Description
A jargon-free, practical guide to the key concepts, terminology, and technologies of cybersecurity perfect for anyone planning or implementing a security strategy.
Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cyber Security is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts effectively.
Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness about the technology Every high-profile data breach underlines the need for cybersecurity. A proper understanding of threats, vulnerabilities, and most-likely attacks empowers you to make better decisions and mitigate risks. about the book Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.
Renowned security expert Tom Kranz teaches you to think like a hacker, ensuring you can spot your own weak points and evaluate risks in new technologies or processes. You'll cement this mindset by planning your own penetration test—taking on the role of the attacker in a simulated hack against an asset management firm. Finally, you'll work through a real-world security breach, learning how to respond to live threats and apply the lessons learned to your own organization.