Atjaunināt sīkdatņu piekrišanu

E-grāmata: Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats

3.83/5 (11 ratings by Goodreads)
(Valerie Thomas C|EH, Security+, Senior Security Consultant, Securicon LLC), (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall University)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 12-Aug-2014
  • Izdevniecība: Syngress Media,U.S.
  • Valoda: eng
  • ISBN-13: 9780124199811
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 48,64 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 12-Aug-2014
  • Izdevniecība: Syngress Media,U.S.
  • Valoda: eng
  • ISBN-13: 9780124199811
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up.

Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data.

Forewords written by Dave Kennedy and Kevin Mitnick!

  • The most practical guide to setting up a Security Awareness training program in your organization
  • Real world examples show you how cyber criminals commit their crimes, and what you can do to keep you and your data safe
  • Learn how to propose a new program to management, and what the benefits are to staff and your company
  • Find out about various types of training, the best training cycle to use, metrics for success, and methods for building an engaging and successful program

Recenzijas

"...a blueprint for creating a highly practical and effectiveness awareness programme that could do so much more to protect your organisation than tens of thousand of dollars spent on shiny new security hardware." --Network Security

"...a comprehensive introduction to the human factors that have an impact on the delivery of effective security, as well as practical proposals for the defense against social engineering and technical threats." --Computing Reviews

"I have been reading about this subject for a while now and, in my modest opinion, this is one of the best books out there covering it... every chapter holds some additional, practical information about each topic." --Help Net Security

Papildus informācija

A practical guide to implementing Information Security Awareness Training in your organization
Forewords xi
Preface xv
About The Authors xvii
Acknowledgments xix
Chapter 1 What Is a Security Awareness Program? 1(8)
Introduction
1(3)
Policy Development
4(1)
Policy Enforcement
4(1)
Cost Savings
5(1)
Production Increases
5(1)
Management Buy-In
6(1)
Notes
7(2)
Chapter 2 Threat 9(6)
The Motivations of Online Attackers
9(1)
Money
9(1)
Industrial Espionage/Trade Secrets
10(1)
Hacktivism
10(1)
Cyber War
11(1)
Bragging Rights
12(1)
Notes
12(3)
Chapter 3 Cost of a Data Breach 15(10)
Ponemon Institute
15(1)
HIPAA
15(4)
The Payment Card Industry Data Security Standard (PCI DSS)
19(1)
State Breach Notification Laws
20(3)
Notes
23(2)
Chapter 4 Most Attacks Are Targeted 25(8)
Targeted Attacks
25(1)
Recent Targeted Attacks
26(1)
Targeted Attacks Against Law Firms
26(2)
Operation Shady RAT
28(1)
Operation Aurora
29(1)
Night Dragon
30(1)
Watering Hole Attacks
30(1)
Common Attack Vectors: Common Results
31(1)
Notes
32(1)
Chapter 5 Who Is Responsible for Security? 33(6)
Information Technology (IT) Staff
33(1)
The Security Team
34(1)
The Receptionist
34(1)
The CEO
34(1)
Accounting
35(1)
The Mailroom/Copy Center
35(1)
The Runner/Courier
35(1)
Everyone Is Responsible For Security
35(2)
Notes
37(2)
Chapter 6 Why Current Programs Don't Work 39(6)
The Lecture Is Dead as a Teaching Tool
39(4)
Notes
43(2)
Chapter 7 Social Engineering 45(20)
What is Social Engineering?
45(1)
Who are Social Engineers?
46(1)
Why Does It Work?
46(1)
How Does It Work?
46(1)
Information Gathering
47(2)
Attack Planning and Execution
49(3)
The Social Engineering Defensive Framework (SEDF)
52(11)
Where Can I Learn More About Social Engineering?
63(1)
Notes
63(2)
Chapter 8 Physical Security 65(16)
What is Physical Security?
65(1)
Physical Security Layers
66(1)
Threats to Physical Security
67(1)
Why Physical Security is Important to an Awareness Program
67(1)
How Physical Attacks Work
68(11)
Minimizing the Risk of Physical Attacks
79(1)
Notes
80(1)
Chapter 9 Types of Training 81(8)
Training Types
81(1)
Formal Training
81(4)
Informal Training
85(2)
Notes
87(2)
Chapter 10 The Training Cycle 89(6)
The Training Cycle
89(1)
New Hire
89(1)
Quarterly
90(1)
Biannual
90(1)
Continual
90(1)
Point of Failure
91(1)
Targeted Training
91(1)
Sample Training Cycles
92(1)
Adjusting Your Training Cycle
93(1)
Notes
93(2)
Chapter 11 Creating Simulated Phishing Attacks 95(14)
Simulated Phishing Attacks
95(1)
Understanding the Human Element
95(1)
Methodology
95(1)
Open-Source Tool, Commercial Tool, or Vendor Performed?
96(4)
Before You Begin
100(1)
Determine Attack Objective
101(1)
Select Recipients
102(1)
Select a Type of Phishing Attack
102(1)
Composing the E-mail
103(1)
Creating the Landing Page
104(1)
Sending the E-mail
105(1)
Tracking Results
106(1)
Post Assessment Follow-up
107(1)
Notes
107(2)
Chapter 12 Bringing It All Together 109(10)
Create a Security Awareness Website
109(1)
Sample Plans
110(6)
Promoting Your Awareness Program
116(1)
Notes
117(2)
Chapter 13 Measuring Effectiveness 119(6)
Measuring Effectiveness
119(1)
Measurements vs. Metrics
119(1)
Creating Metrics
119(2)
Additional Measurements
121(1)
Reporting Metrics
122(2)
Notes
124(1)
Chapter 14 Stories from the Front Lines 125(34)
Phil Grimes
125(3)
Amanda Berlin
128(5)
Jimmy Vo
133(2)
Security Research at Large Information Security Company
135(2)
Harry Regan
137(3)
Tess Schrodinger
140(11)
Security Analyst at a Network Security Company
151(3)
Ernie Hayden
154(5)
Appendices 159(32)
Index 191
Bill Gardner is an Assistant Professor at Marshall University, where he teaches information security and foundational technology courses in the Department of Integrated Science and Technology. He is also President and Principal Security Consultant at BlackRock Consulting. In addition, Bill is Vice President and Information Security Chair at the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement officers and information security practitioners in the private sector. Prior to joining the faculty at Marshall, Bill co-founded the Hack3rCon convention, and co-founded 304blogs, and he continues to serve as Vice President of 304Geeks. In addition, Bill is a founding member of the Security Awareness Training Framework, which will be a prime target audience for this book. Valerie Thomas is a Senior Information Security Consultant for Securicon LLC that specializes in social engineering and physical penetration testing. After obtaining her bachelor's degree in Electronic Engineering, Valerie led information security assessments for the Defense Information Systems Agency (DISA) before joining private industry. Her skill set also includes intrusion detection, endpoint protection, data loss prevention, and mobile security. Throughout her career, Valerie has conducted penetration tests, vulnerability assessments, compliance audits, and technical security training for executives, developers, and other security professionals.