Defensive Security Handbook Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job.
Saved in:
Main Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Beijing
OReilly Media
2017
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Creating a security program
- Asset management and documentation
- Policies
- Standards and procedures
- User education
- Incident response
- Disaster recovery
- Industry compliance standards and frameworks
- Physical security
- Microsoft Windows infrastructure
- Unix application servers
- Endpoints
- Password management and multifactor authentication
- Network infrastructure
- Segmentation
- Vulnerability management
- Development
- Purple teaming
- IDS and IPS
- Logging and monitoring
- The extra mile.