Название: Losing the Cybersecurity War: And What We Can Do to Stop It Автор: Steve King, Kiren Chaudry Издательство: CRC Press Год: 2023 Страниц: 173 Язык: английский Формат: pdf (true) Размер: 10.2 MB
The Internet was created for communication and sharing purposes without security in mind. As it expanded exponentially via cloud and edge and computing, the notion of defending the perimeter has become more challenging. There are more vulnerabilities (and targets) created every day with added devices and users, and attackers are taking advantage of our security predicaments. Zero Trust begins with the premise of implicitly not trusting any devices, assets, services, workflows, or people connected to the network. The next step is to assume everything connected is hostile and needs to be authenticated.
Employing a strategy of Zero Trust makes profound sense for improving cybersecurity fortification. It is already being widely adopted by the Pentagon and the Department of Homeland Security, and it is being mandated to other agencies via Presidential orders. The Defense Information Systems Agency (DISA) intends to implement a prototype for its Thunderdome Zero Trust architecture within six months. Zero trust is certainly on a fast track for government, and industry is likely to follow soon on that path as cyber-threats and the stakes for breaches keep growing.
This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future.
While Steve highlights the urgent need and mechanisms for Zero Trust, his writing is really a field guide on how to meet and conquer current and future challenges in cybersecurity. Because cyber threats permeate every aspect of the converged digital/physical world, in addition to Zero Trust, other actions are required to holistically contain hackers and geopolitical adversaries. You change the status quo by exploring past shortcomings and new paradigms. Steve does just that. The crux of his book is how the attacker–defender dynamics on five battlefields of cybersecurity can be reversed. Those battlegrounds are described as (1) Education, (2) Technology, (3) Intelligence (information) (4) Economics, and (5) Leadership.
The book is comprehensive and indepth for tackling the trying cyber issues that threaten us, both today and tomorrow. Although it provides sound technical advice that can be used by CISOS, CIOS, and CTOS, it also is easy to understand and follow for the non-expert reader. Steve’s book is much more than a resource, it is a guide to a practical and systematic Zero Trust way forward for cybersecurity.
Скачать Losing the Cybersecurity War And What We Can Do to Stop It
Cybersecurity for Connected Medical Devices Название: Cybersecurity for Connected Medical Devices Автор: Arnab Ray Издательство: Academic Press/Elsevier Год: 2022 Страниц: 334 Язык: английский...
Security, Privacy and Trust in the IoT Environment Название: Security, Privacy and Trust in the IoT Environment Автор: Zaigham Mahmood Издательство: Springer Год: 2019 Формат: True PDF Страниц: 311...