The Complete Guide to Defense in Depth
Packt Publishing Limited (Verlag)
978-1-83546-826-5 (ISBN)
Key Features
Develop a comprehensive understanding of advanced defense strategies to shape robust security programs
Evaluate the effectiveness of a security strategy through the lens of Defense in Depth principles
Understand the attacker mindset to deploy solutions that protect your organization from emerging threats
Purchase of the print or Kindle book includes a free PDF eBook
Book DescriptionIn an era of relentless cyber threats, organizations face daunting challenges in fortifying their defenses against increasingly sophisticated attacks. The Complete Guide to Defense in Depth offers a comprehensive roadmap to navigating the complex landscape, empowering you to master the art of layered security.
This book starts by laying the groundwork, delving into risk navigation, asset classification, and threat identification, helping you establish a robust framework for layered security. It gradually transforms you into an adept strategist, providing insights into the attacker's mindset, revealing vulnerabilities from an adversarial perspective, and guiding the creation of a proactive defense strategy through meticulous mapping of attack vectors. Toward the end, the book addresses the ever-evolving threat landscape, exploring emerging dangers and emphasizing the crucial human factor in security awareness and training. This book also illustrates how Defense in Depth serves as a dynamic, adaptable approach to cybersecurity.
By the end of this book, you’ll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility.What you will learn
Understand the core tenets of Defense in Depth, its principles, and best practices
Gain insights into evolving security threats and adapting defense strategies
Master the art of crafting a layered security strategy
Discover techniques for designing robust and resilient systems
Apply Defense in Depth principles to cloud-based environments
Understand the principles of Zero Trust security architecture
Cultivate a security-conscious culture within organizations
Get up to speed with the intricacies of Defense in Depth for regulatory compliance standards
Who this book is forThis book is for security engineers, security analysts, and security managers who are focused on secure design and Defense in Depth. Business leaders and software developers who want to build a security mindset will also find this book valuable. Additionally, students and aspiring security professionals looking to learn holistic security strategies will benefit from the book. This book doesn’t assume any prior knowledge and explains all the fundamental concepts. However, experience in the security industry and awareness of common terms will be helpful.
Akash Mukherjee is a security enthusiast and a leader with experience setting up and executing security strategies at large tech companies. He is currently a security leader at Apple AIML. He was previously a security lead at Google, leading the insider risk program and supply chain security efforts at Google Chrome. During his time at Google, Akash was also a course lead and subject matter expert for the Google Cybersecurity Certificate course. He has been at the forefront of the emerging threat landscape and has led the development of novel security strategies and frameworks. Akash was one of the co-developers of the open-source Supply-chain Levels for Soft ware Artifacts (SLSA) framework. He is based in the Silicon Valley area in the US, and he holds a bachelor of technology degree from the Indian Institute of Technology, B.H.U., India, and a master's degree in cyber security from the University of Southern California, USA.
Table of Contents
Navigating Risk, Classifying Assets, and Unveiling Threats
Practical Guide to Defense in Depth
Building a Framework for Layered Security
Understanding the Attacker Mindset
Uncovering Weak Points through an Adversarial Lens
Mapping Attack Vectors and Gaining an Edge
Building a Proactive Layered Defense Strategy
Understanding Emerging Threats and Defense in Depth
The Human Factor – Security Awareness and Training
Defense in Depth – A Living, Breathing Approach to Security
Erscheinungsdatum | 22.08.2024 |
---|---|
Vorwort | Jason D. Clinton |
Verlagsort | Birmingham |
Sprache | englisch |
Maße | 191 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-83546-826-8 / 1835468268 |
ISBN-13 | 978-1-83546-826-5 / 9781835468265 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich