Muutke küpsiste eelistusi

Mitre Att&ck for Dummies, Attackiq Special Edition (Custom) [Pehme köide]

  • Formaat: Paperback / softback, 48 pages, kõrgus x laius x paksus: 208x135x5 mm, kaal: 57 g
  • Ilmumisaeg: 13-Oct-2020
  • Kirjastus: For Dummies
  • ISBN-10: 1119748097
  • ISBN-13: 9781119748090
Teised raamatud teemal:
  • Pehme köide
  • Hind: 26,00 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 48 pages, kõrgus x laius x paksus: 208x135x5 mm, kaal: 57 g
  • Ilmumisaeg: 13-Oct-2020
  • Kirjastus: For Dummies
  • ISBN-10: 1119748097
  • ISBN-13: 9781119748090
Teised raamatud teemal:
  • Implement ATT&CK for effective cybersecurity
  • Execute a threat-informed defense strategy
  • Optimize your cybersecurity program

Optimize your security program

How can you ensure that your cybersecurity capabilities defend your organization effectively? After decades of heavy investment in people, processes, and technology, this question still haunts security leaders. Intruders break through, security falters, and defenses fail against attacks. What should be done? Instead of trying to close every vulnerability, meet every standard, or buy the "best" technology, you can change the game by focusing your defenses on known threats. The way to begin is with MITRE ATT&CK.

Inside...

  • Understand ATT&CK and cybersecurity
  • Use threat intelligence effectively
  • Learn detection and analysis methods
  • Conduct purple team operations
  • Make ATT&CK operational in an enterprise
  • Learn from an ATT&CK case study
  • Discern novel ways to apply ATT&CK

Foreword v

Introduction 1

About This Book 1

Icons Used in This Book 1

Beyond the Book 2

Chapter 1: Understanding MITRE ATT&CK and Cybersecurity 3

Identifying What MITRE ATT&CK Is 4

Using Threat Intelligence and MITRE ATT&CK 6

Deploying a Threat-Informed Defense and ATT&CK 8

Chapter 2: Using Threat Intelligence and Threat-Informed Defense 9

Level 1: Using CTI with Limited Resources 10

Level 2: Working with a More Developed Team 10

Level 3: CTI with an Advanced Team 12

Chapter 3: Building Detection and Analytics 13

Level 1: Limited Resources 13

Understanding analytics 14

Incorporating analytics into your SIEM 14

Level 2: Using Analytics on a More Developed Team 16

Level 3: Using Analytics on an Advanced Team 16

Chapter 4: Conducting Emulations and Purple Teaming 19

Level 1: Adversary Emulation with Limited Resources 19

Level 2: Adversary Emulation with Moderate Resources 21

Level 3: Adversary Emulation on an Advanced Team 22

Chapter 5: Developing Assessments and Engineering 25

Level 1: Conducting Assessments with Limited Resources 26

Level 2: More Advanced Analytics and Engineering 27

Level 3: Advanced Analytics and Engineering 29

Chapter 6: Making MITRE ATT&CK Operational 31

Moving from Threat Intelligence to Threat-Informed Defense 31

Mapping Success across the Organization 32

Chapter 7: Looking at a Use Case: Leveraging MITRE ATT&CK in the Financial Sector 35

Meeting the Firm 35

Defining the Threats 36

Understanding Your Adversaries 36

Making ATT&CK Useful 37

Seeing the End Result 38

Chapter 8: Ten Ways to Apply the MITRE ATT&CK Framework 39

Cyberthreat Intelligence 39

Automated Testing and Auditing 40

Security Risk Management and Strategy 40

Regulatory and Compliance Mapping 40

Security Control Rationalization 41

Analyst Training and Exercises 41

Threat Hunting 41

Commercial Security Solutions Evaluations 41

Security Pipeline Validation 42

Business Enablement 42