How to Defeat Advanced Malware : New Tools for Protection and Forensics.

By: Dalziel, MaxContributor(s): Crosby, Simon | Dalziel, HenryPublisher: Rockland, MA : Elsevier Science & Technology Books, 2015Copyright date: ©2015Description: 1 online resource (54 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780128027530Subject(s): Malware (Computer software)Genre/Form: Electronic books. Additional physical formats: Print version:: How to Defeat Advanced Malware : New Tools for Protection and ForensicsDDC classification: 004 LOC classification: 005.8 -- .D359 2015ebOnline resources: Click to View
Contents:
Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - A Primer on Detection for Security -- 1.1 Today's approach: "compromise-first detection" -- Chapter 2 - 2014 Endpoint Exploitation Trends -- 2.1 Zero-day trends -- 2.3 Emerging zero-day exploitation techniques -- Chapter 3 - The Proposed Solution -- 3.1 The principle of least privilege -- 3.2 Detection's folly -- Chapter 4 - Protection's Weak Link -- 4.1 Desktop virtualization does not secure the endpoint -- 4.2 Detection and isolation using VMs -- Chapter 5 - Micro-Virtualization -- 5.1 Related work -- 5.2 A practical example -- 5.3 Hardware-enforced task isolation -- 5.4 Hardware virtualization technology -- 5.5 Micro-virtualization at work -- 5.6 The microvisor -- 5.7 Memory and CPU isolation -- 5.8 Virtualized file system (VFS) -- 5.9 Virtualized IP networking - the mobile SDN -- 5.10 Virtualized desktop services -- 5.11 Creation and management of micro-VMs -- 5.12 Reducing the attack surface -- Chapter 6 - Advanced Forensics and Analysis -- 6.1 Micro-VM behavioral analysis -- 6.2 Advanced live forensics -- 6.3 LAVA architecture -- 6.4 Conclusion.
Summary: How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. Learn the basics of protecting your company's online-accessible assets Discover strategies that take advantage of micro-virtualization and BYOD Become adept at comparing and utilizing different endpoint security products and strategies.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF-N0001158
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP-N0001158
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - A Primer on Detection for Security -- 1.1 Today's approach: "compromise-first detection" -- Chapter 2 - 2014 Endpoint Exploitation Trends -- 2.1 Zero-day trends -- 2.3 Emerging zero-day exploitation techniques -- Chapter 3 - The Proposed Solution -- 3.1 The principle of least privilege -- 3.2 Detection's folly -- Chapter 4 - Protection's Weak Link -- 4.1 Desktop virtualization does not secure the endpoint -- 4.2 Detection and isolation using VMs -- Chapter 5 - Micro-Virtualization -- 5.1 Related work -- 5.2 A practical example -- 5.3 Hardware-enforced task isolation -- 5.4 Hardware virtualization technology -- 5.5 Micro-virtualization at work -- 5.6 The microvisor -- 5.7 Memory and CPU isolation -- 5.8 Virtualized file system (VFS) -- 5.9 Virtualized IP networking - the mobile SDN -- 5.10 Virtualized desktop services -- 5.11 Creation and management of micro-VMs -- 5.12 Reducing the attack surface -- Chapter 6 - Advanced Forensics and Analysis -- 6.1 Micro-VM behavioral analysis -- 6.2 Advanced live forensics -- 6.3 LAVA architecture -- 6.4 Conclusion.

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization. Learn the basics of protecting your company's online-accessible assets Discover strategies that take advantage of micro-virtualization and BYOD Become adept at comparing and utilizing different endpoint security products and strategies.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.