Buch, Englisch, 134 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 410 g
Buch, Englisch, 134 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 410 g
ISBN: 978-1-032-95531-5
Verlag: Taylor & Francis Ltd
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done.
One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. This is what this book is about, and it covers the following:
- Important Cybersecurity Concepts
- An introduction to Supply Chain Attacks and its impact on the Critical Infrastructure in the United States
- Examples of Supply Chain Attacks, most notably those of Solar Winds and Crowd Strike. Mitigation strategies that the CISO and their IT Security team can take to thwart off Supply Chain Attacks
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftssysteme, Wirtschaftsstrukturen
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftspolitik, politische Ökonomie
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Sozialwissenschaften Politikwissenschaft Regierungspolitik Wirtschafts- und Finanzpolitik
Weitere Infos & Material
Chapter 1: An Overview Into Cybersecurity Chapter 2: An Overview of Supply Chain Attacks & Critical Infrastructure Chapter 3: Real World Supply Chain Attacks Chapter 4: How To Mitigate The Risks of Supply Chain Attacks