Identity attack vectors strategically designing and implementing identity security

Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities -- whet...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Haber, Morey J. (VerfasserIn), Rolls, Darran (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY Apress [2024]
Ausgabe:Second edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-102563136
003 DE-627-1
005 20240429114544.0
007 cr uuu---uuuuu
008 240429s2024 xx |||||o 00| ||eng c
020 |a 9798868802331  |c electronic bk.  |9 979-8-8688-0233-1 
035 |a (DE-627-1)102563136 
035 |a (DE-599)KEP102563136 
035 |a (ORHE)9798868802331 
035 |a (DE-627-1)102563136 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 |a 005.8  |2 23/eng/20240402 
100 1 |a Haber, Morey J.  |e VerfasserIn  |4 aut 
245 1 0 |a Identity attack vectors  |b strategically designing and implementing identity security  |c Morey J. Haber, Darran Rolls 
250 |a Second edition. 
264 1 |a New York, NY  |b Apress  |c [2024] 
300 |a 1 online resource (301 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities -- whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives. This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric. 
650 0 |a Computer security 
650 0 |a Identity theft 
650 4 |a Sécurité informatique 
650 4 |a Vol d'identité 
700 1 |a Rolls, Darran  |e VerfasserIn  |4 aut 
776 1 |z 9798868802324 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9798868802324 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9798868802331/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-102563136
_version_ 1818767370554966016
adam_text
any_adam_object
author Haber, Morey J.
Rolls, Darran
author_facet Haber, Morey J.
Rolls, Darran
author_role aut
aut
author_sort Haber, Morey J.
author_variant m j h mj mjh
d r dr
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)102563136
(DE-599)KEP102563136
(ORHE)9798868802331
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition Second edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03058nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-102563136</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114544.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798868802331</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">979-8-8688-0233-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102563136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102563136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9798868802331</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102563136</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240402</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haber, Morey J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity attack vectors</subfield><subfield code="b">strategically designing and implementing identity security</subfield><subfield code="c">Morey J. Haber, Darran Rolls</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (301 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities -- whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives. This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identity theft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vol d'identité</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rolls, Darran</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9798868802324</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798868802324</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9798868802331/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-102563136
illustrated Illustrated
indexdate 2024-12-18T08:48:48Z
institution BVB
isbn 9798868802331
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (301 pages) illustrations
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Apress
record_format marc
spelling Haber, Morey J. VerfasserIn aut
Identity attack vectors strategically designing and implementing identity security Morey J. Haber, Darran Rolls
Second edition.
New York, NY Apress [2024]
1 online resource (301 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index
Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it's not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities -- whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives. This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization's entire Identity Fabric.
Computer security
Identity theft
Sécurité informatique
Vol d'identité
Rolls, Darran VerfasserIn aut
9798868802324
Erscheint auch als Druck-Ausgabe 9798868802324
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9798868802331/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Haber, Morey J.
Rolls, Darran
Identity attack vectors strategically designing and implementing identity security
Computer security
Identity theft
Sécurité informatique
Vol d'identité
title Identity attack vectors strategically designing and implementing identity security
title_auth Identity attack vectors strategically designing and implementing identity security
title_exact_search Identity attack vectors strategically designing and implementing identity security
title_full Identity attack vectors strategically designing and implementing identity security Morey J. Haber, Darran Rolls
title_fullStr Identity attack vectors strategically designing and implementing identity security Morey J. Haber, Darran Rolls
title_full_unstemmed Identity attack vectors strategically designing and implementing identity security Morey J. Haber, Darran Rolls
title_short Identity attack vectors
title_sort identity attack vectors strategically designing and implementing identity security
title_sub strategically designing and implementing identity security
topic Computer security
Identity theft
Sécurité informatique
Vol d'identité
topic_facet Computer security
Identity theft
Sécurité informatique
Vol d'identité
url https://learning.oreilly.com/library/view/-/9798868802331/?ar
work_keys_str_mv AT habermoreyj identityattackvectorsstrategicallydesigningandimplementingidentitysecurity
AT rollsdarran identityattackvectorsstrategicallydesigningandimplementingidentitysecurity