logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cyber Threat Intelligence

Cyber Threat Intelligence (Hardcover)

Lee (지은이)
  |  
John Wiley and Sons Ltd
2023-04-25
  |  
189,380원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 142,030원 -25% 0원 2,850원 139,180원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Cyber Threat Intelligence

책 정보

· 제목 : Cyber Threat Intelligence (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 사이버네틱스
· ISBN : 9781119861744
· 쪽수 : 304쪽

목차

Preface

About the Author

Abbreviations

1. Introduction

Definitions

History of Threat Intelligence

Utility of Threat Intelligence

Summary

2. Threat Environment

Threat

Risk and Vulnerability

Threat Actors

TTPs - Tactics, Techniques and Procedures

Victimology

Threat Landscape

Attack Vectors, Vulnerabilities and Exploits

Untargeted vs Targeted Attacks

Persistence

Thinking Like a Threat Actor

Summary

3. Applying Intelligence

Planning Intelligence Gathering

The Intelligence Cycle

Situational Awarenesss

Goal Oriented Security and Threat Modelling

Strategic, Operational and Tactical Intelligence

Incident Preparedness and Response

Summary

4. Collecting Intelligence

Hierarchy of Evidence

Understanding Intelligence

Third Party Intelligence Reports

Internal Incident Reports

Active Intelligence Gathering

Summary

5. Generating Intelligence

The Intelligence Cycle in Practice

Applying the Intelligence Cycle

Sources of Data

Searching Data

Threat Hunting

Transforming Data into Intelligence

Sharing Intelligence

Measuring the Effectiveness of Generated Intelligence

Summary

6. Attribution

Holding Perpetrators to Account

Standards of Proof

Mechanisms of Attribution

Anti-Attribution Techniques

Third Party Attribution

Using Attribution

Summary

7. Professionalism

Notions of Professionalism

Developing a New Profession

Behaving Ethically

Legal and Ethical Environment

Managing the Unexpected

Continuous Improvement

Summary

8. Future Threats and Conclusions

Emerging Technologies

Emerging Attacks

Emerging Workforce

Conclusion 

9. Case Studies

Target Compromise 2013

WannaCry 2017

NotPetya 2017

VPNFilter 2018

SUNBURST and SUNSPOT 2020

Macron Leaks 2017

Index

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책