Download Defensive Security Handbook: Best Practices for Securing by Lee Brotherston PDF

By Lee Brotherston

Despite the rise of high-profile hacks, record-breaking info leaks, and ransomware assaults, many agencies don’t have the funds to set up or outsource a knowledge protection (InfoSec) application, forcing them to profit at the task. for firms obliged to improvise, this pragmatic consultant offers a security-101 guide with steps, instruments, techniques, and concepts that can assist you force maximum-security development at very little cost.

Each bankruptcy during this e-book offers step by step directions for facing a particular factor, together with breaches and failures, compliance, community infrastructure and password administration, vulnerability scanning, and penetration trying out, between others. community engineers, procedure directors, and safeguard execs will research instruments and strategies to aid enhance safety in good, potential chunks.

  • Learn basics of beginning or remodeling an InfoSec program
  • Create a base set of rules, criteria, and procedures
  • Plan and layout incident reaction, catastrophe restoration, compliance, and actual security
  • Bolster Microsoft and Unix platforms, community infrastructure, and password management
  • Use segmentation practices and designs to compartmentalize your network
  • Explore automatic procedure and instruments for vulnerability management
  • Securely enhance code to minimize exploitable errors
  • Understand easy penetration checking out suggestions via pink teaming
  • Delve into IDS, IPS, SOC, logging, and monitoring

Show description

Read Online or Download Defensive Security Handbook: Best Practices for Securing Infrastructure PDF

Similar network administration books

CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All you wish. " CISA qualified info structures Auditor multi function examination consultant Get whole assurance of all of the fabric incorporated at the qualified info platforms Auditor examination within this complete source. Written by way of an IT safety and audit professional, this authoritative advisor covers all six examination domain names constructed by means of the knowledge structures Audit and keep watch over organization (ISACA).

Getting Started with Kubernetes

Orchestrate and deal with large-scale Docker deployments with Kubernetes to liberate larger regulate over your infrastructure and expand your containerization strategyAbout This BookLearn the basics of Kubernetes – the way it works, and the way it suits into the turning out to be containerization trendIntegrate Kubernetes into your workflow along non-stop supply instruments to deal with modern operational challengesGet to grips with a variety of instruments that can assist you video display and safe your deploymentsWho This booklet Is ForIf you've a few adventure with Docker and need to get extra from containerization, this e-book is the correct position to begin.

Alfresco 3 Cookbook

Effortless to stick with cookbook permitting you to dive in anywhere you will have. Convert rules into motion utilizing functional dependent recipes. A complete selection of alfresco recipes masking the API, Freemarker templates, exterior integration, net buyer, and masses extra.

Additional resources for Defensive Security Handbook: Best Practices for Securing Infrastructure

Example text

Organize a Company-Wide Team Assets will enter the company from a variety of different areas. The purchasing department is the obvious first choice; third-party vendors may bring their own equipment; or there may be a BYOD (bring your own device) policy, which is a whole other can of worms. Types of departments that would benefit from being on an asset-management team include purchasing, receiving, helpdesk, communications, maintenance, and system administrators. As with most other processes and procedures, it is close to impossible to plan for every possibility.

Prior to this, dsquery, adsi, and ldap commands were used to obtain information from AD. Get-ADUser -filter * can be used to return an entire list of users within an AD domain. There are many filters that can be added to return subsets of this list as well. To retrieve all domain computer accounts, run Get-ADComputer -Filter 'ObjectClass -eq "Computer"' | Select -Expand DNSHostName. Simple Network Management Protocol (SNMP) SNMP can provide a great amount of information on networked devices. ” SNMP settings should be changed to custom strings, and if possible switched to SNMP version 3, which supports username and password authentication.

Implement Ad-Blocking Filetypes of a certain size known to be malicious and associated with ransomware. ) Exploitation Endpoint downloads a JavaScript file or Word document with malicious macro. Disable macros and malicious filetypes via group policy. Ensure any endpoint protection is up-to-date and installed. ) Use proxies or IDS (if cleartext) to monitor for known deobfuscation strings. Installation The payload is executed on the end user’s device. ) Keep backups (that are not permanently attached) so that encrypted files can be restored easily.

Download PDF sample

Rated 4.80 of 5 – based on 15 votes