The Art of Cyber Security - A practical guide to winning the war on cyber crime

The Art of Cyber Security - A practical guide to winning the war on cyber crime
Author: Gary Hibberd
Publisher: IT Governance Ltd
Total Pages: 184
Release: 2022-05-31
Genre: Law
ISBN: 1787783669

This book is about cyber security, but it’s also about so much more; it’s about giving you the skills to think creatively about your role in the cyber security industry. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu’s The Art of War. The author analyses key sections and reviews them through the lens of cyber security and data protection to derive how his teachings can be used within the cyber security industry. Although Tzu’s book on military strategy, tactics and operations was written more than 2,000 years ago, The Art of Cyber Security – A practical guide to winning the war on cyber crime reflects on how relevant Tzu’s words are for today’s technological era. This book celebrates the individuals who are striving to protect us in an ever-expanding technological era. Data and technology are so important to our lives, that protecting people who use technology is incredibly important. The professionals working to protect children, adults and corporations have a tough job, and this book celebrates their work while advocating ways for improving cyber security services and fighting cyber crime. This book will challenge your thinking and force you to approach cyber security and data protection from theoretical, philosophical, strategic, tactical and operational perspectives.

The Art of Cyber Security

The Art of Cyber Security
Author: Gary Hibberd
Publisher:
Total Pages: 0
Release: 2022
Genre: Computer networks
ISBN: 9781787783683

This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.

The Art of Cyberwarfare

The Art of Cyberwarfare
Author: Jon DiMaggio
Publisher: No Starch Press
Total Pages: 274
Release: 2022-04-26
Genre: Computers
ISBN: 171850215X

A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors. The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers’ techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of: North Korea’s series of cyber attacks against financial institutions, which resulted in billions of dollars stolen The world of targeted ransomware attacks, which have leveraged nation state tactics to cripple entire corporate enterprises with ransomware Recent cyber attacks aimed at disrupting or influencing national elections globally The book’s second part walks through how defenders can track and attribute future attacks. You’ll be provided with the tools, methods, and analytical guidance required to dissect and research each stage of an attack campaign. Here, Jon DiMaggio demonstrates some of the real techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among many other advanced threats. He now offers his experience to train the next generation of expert analysts.

The Art of Cyber Conflict

The Art of Cyber Conflict
Author: Henry J Sienkiewicz
Publisher: Dog Ear Publishing
Total Pages: 188
Release: 2017-06-07
Genre: Technology & Engineering
ISBN: 1457555166

If Sun Tzu were alive today, rather than in the fifth century BC, he would be on various stages and his strategies would be all the rage for individuals and organizations alike. In The Art of Cyber Conflict, Henry J. Sienkiewicz brings his strategic and practical experience to bear as he uses the timeless strategies from Sun Tzu’s The Art of War in this highly relevant and exceptionally approachable guidebook. From a technology-independent perspective, Henry focuses on knowing and understanding cyber, the cyber environment, the cyber actors, and this constantly evolving form of modern conflict, while concurrently providing direct approaches to recognize, remediate, and resolve the underlying threats. “A thought-provoking and earnest view of the current cyber landscape from the classic construct of Sun Tzu. I anticipate it soon will be a key text for War College students as they explore cyber risk management strategies.”

Cybersecurity for Executives

Cybersecurity for Executives
Author: Gregory J. Touhill
Publisher: John Wiley & Sons
Total Pages: 412
Release: 2014-07-08
Genre: Technology & Engineering
ISBN: 1118888146

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard
Author: Steve Watkins
Publisher: IT Governance Ltd
Total Pages: 48
Release: 2022-11-15
Genre: Computers
ISBN: 1787784045

Written by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 – An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. The guide is a must-have resource giving a clear, concise and easy-to-read introduction to information security.

The Art of War for Computer Security

The Art of War for Computer Security
Author: Tom Madsen
Publisher: Springer Nature
Total Pages: 62
Release: 2019-09-03
Genre: Computers
ISBN: 3030285693

In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.

Cybersecurity

Cybersecurity
Author: Thomas J. Mowbray
Publisher: John Wiley & Sons
Total Pages: 373
Release: 2013-10-18
Genre: Computers
ISBN: 1118849655

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations Delves into network administration for Windows, Linux, and VMware Examines penetration testing, cyber investigations, firewall configuration, and security tool customization Shares techniques for cybersecurity testing, planning, and reporting Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.

Cyberjutsu

Cyberjutsu
Author: Ben McCarty
Publisher: No Starch Press
Total Pages: 266
Release: 2021-04-26
Genre: Computers
ISBN: 1718500548

Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty’s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today’s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks. Learn how to use key ninja techniques to find gaps in a target’s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with “the correct mind,” mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems. You’ll also learn how to: Use threat modeling to reveal network vulnerabilities Identify insider threats in your organization Deploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols Guard against malware command and-control servers Detect attackers, prevent supply-chain attacks, and counter zero-day exploits Cyberjutsu is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.

Cybersecurity: The Beginner's Guide

Cybersecurity: The Beginner's Guide
Author: Dr. Erdal Ozkaya
Publisher: Packt Publishing Ltd
Total Pages: 391
Release: 2019-05-27
Genre: Computers
ISBN: 1789806933

Understand the nitty-gritty of Cybersecurity with ease Key FeaturesAlign your security knowledge with industry leading concepts and toolsAcquire required skills and certifications to survive the ever changing market needsLearn from industry experts to analyse, implement, and maintain a robust environmentBook Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learnGet an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you bestPlan your transition into cybersecurity in an efficient and effective wayLearn how to build upon your existing skills and experience in order to prepare for your career in cybersecurityWho this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.