Defensive Security Handbook Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job.

Saved in:
Bibliographic Details
Main Authors: Brotherston, Lee (Author), Berlin, Amanda (Author)
Format: Book
Language:English
Published: Beijing OReilly Media 2017
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Creating a security program
  • Asset management and documentation
  • Policies
  • Standards and procedures
  • User education
  • Incident response
  • Disaster recovery
  • Industry compliance standards and frameworks
  • Physical security
  • Microsoft Windows infrastructure
  • Unix application servers
  • Endpoints
  • Password management and multifactor authentication
  • Network infrastructure
  • Segmentation
  • Vulnerability management
  • Development
  • Purple teaming
  • IDS and IPS
  • Logging and monitoring
  • The extra mile.