Mondadori Store

Trova Mondadori Store

Benvenuto
Accedi o registrati

lista preferiti

Per utilizzare la funzione prodotti desiderati devi accedere o registrarti

Vai al carrello
 prodotti nel carrello

Totale  articoli

0,00 € IVA Inclusa

Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan's most notorious covert agentshistory's first advanced persistent threat (APT)into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more.

Each chapter examines one TTP in detaillike assessing gaps in a target's defense, striking where the enemy is negligent, and mastering the art of invisibilityand explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a "Castle Theory Thought Exercise" that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You'll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the "ninja ladder," to prevent attacks.

Topics also include:
Threat modeling, threat intelligence, and targeted controls
Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols
Profiles of insider threats, and ways to recognize them in employees
Covert communication TTPs and their implications for malware command and control (C2)
Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits

In this book, you'll see the astonishing power of ninja information-gathering processesand how adopting them just might be the key to innovating contemporary cybersecurity models.

Dettagli

Generi Informatica e Web » Sicurezza informatica » Linguaggi e Applicazioni » Comunicazione e reti informatiche

Editore No Starch Press

Formato Ebook con Adobe DRM

Pubblicato 27/04/2021

Lingua Inglese

EAN-13 9781718500556

0 recensioni dei lettori  media voto 0  su  5

Scrivi una recensione per "Cyberjutsu"

Cyberjutsu
 

Accedi o Registrati  per aggiungere una recensione

usa questo box per dare una valutazione all'articolo: leggi le linee guida
torna su Torna in cima