Sarah Armstrong-Smith
Understand the Cyber Attacker Mindset
Build a Strategic Security Programme to Counteract Threats
27,99 €
inkl. MwSt.
Sofort lieferbar
14 °P sammeln
Sarah Armstrong-Smith
Understand the Cyber Attacker Mindset
Build a Strategic Security Programme to Counteract Threats
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Delve into the inner workings of the cyber criminal mind and how to defend against their attacks with this strategic deep dive into the human side of cybersecurity.
Andere Kunden interessierten sich auch für
- Laurent RichardPegasus29,99 €
- Becky HolmesKeanu Reeves is Not in Love With You11,99 €
- Laurent RichardPegasus15,99 €
- Laurent RichardPegasus34,99 €
- Geoff WhiteThe Lazarus Heist11,99 €
- Geoff WhiteRinsed15,99 €
- Barak EngelThe Security Hippie37,99 €
-
-
-
Delve into the inner workings of the cyber criminal mind and how to defend against their attacks with this strategic deep dive into the human side of cybersecurity.
Produktdetails
- Produktdetails
- Verlag: Kogan Page Ltd
- Seitenzahl: 304
- Erscheinungstermin: 3. März 2024
- Englisch
- Abmessung: 234mm x 156mm x 20mm
- Gewicht: 468g
- ISBN-13: 9781398614284
- ISBN-10: 1398614289
- Artikelnr.: 68285915
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Kogan Page Ltd
- Seitenzahl: 304
- Erscheinungstermin: 3. März 2024
- Englisch
- Abmessung: 234mm x 156mm x 20mm
- Gewicht: 468g
- ISBN-13: 9781398614284
- ISBN-10: 1398614289
- Artikelnr.: 68285915
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Sarah Armstrong-Smith is recognized as one of the most influential women in cybersecurity and UK tech, with over 25 years' experience delivering and advising C-suite leaders on large-scale cybersecurity, information protection and resilience programmes. She is Chief Security Advisor at Microsoft and has previously held roles at EY, Fujitsu, AXA, and the London Stock Exchange Group. She is based in Bath, UK.
Section
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;
Section
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;