Cyberjutsu - Cybersecurity for the Modern Ninja

Taschenbuch, Sprache: Englisch
36,90 €
inkl. MwSt. versandkostenfrei!


Produktdetails  
Verlag No Starch Press
Auflage 26.04.2021
Seiten 264
Format 15,7 x 2,0 x 23,3 cm
Gewicht 403 g
Artikeltyp Englisches Buch
EAN 9781718500549
Bestell-Nr 71850054UA

Produktbeschreibung  

Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

Cyberjutsu is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty’s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today’s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks.
 
Learn how to use key ninja techniques to find gaps in a target’s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with “the correct mind,” mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems.
 
You’ll also learn how to:

  • Use threat modeling to reveal network vulnerabilities
  • Identify insider threats in your organization
  • Deploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols
  • Guard against malware command and-control servers
  • Detect attackers, prevent supply-chain attacks, and counter zero-day exploits
  •  
    Cyberjutsu is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.


    Inhalt:

    Chapter 1: Mapping Networks
    Chapter 2: Guarding with Special Care
    Chapter 3: Xenophobic Security
    Chapter 4: Identification Challenges
    Chapter 5: Double-Sealed Password
    Chapter 6: Hours of Infiltration
    Chapter 7: Access to Time
    Chapter 8: Tools
    Chapter 9: Sensors
    Chapter 10: Bridges and Ladders
    Chapter 11: Locks
    Chapter 12: Moon on the Water
    Chapter 13: Worm Agent
    Chapter 14: Ghost on the Moon
    Chapter 15: The Art of the Fireflies
    Chapter 16: Live Capture
    Chapter 17: Fire Attack
    Chapter 18: Covert Communication
    Chapter 19: Call Signs
    Chapter 20: Light, Noise, and Litter Discipline
    Chapter 21: Circumstances of Infiltration
    Chapter 22: Zero Days
    Chapter 23: Hiring Shinobi
    Chapter 24: Guardhouse Behavior
    Chapter 25: Zero Suspicion Threat Management
    Chapter 26: Shinobi Tradecraft

    Autorenporträt  
    Mehr Angebote zum Thema