Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 9781491960332
Size: 12.48 MB
Format: PDF, Kindle
View: 58

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 9781491960356
Size: 14.86 MB
Format: PDF
View: 96

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

Defensive Security Handbook

Author: Lee Brotherston
Publisher:
ISBN: 1491960388
Size: 17.16 MB
Format: PDF
View: 42

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

Zero Trust Networks

Author: Evan Gilman
Publisher: "O'Reilly Media, Inc."
ISBN: 9781491962169
Size: 12.70 MB
Format: PDF, Docs
View: 32

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it. The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Understand how perimeter-based defenses have evolved to become the broken model we use today Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty) Get example configuration for open source tools that you can use to build a zero trust network Learn how to migrate from a perimeter-based network to a zero trust network in production

Crafting The Infosec Playbook

Author: Jeff Bollinger
Publisher: "O'Reilly Media, Inc."
ISBN: 9781491913604
Size: 14.87 MB
Format: PDF, Kindle
View: 40

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Learn incident response fundamentals—and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase

Ransomware

Author: Allan Liska
Publisher: "O'Reilly Media, Inc."
ISBN: 9781491967836
Size: 15.78 MB
Format: PDF, Kindle
View: 52

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid—and the pros and cons of paying Use methods to protect your organization’s workstations and servers

Microsoft Azure Security Infrastructure

Author: Yuri Diogenes
Publisher: Microsoft Press
ISBN: 150930357X
Size: 14.80 MB
Format: PDF, Docs
View: 20

Implement maximum control, security, and compliance processes in Azure cloud environmentsIn"Microsoft Azure Security Infrastructure," three leading experts show how toplan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You ll learn how to prepare infrastructure withMicrosoft s integrated tools, prebuilt templates, and managed services anduse these to help safely build and manage any enterprise, mobile, web, orInternet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You ll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement so you can help protect all your data, make services resilient to attack, and stayin control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: Understand cloud security boundaries and responsibilities Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection Explore Azure s defense-in-depth security architecture Use Azure network security patterns and best practices Help safeguard data via encryption, storage redundancy, rightsmanagement, database security, and storage security Help protect virtual machines with Microsoft Antimalware forAzure Cloud Services and Virtual Machines Use the Microsoft Azure Key Vault service to help secure cryptographickeys and other confidential information Monitor and help protect Azure and on-premises resources withAzure Security Center and Operations Management Suite Effectively model threats and plan protection for IoT systems Use Azure security tools for operations, incident response, andforensic investigation"