Haber, Morey J.
Privileged Attack Vectors
1. Privileges
Morey J. Haber, Brad Hibbert
2. Shared User Credentials
Morey J. Haber, Brad Hibbert
3. Password Hacking
Morey J. Haber, Brad Hibbert
4. Password Less Authentication
Morey J. Haber, Brad Hibbert
5. Privilege Escalation
Morey J. Haber, Brad Hibbert
6. Insider Threats
Morey J. Haber, Brad Hibbert
7. Threat Hunting
Morey J. Haber, Brad Hibbert
8. Data-Centric Audit and Protection
Morey J. Haber, Brad Hibbert
9. Privileged Monitoring
Morey J. Haber, Brad Hibbert
10. Privileged Access Management
Morey J. Haber, Brad Hibbert
11. PAM Architecture
Morey J. Haber, Brad Hibbert
12. Break Glass
Morey J. Haber, Brad Hibbert
13. Industrial Control Systems (ICS)
Morey J. Haber, Brad Hibbert
14. Internet of Things (IoT)
Morey J. Haber, Brad Hibbert
15. The Cloud
Morey J. Haber, Brad Hibbert
16. Mobile Devices
Morey J. Haber, Brad Hibbert
17. Ransomware
Morey J. Haber, Brad Hibbert
18. Secured DevOps (SDevOps)
Morey J. Haber, Brad Hibbert
19. Regulatory Compliance
Morey J. Haber, Brad Hibbert
20. Sample PAM Use Cases
Morey J. Haber, Brad Hibbert
21. Deployment Considerations
Morey J. Haber, Brad Hibbert
22. Privileged Account Management Implementation
Morey J. Haber, Brad Hibbert
23. Key Takeaways
Morey J. Haber, Brad Hibbert
24. Conclusion
Morey J. Haber, Brad Hibbert
Nyckelord: Computer Science, Security
- Författare
- Haber, Morey J.
- Hibbert, Brad
- Utgivare
- Springer
- Utgivningsår
- 2018
- Språk
- en
- Utgåva
- 1
- Sidantal
- 27 sidor
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9781484230480
- Tryckt ISBN
- 978-1-4842-3047-3