | (2) |
|
|
53 | (2) |
References |
|
55 | |