See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges.
Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials.
This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access.
What You Will Learn
Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems
ISBN: | 9781484259139 |
Publication date: | 14th June 2020 |
Author: | Morey J Haber |
Publisher: | Apress |
Format: | Paperback |
Pagination: | 384 pages |
Genres: |
Computer security Network security |