• Complain

Cole - Advanced persistent threat : understanding the danger and how to protect your organization

Here you can read online Cole - Advanced persistent threat : understanding the danger and how to protect your organization full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Waltham, MA, year: 2012, publisher: Syngress, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Advanced persistent threat : understanding the danger and how to protect your organization
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2012
  • City:
    Waltham, MA
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Advanced persistent threat : understanding the danger and how to protect your organization: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Advanced persistent threat : understanding the danger and how to protect your organization" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organizations current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.

Advanced Persistent Threat covers what you need to know including:

How and why organizations are being attacked

How to develop a Risk based Approach to Security

Tools for protecting data and preventing attacks

Critical information on how to respond and recover from an intrusion

The emerging threat to Cloud based networks

Cole: author's other books


Who wrote Advanced persistent threat : understanding the danger and how to protect your organization? Find out the surname, the name of the author of the book and a list of all author's works by series.

Advanced persistent threat : understanding the danger and how to protect your organization — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Advanced persistent threat : understanding the danger and how to protect your organization" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Author Biography

Dr. Eric Cole is an industry-recognized security expert with over 20 years of hands-on experience. Dr. Cole has experience in information technology with a focus on helping customers identify the right areas of security by building out dynamic defense solutions that protect organizations from advanced threats. Dr. Cole has a masters degree in computer science from NYIT and a doctorate from Pace University, with a concentration in information security. Dr. Cole is the author of several books, including Hackers Beware, Hiding in Plain Site, Network Security Bible, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is founder of Secure Anchor Consulting, in which he provides state of the art security services and expert witness work. He also served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is actively involved with the SANS Technology Institute (STI) and SANS working with students, teaching, and maintaining and developing courseware. He is a SANS faculty Fellow and course author. Dr. Cole is an executive leader in the industry, where he provides cutting-edge cyber security consulting services and leads research and development initiatives to advance the state of the art in information systems security.

Section I

Understanding the Problem

Organizations recognize that cyber security is a concern and resources need to be allocated to protect an organization. However, there are many different types of threats from worms/viruses, hacktivists to the APT. Many organizations understand how to defend against many of the traditional threats and treat the current advanced threats in the same manner they have always dealt with security. The problem is this approach does not work. The APT is a completely different problem and until an organization understands the problem, they will not be able to fix it.

The first section of this book will lay out the problem and show how an organization needs to take an integrated, adaptive approach to dealing with the APT. The following are the chapters that will be covered:

Chapter 1: The Changing Threat

Chapter 2: Why Are Organizations Being Compromised?

Chapter 3: How Are Organizations Being Compromised?

Chapter 4: Risk Based Approach to Security

In the first chapter, The Changing Threat, organizations will understand that dealing with the APT is a completely different problem in which most organizations are not properly prepared to handle. In order to be able to deal with a threat, organizations have to understand what they are up against. The initial response from many executives is that they have already invested significant money into cyber security and this should be sufficient for dealing with the APT. Chapter 2, Why Organizations are Compromised, will explain why this is not the case. The APT is able to bypass much of the security that organizations use today. In order to be able to fix the problem, an organization needs to understand why it is happening. After understanding why it is happening, Chapter 3 cover How Organizations are Compromised? Knowing how an organization is being broken into will allow an organization to understand what needs to be done to fix the problem. Chapter 4, covers the Risk Based Approach to Security that organizations need to follow in order to be successful.

The traditional method that most organizations deploy today is to ignore the threat, get compromised, after notification by law enforcement, perform hunting and forensics to find and clean up the compromise after the fact. Based on the stealthy nature of the APT hunting and forensics will always play a key role, but this book is about creating an integrated solution that will prevent, detect and minimize the exposure of an organization. The book is about deploying an effective defensive stance to protect organization from todays advanced persistent threat and tomorrows next generation of threats. The APT is a cyber-adversary displaying advanced logistical and operational capability for long-term intrusion campaigns. Its current goal is to maintain access to victim networks and exfiltrate intellectual property data as well as information that is economically and politically advantageous. The APT is not a botnet. It is not malware. It is the DNA of an adversarial group. This book will help an organization protect against the APT.

Chapter 1

The Changing Threat

Introduction

Organizations continue to spend significant amount of money on security but today an interesting trend is happening. In the past spending money on security led to less compromises and increased protection. Today, organizations are increasing their security budgets but still getting compromised. What is being done today no longer seems to work.

The problem is that the threat has changed but organizations approach to security has not changed. While traditional threats are still a concern and cannot be ignored, organizations now have a new challenge dealing with the Advanced Persistent Threat known as the APT. The APT is well funded, organized groups that are systematically compromising government and commercial entities. The term originally was developed as a code name for Chinese-related intrusions against US military organizations. The term has evolved to refer to advanced adversaries that are focused on critical data with the goal of exploiting information in a covert manner. APTs are highly sophisticated and bypass virtually all best practice cyber security programs to try and establish a long-term network presence. The APT is attacks that are stealthy, targeted, and data focused which is quite different than traditional worms or viruses. The APT are very well-organized entities (typically foreign adversaries) that are targeting an organization to gather a specific piece of information today and ultimately maintain long-term access so information can be extracted at will in the future. APT breaks all of the rules of attackers by typically adapting their techniques on the file, targeting users as the entry point, and hiding their tracks very carefully; therefore many traditional security measures are not effective at dealing with this threat.

Today, the term APT has evolved and different people refer to it as different things. Some people only refer to attacks from China, while others include all attacks as being part of the APT. The goal of this book is not to debate a definition but to provide a guide of how to implement effective security that actually works against the advanced threats that are bypassing and rendering traditional security measures to be less effectively than they previously were against traditional viruses and worms. While the focus of this book is on APT, the real focus is implemented effective security that secures an organization from all threats up to and including the APT. The ultimate goal is raising awareness so organizations can have effective security against the APTv2 and the next generation of threats. A mistake that we have seen organizations make is they focus all their effort on the APT, forgetting about traditional threats and still get compromised.

The Current Landscape

Today, one cannot open up a newspaper, read a magazine, or turn on the news without hearing about another organization being compromised. It seems that organizations of all shapes and sizes have been compromised and there is no end in sight. Government, commercial, non-profit, universities, national, and international organizations have all had data breaches that have caused significant impact to the organization.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Advanced persistent threat : understanding the danger and how to protect your organization»

Look at similar books to Advanced persistent threat : understanding the danger and how to protect your organization. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Advanced persistent threat : understanding the danger and how to protect your organization»

Discussion, reviews of the book Advanced persistent threat : understanding the danger and how to protect your organization and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.