0
نام کتاب
Cybersecurity Myths and Misconceptions

Avoiding the Hazards and Pitfalls that Derail Us

Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra

Paperback419 Pages
PublisherAddison-Wesley
Edition1
LanguageEnglish
Year2023
ISBN9780137929238
822
A4809
انتخاب نوع چاپ:
جلد سخت
753,000ت
0
جلد نرم
673,000ت
0
طلق پاپکو و فنر
683,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Cybersecurity

#Misconceptions

#Malware

توضیحات

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them


Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link?


In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.


Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses.


  • Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them.
  • Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best?
  • Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader.
  • Get a high-level exposure to why statistics and figures may mislead as well as enlighten.
  • Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them.


"You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it."

--From the Foreword by Vint Cerf, Internet Hall of Fame Pioneer


Table of Contents

Part I: General Issues

Chapter 1: What Is Cybersecurity?

Chapter 2: What Is the Internet?


Part II: Human Issues

Chapter 3: Faulty Assumptions and Magical Thinking

Chapter 4: Fallacies and Misunderstandings

Chapter 5: Cognitive Biases

Chapter 6: Perverse Incentives and the Cobra Effect

Chapter 7: Problems and Solutions


Part III: Contextual Issues

Chapter 8: Pitfalls of Analogies and Abstractions

Chapter 9: Legal Issues

Chapter 10: Tool Myths and Misconceptions

Chapter 11: Vulnerabilities

Chapter 12: Malware

Chapter 13: Digital Forensics and Incident Response


Part IV: Data Issues

Chapter 14: Lies, Damn Lies, and Statistics

Chapter 15: Illustrations, Visualizations, and Delusions

Chapter 16: Finding Hope


Review

"Many security leaders are traditionally in charge of correcting misconceptions just as much as they are in charge of building up solid security practices. We have plenty of resources on practices--but this book is the crucial guide to that essential myth busting."

--Phil Venables, CISO, Google Cloud


"I'm writing this on my phone, over Wi-Fi, in an airplane on my way to Black Hat, one of the world's largest security conferences. The fact that I'm able to do this at all shows how much we've really learned about cybersecurity over the decades. Now it's all collected in one place for everyone to share. Thank the wise authors, and most importantly: GET OFF THEIR LAWN."

--Wendy Nather, Head of Advisory CISOs, Cisco


"This book is astounding. A true tour de force--which I have never said about any other book. Inverting the viewpoint is a stroke of genius. This is going to be on my grabbable-at-any-time shelf. What I learned, recalled, and was refreshed on with technically astute agnosticism cannot be measured; just appreciated as a profound historical compilation of security practice and theory. Bravo!"

--Winn Schwartaul, Founder and Chief Visionary Officer, The Security Awareness Company


"I am happy to endorse the central idea of this book--that cybersecurity is rife with myths that are themselves part of the problem. The brain wants to understand, the world grows ever more complicated, and the sum of the two is myth-making. As the authors say, even if some understanding is true at some time, with enough change what was true becomes a myth soon enough. As such, an acquired immunity to myths is a valuable skill for the cybersecurity practitioner if no other. The paramount goal of all security engineering is No Silent Failure, but myths perpetuate if not create silent failure. Why? Because a state of security is the absence of unmitigable surprise and you cannot mitigate what you don't know is going on. Myths blind us to reality. Ignorance of them is not bliss. This book is a vaccine."

--Dan Geer, CISO, In-Q-Tel


"This is a fun read for all levels. I like their rapid fire delivery and the general light they cast on so many diverse myths. This book will change the cybersecurity industry for the better."

--Michael Sikorski, Author of Practical Malware Analysis & CTO, Unit 42 at Palo Alto Networks


About the Author

Eugene H. Spafford, PhD, is a professor in Computer Science at Purdue University. In his 35-year career, Spaf has been honored with every major award in cybersecurity. Leigh Metcalf, PhD, is a Senior Network Security Research Analyst at the Carnegie Mellon University Software Engineering Institute's cybersecurity-focused CERT® division. Josiah Dykstra, PhD, is a cybersecurity practitioner, researcher, author, and speaker. He is the owner of Designer Security and has worked at the US National Security Agency for 18 years.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
1,196
CompTIA Security+ All-in-One Exam Guide (Exam SY0-501)
1,130,000 تومان
هک و امنیت
1,684
Cybersecurity and Privacy Law Handbook
446,000 تومان
لینوکس
1,679
Black Hat Bash
578,000 تومان
وب
1,291
Web Application Advanced Hacking
312,000 تومان
هک و امنیت
1,005
Cybersecurity First Principles
652,000 تومان
هک و امنیت
953
Keycloak – Identity and Access Management for Modern Applications
592,000 تومان
هک و امنیت
2,994
Linux Basics for Hackers
485,000 تومان
هک و امنیت
1,208
ASP.NET Core Security
614,000 تومان
هک و امنیت
1,271
Practical Linux Forensics
654,000 تومان
Cryptocurrency
1,527
Serious Cryptography
625,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©