Cyber Threat Hunting (MEAP v8)

Автор: literator от 4-08-2023, 05:48, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Название: Cyber Threat Hunting (MEAP v8)
Автор: Nadhem Al Fardan
Издательство: Manning Publications
Год: 2023
Страниц: 442
Язык: английский
Формат: pdf, epub
Размер: 22.6 MB

Книга "Охота за киберугрозами" предладает читателям навыки и знания, необходимые для выявления потенциальных нарушений безопасности и защиты информационных систем. Автор, Надхем Альфардан, делится своим двадцатилетним опытом работы в области информационной безопасности, представляя реальные сценарии и методы, которые можно использовать для противодействия киберугрозам. В начале книги представлены основы безопасности, на основе которых читатели будут строить свои знания и практические навыки. Затем автор предлагает практическую схему охоты на угрозы, объясняет передовые методы оптимизации и совершенствования экспедиций в поисках потенциальных нарушений безопасности. Книга также рассматривает использование передовых методов на основе машинного обучения и статистического анализа для обнаружения аномалий. Эти методы позволяют автоматизировать процесс обнаружения угроз и помогают выявить скрытые уязвимости в безопасности.

Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. This practical guide to cyber threat hunting gives a reliable and repeatable framework to see and stop attacks.

In Cyber Threat Hunting you will learn how to:

Design and implement a cyber threat hunting framework
Think like your adversaries
Conduct threat hunting expeditions
Streamline how you work with other cyber security teams
Structure threat hunting expeditions without losing track of activities and clues
Use statistics and machine learning techniques to hunt for threats

Organizations that actively seek out security intrusions reduce the time that bad actors spend on their sites, increase their cyber resilience, and build strong resistance to sophisticated covert threats. Cyber Threat Hunting teaches you to recognize attempts to access your systems by seeing the clues your adversaries leave behind. It lays out the path to becoming a successful cyber security threat hunter, guiding you from your very first expedition to hunting in complex cloud-native environments.

So far, we have conducted threat-hunting expeditions based on some explicit logic (e.g., signs of beaconing by calculating the time difference between connections) and then developing searches (e.g., search commands for a datastore) or code (e.g., Python code in Jupiter Notebooks), to apply the logic on data. In the Chapter8, we do the reverse: we let the data inform us about anomalies, some of which can interest threat hunters. We will apply unsupervised ML constructs to data to uncover anomalies, some of which could be malicious. In the chapter, you will explore and process data, extract features, build unsupervised ML models using K-Means, and interpret outputs. We explore building unsupervised machine learning models using K-Means, an algorithm we’ll introduce later in this chapter, to uncover anomalies of interest in network connection events. Concepts in this chapter represent essential blocks to building more sophisticated ML models in the following few chapters.

about the technology
There’s no question about whether your security will come under attack. It already is. The real question is whether you’ll recognize and learn from the attacks when they occur. Cyber threat hunting makes the assumption that a system has been hacked and reveals the signs that have evaded detection tools, or been dismissed as unimportant. In the constantly evolving landscape of modern security, threat hunting is a vital practice to avoid complacency and harden your defenses against attack.

about the book
Cyber Threat Hunting teaches you how to identify potential breaches of your security. You’ll learn by exploring real-life scenarios drawn from author Nadhem AlFardan’s twenty years in information security. Beginning with the fundamentals, you’ll build a practical hunting framework and discover good practices for optimizing and improving expeditions. You’ll learn how to employ advanced techniques that draw on Machine Learning and statistical analysis to help spot anomalies. Best of all, this practical book comes with downloadable datasets and scenario templates so you can practice and hone your threat hunting techniques.

Скачать Cyber Threat Hunting (MEAP V08)




ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.