Privileged Attack Vectors 2nd Edition
Editorial Reviews
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges.
Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials.
This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access.
Product details
- Paperback: 420 pages
- Publisher: Apress; 2nd ed. edition (June 24, 2020)
- Language: English
- ISBN-10: 1484259130
- ISBN-13: 978-۱۴۸۴۲۵۹۱۳۹
- Product Dimensions: 6.۱ x 1 x 9.2 inches
- # Computer Security & Encryption (Books)
نقد و بررسیها0
هنوز بررسیای ثبت نشده است.