Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Advanced Persistent Threat Understanding the Danger and How to Protect Your Organization Table of Contents Copyright Dedication Author Biography Preface
Introduction The Current Landscape Organizations View on Security You will be Compromised The Cyber ShopLifter The New Defense in Depth Proactive vs Reactive Loss of Common Sense It is All About Risk What Was In Place? Pain Killer Security Reducing the Surface Space HTML Embedded Email Buffer Overflows Macros in Office Documents The Traditional Threat Common Cold Reactive Security Automation The Emerging Threat APT—Cyber Cancer Advanced Persistent Threat (APT) APT—Stealthy, Targeted, and Data Focused Characteristics of the APT Defending Against the APT APT vs Traditional Threat Sample APT Attacks APT Multi-Phased Approach Summary Introduction Doing Good Things and Doing the Right Things Security is Not Helpless Beyond Good or Bad Attackers are in Your Network Proactive, Predictive, and Adaptive Example of How to Win Data Centric Security Money Does Not Equal Security The New Approach to APT Selling Security to Your Executives Top Security Trends Summary Introduction What are Attackers After? Attacker Process Reconnaissance Scanning Exploitation Create Backdoors Cover Their Tracks Compromising a Server Compromising a Client Insider Threat Traditional Security Firewalls Dropped Packets InBound Prevention and OutBound Detection Intrusion Detection Summary Introduction Products vs. Solutions Learning from the Past What is Risk? Focused Security Formal Risk Model
Threat
External vs. Internal Threat
Vulnerability Known and Unknown Vulnerabilities Putting the Pieces Back Together
Insurance Model Calculating Risk Summary Introduction Data Discovery Protected Enclaves Everything Starts with Your Data CIA Data Classification
Data Classification Mistake 1 Data Classification Rule 1 Data Classification Mistake 2 Data Classification Rule 2 Data Classification Mistake 3 Data Classification Rule 3
Encryption Types of Encryption Goals of Encryption Data at Rest Data at Motion Encryption—More Than You Bargained For Network Segmentation and De-Scoping Encryption Free Zone Summary Introduction Inbound Prevention Outbound Detection Network vs. Host Making Hard Decisions Is AV/Host Protection Dead? Summary Introduction The New Rule Suicidal Mindset Incident Response Events/Audit Trails Sample Incidents 6-Step Process
Preparation Identification Containment Eradication Recovery Lesson Learned
Forensic Overview Summary Introduction Integrated Approach to APT How Bad is the Problem? Trying to Hit a Moving Target Finding the Needle in the Haystack Understand What You Have Identifying APT
Assessment and Discovery Analysis and Remediation Program Review
Minimizing the Problem End to End Solution for the APT Summary Introduction You Cannot Fight the Cloud Is the Cloud Really New? What is the Cloud? Securing the Cloud Reducing Cloud Computing Risks Mobilization—BYOD (Bring Your Own Device) Dealing with Future Technologies Summary Introduction Facing Reality Predicting Attacks to Become Proactive
Advanced Persistent Threat
Changing How You Think About Security The Problem has Changed The APT Defendable Network Summary Introduction What is the Problem That is Being Solved? If the Offense Knows More Than the Defense You Will Loose Enhancing User Awareness Virtualized Sandboxing Patching White Listing Summary Introduction Focusing on the Human Focusing on the Data Game Plan Prioritizing Risks Key Emerging Technologies The Critical Controls Summary
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion