LEADER 00000nam a2200457Ii 4500 001 on1098174236 003 OCoLC 005 20190423100419.0 008 190423t20182018xxua 001 0 eng d 020 9781549836534 020 1549836536 035 (OCoLC)1098174236 040 RID|beng|erda|cRID 049 RIDM 050 14 QA76.9.A25|bG757 2018 082 04 005.8|223 090 QA76.9.A25|bG757 2018 100 1 Grimes, Roger A.,|0https://id.loc.gov/authorities/names/ n2001000539|eauthor. 245 12 A data-driven computer security defense :|bTHE computer security defense you should be using /|cRoger A. Grimes. 250 Edition 1.1. 264 1 [United States?] :|b[publisher not identified]|c[2018] 264 4 |c©2018 300 xvi, 224 pages ;|c23 cm 336 text|btxt|2rdacontent 337 unmediated|bn|2rdamedia 338 volume|bnc|2rdacarrier 500 "Foreward [sic] by Dr. Dorothy E. Denning, Emeritus Distinguished Professor, Department of Defense Analysis Naval Postgraduate School"--Cover. 500 Includes index. 500 "Recommended Related Reading" : pages 216-217. 505 0 Introduction -- How and why hackers hack -- Broken defenses -- How to fix broken defenses -- Getting better data -- Benefits of a data-driven defense -- The data- driven computer security lifecycle-- Implementation examples -- Getting from here to there -- Answers to common questions. 520 Today, most companies are either completely hacked or could easily be hacked. Things are so bad that traditional defenses are operating under an assumption of "Assume Breach." The truth is that most companies are not doing the right things in the right places, making it easier for hackers and malware to infiltrate an organization than it needs to be. Most companies are highly inefficient at computer security defense, and wonder why they are still so easily hackable while at the same time throwing ever growing amounts of capital, resources, and people at the problem. It doesn't have to be this way. [This book] describes what's wrong with the current defenses and how they got this way. It then tells how to create a better, more efficient defense where remediations are right- aligned against the biggest threats they are supposed to defeat, with prescriptive guidance. The guidance is then followed by real-life examples of what other companies have done to get a better, data-driven defense. After you read [this book] you'll never think about computer security the same way again"--Page [4] of cover. 650 0 Computer security.|0https://id.loc.gov/authorities/ subjects/sh90001862 650 0 Computer networks|xSecurity measures.|0https://id.loc.gov/ authorities/subjects/sh94001277 650 7 Computer security.|2fast|0https://id.worldcat.org/fast/ 872484 650 7 Computer networks|xSecurity measures.|2fast|0https:// id.worldcat.org/fast/872341 901 MARCIVE 20231220 948 |d20190423|cMH|tconsult orig|lridm 994 C0|bRID
|