Linked e-resources

Details

At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Part I: All Businesses; Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business; Executive Summary; Understanding Attackers' Motivation; Remain Current Through Security Facts; Microsoft Security Intelligence Report; Why It Is Important; Where to Download; Verizon 2017 Data Breach Investigations Report; Verizon 2016 Data Breach Investigations Report; Why It Is Important; Where to Download; IBM-Sponsored Ponemon Cost of Data Breach Study; Why It Is Important

Where to DownloadOther Annual Security Reports; Cisco Annual Security Report; Where to Download; FireEye M-Trends 2017 Annual Security Report; Where to Download; Georgia Tech Emerging Cyber Threats Report; Where to Download; Steps for a Secure Cloud; Azure Cloud Networking, Encryption, Data Storage; Identity Multifactor Authentication; Software Is a Key Vulnerability; OWASP Top Ten Project; Finding Cloud Blind Spots to Improve Your Network Security Knowledge; NVD Use with ITIL/Change Management Patching; Security Responsibility Model; Why It Is Important; Summary

Chapter 2: Azure Security Center Cost ModelShared Cost Model; License Cost of Security Center; Azure Cost of Data Storage; Quantitative Risk Assessments and Cost-Benefit Analysis; Other Considerations (Security Sensitive); Azure Active Directory; Azure Support Plans; Application Gateway; Enterprise Security Architecture; Ransomware Lessons Learned; Summary; Part II: Cloud Security Operations; Chapter 3: Getting Started with Azure Security Center; Cloud Security Challenges; Security Center Overview; Security Center Placement; Preventing an Azure Infrastructure Breach

Establishing or Improving a Cybersecurity Program Azure Virtual Networking Example; Select an Azure Subscription; Navigating Microsoft Azure; Summary; Chapter 4: Azure Security Center Configuration; Azure Infrastructure Design; Azure Security Center Pricing Tier; Standard Tier Advantages; Advanced Threat Detection; Anomaly Detection; Crash Analysis; Threat Intelligence; Behavioral Analysis; Using Security Center; Summary; Chapter 5: Azure Security Center Scenarios; Security Health Monitoring; Security Recommendations Procedures; Prevention Blade; Network Security Groups; Summary

Chapter 6: Azure Security Center ExtensionsSecurity Center Updates; Detection and Security Alerts; Recommendations; Next-Generation Firewalls; Vulnerability Assessment Integration; Summary; Appendix A: Troubleshooting and Cyber-Reference; Azure Security Center Diagnostics Troubleshooting; Cyber-Reference; What's in a Name; Glossary; Definitions; Security, Identity, and Cryptography; Attack Method; Appendix B: Know Your Enemy; Professional Education; Security Risk Landscape; Understanding Cybersecurity Attack Details; Now to the Why and How Cyber-Attacks Are Achieved

Browse Subjects

Show more subjects...

Statistics

from
to
Export