Effective Vulnerability Management (eBook)

Managing Risk in the Vulnerable Digital Ecosystem
eBook Download: PDF
2024
291 Seiten
John Wiley & Sons (Verlag)
978-1-394-22122-6 (ISBN)

Lese- und Medienproben

Effective Vulnerability Management - Chris Hughes, Nikki Robinson
Systemvoraussetzungen
22,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management

Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust.

Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity.

* Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively

* Build a real-time understanding of risk through secure configuration and continuous monitoring

* Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors

* Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them

Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society.

CHRIS HUGHES, M.S., MBA, currently serves as the Co-Founder and President at Aquia and has 20 years of IT/Cybersecurity experience in the public and private sectors. He is also an adjunct professor for M.S. Cybersecurity programs. Chris co-hosts the Resilient Cyber Podcast and also serves as a Cyber Innovation Fellow at CISA. NIKKI ROBINSON, DSc, PhD, is a Security Architect and Professor of Practice at Capitol Technology University. She holds a DSc in Cybersecurity and a PhD in Human Factors.

Foreword .xvii

Introduction xix

1 Asset Management 1

2 Patch Management 29

3 Secure Configuration 53

4 Continuous Vulnerability Management 69

5 Vulnerability Scoring and Software Identification 79

6 Vulnerability and Exploit Database Management 115

7 Vulnerability Chaining 125

8 Vulnerability Threat Intelligence 145

9 Cloud, DevSecOps, and Software Supply Chain Security 155

10 The Human Element in Vulnerability Management 187

11 Secure-by-Design 207

12 Vulnerability Management Maturity Model 233

Acknowledgments 247

About the Authors 249

About the Technical Editor 251

Index 253

Erscheint lt. Verlag 20.3.2024
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Computer Science • Computer Security & Cryptography • Computersicherheit • Computersicherheit u. Kryptographie • cyberattack • cybersecurity • Cybersecurity book • Cybersecurity risk • Cybersicherheit • DevSecOps • Digital risk management • Finance & Investments • Finanz- u. Anlagewesen • Informatik • Information Privacy • Information Security • Insurance & Risk Management • Risk Management • security analysis • security analyst • Software vulnerability • Versicherungswesen u. Risikomanagement • vulnerability management
ISBN-10 1-394-22122-3 / 1394221223
ISBN-13 978-1-394-22122-6 / 9781394221226
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 8,0 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
25,19