TechTarget

How to assess and mitigate information security threats

Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage.

@30695

Excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems, from the eBook The Shortcut Guide to Protecting Business Internet Usage, by Dan Sullivan, this seven-tip collection provides an in-depth look at the information security threat types with which enterprise security professionals must contend.

Various information security threats -- worms, rootkits, Trojans, denial-of -service attacks -- and how they operate are all reviewed. Hacking tools and tactics, like social engineering, are also covered.

Once you're up-to-speed on the myriad information security threats and ways to mitigate them, you can review guidelines for determining which cost-effective countermeasures will best suit your enterprise needs.


How to assess and mitigate information security threats
  Introduction
  Malware: The ever-evolving threat
  Network-based attacks
  Information theft and cryptographic attacks
  Attacks targeted to specific applications
  Social engineering
  Threats to physical security
  Balancing the cost and benefits of countermeasures

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close