Advertisement

Asset Attack Vectors

Building Effective Vulnerability Management Strategies to Protect Organizations

  • Morey J. Haber
  • Brad Hibbert

Table of contents

  1. Front Matter
    Pages i-xxxvii
  2. Morey J. Haber, Brad Hibbert
    Pages 1-3
  3. Morey J. Haber, Brad Hibbert
    Pages 5-37
  4. Morey J. Haber, Brad Hibbert
    Pages 39-44
  5. Morey J. Haber, Brad Hibbert
    Pages 45-48
  6. Morey J. Haber, Brad Hibbert
    Pages 49-55
  7. Morey J. Haber, Brad Hibbert
    Pages 57-67
  8. Morey J. Haber, Brad Hibbert
    Pages 69-78
  9. Morey J. Haber, Brad Hibbert
    Pages 79-87
  10. Morey J. Haber, Brad Hibbert
    Pages 89-92
  11. Morey J. Haber, Brad Hibbert
    Pages 93-98
  12. Morey J. Haber, Brad Hibbert
    Pages 99-110
  13. Morey J. Haber, Brad Hibbert
    Pages 111-118
  14. Morey J. Haber, Brad Hibbert
    Pages 119-123
  15. Morey J. Haber, Brad Hibbert
    Pages 125-163
  16. Morey J. Haber, Brad Hibbert
    Pages 165-206
  17. Morey J. Haber, Brad Hibbert
    Pages 207-212
  18. Morey J. Haber, Brad Hibbert
    Pages 213-216
  19. Morey J. Haber, Brad Hibbert
    Pages 217-227
  20. Morey J. Haber, Brad Hibbert
    Pages 229-239
  21. Morey J. Haber, Brad Hibbert
    Pages 241-247
  22. Morey J. Haber, Brad Hibbert
    Pages 249-265
  23. Morey J. Haber, Brad Hibbert
    Pages 267-303
  24. Morey J. Haber, Brad Hibbert
    Pages 305-307
  25. Morey J. Haber, Brad Hibbert
    Pages 309-310
  26. Back Matter
    Pages 311-371

About this book

Introduction

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn’t matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact.

Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management.

Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization’s cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy.

What You’ll Learn:

  • Create comprehensive assessment and risk identification policies and procedures
  • Implement a complete vulnerability management workflow in nine easy steps
  • Understand the implications of active, dormant, and carrier vulnerability states
  • Develop, deploy, and maintain custom and commercial vulnerability management programs
  • Discover the best strategies for vulnerability remediation, mitigation, and removal
  • Automate credentialed scans that leverage least-privilege access principles
  • Read real-world case studies that share successful strategies and reveal potential pitfalls


Keywords

Cybersecurity Asset attack vectors Asset attacks Malware Social Engineering Phishing Ransomware Insider Threats External Threats Vulnerability Disclosure Threat Intelligence Vulnerability Assessment Configuration Assessment Penetration Testing Patch Management Virtual Patching Threat Detection Continuous Monitoring

Authors and affiliations

  • Morey J. Haber
    • 1
  • Brad Hibbert
    • 2
  1. 1.HeathrowUSA
  2. 2.CarpCanada

Bibliographic information

Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Consumer Packaged Goods
Energy, Utilities & Environment
Aerospace
Engineering