With the sudden, pervasive rise of the Internet, widespread random attacks from viruses, worms, and bots were used to engage in cyber crime and disruptive behavior. As these threats mature, they turn into targeted attacks against banks, large data processors, and governments. Today, such targeted attacks have become the greatest threat facing every organization, including both small and large companies, and governments of all sizes. In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital assets from targeted attacks. It is an in-depth manual on the tools, techniques, technology, and policies needed to defend organizations from cyber espionage, Denial-of-Service attacks, and stealthy infiltration. Stiennon addresses security practitioners, IT managers of corporate and government sites, and government agency officials determining cyber policies. He explains why countering targeted attacks requires new investment in technology, as well as changes to security operations and organizations.
He addresses new services and products that have arisen to assist in the task of discovering and blocking targeted attacks, and how deploying these technologies properly is a critical defense against targeted attacks. Each chapter introduces a technology, the types of attacks it defends against, and the products and services available which are suited to the task. This book is a must read for anyone who wants to understand the evolution of the security industry, the threats that drive it, the incidents that highlight the rapid changes in cyber crime, and how to defend against them.
- ISBN10 1605907170
- ISBN13 9781605907178
- Publish Date 16 June 2012 (first published 1 January 2000)
- Publish Status Cancelled
- Publish Country US
- Imprint Government Institutes Inc.,U.S.
- Format Hardcover
- Pages 240
- Language English