Book Image

Cybersecurity – Attack and Defense Strategies. - Second Edition

By : Yuri Diogenes, Dr. Erdal Ozkaya
Book Image

Cybersecurity – Attack and Defense Strategies. - Second Edition

By: Yuri Diogenes, Dr. Erdal Ozkaya

Overview of this book

Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.
Table of Contents (20 chapters)
18
Other Books You May Enjoy
19
Index

Introducing the Cyber Kill Chain

The Cyber Kill Chain, despite how fancy it sounds, in reality is just a step-by-step description of how hackers attack and how a cyber-attack generally plays out. The model describes the steps of the advisories from the beginning until it's exploited, as you can see in the following illustration:

Figure 1: The Cybersecurity Kill Chain stages

The cybersecurity kill chain is a security model that organizations use to track and prevent cyber intrusions at their various stages. The kill chain has been used with varying degrees of success against ransomware, hacking attempts, and APTs (advanced persistent threats).

The kill chain is attributed to Lockheed Martin, who derived it from a military model used to effectively neutralize targets by anticipating their attacks, engaging them strategically, and destroying them. This chapter discusses the key steps in a cyber kill chain and highlights the latest tools used in each of them.

The following...