Skip to content
You are not logged in |Login  
Limit search to available items
Record:   Prev Next
More Information
BookPrinted Material
Author Grimes, Roger A., author.

Title A data-driven computer security defense : THE computer security defense you should be using / Roger A. Grimes.

Publication Info. [United States?] : [publisher not identified] [2018]

Item Status

Location Call No. Status OPAC Message Public Note Gift Note
 Moore Stacks  QA76.9.A25 G757 2018    Available  ---
Edition Edition 1.1.
Description xvi, 224 pages ; 23 cm
Note "Foreward [sic] by Dr. Dorothy E. Denning, Emeritus Distinguished Professor, Department of Defense Analysis Naval Postgraduate School"--Cover.
Includes index.
"Recommended Related Reading" : pages 216-217.
Summary Today, most companies are either completely hacked or could easily be hacked. Things are so bad that traditional defenses are operating under an assumption of "Assume Breach." The truth is that most companies are not doing the right things in the right places, making it easier for hackers and malware to infiltrate an organization than it needs to be. Most companies are highly inefficient at computer security defense, and wonder why they are still so easily hackable while at the same time throwing ever growing amounts of capital, resources, and people at the problem. It doesn't have to be this way. [This book] describes what's wrong with the current defenses and how they got this way. It then tells how to create a better, more efficient defense where remediations are right-aligned against the biggest threats they are supposed to defeat, with prescriptive guidance. The guidance is then followed by real-life examples of what other companies have done to get a better, data-driven defense. After you read [this book] you'll never think about computer security the same way again"--Page [4] of cover.
Contents Introduction -- How and why hackers hack -- Broken defenses -- How to fix broken defenses -- Getting better data -- Benefits of a data-driven defense -- The data-driven computer security lifecycle-- Implementation examples -- Getting from here to there -- Answers to common questions.
Subject Computer security.
Computer networks -- Security measures.
ISBN 9781549836534