Gå direkte til innholdet
Effects of Cyber Supply Chain Attacks and Mitigation Strategies
Effects of Cyber Supply Chain Attacks and Mitigation Strategies
Spar

Effects of Cyber Supply Chain Attacks and Mitigation Strategies

Forfatter:
Engelsk
Les i Adobe DRM-kompatibelt e-bokleserDenne e-boka er kopibeskyttet med Adobe DRM som påvirker hvor du kan lese den. Les mer
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today's world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done. One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. This is what this book is about, and it covers the following: Important Cybersecurity Concepts An introduction to Supply Chain Attacks and its impact on the Critical Infrastructure in the United States Examples of Supply Chain Attacks, most notably those of Solar Winds and Crowd Strike. Mitigation strategies that the CISO and their IT Security team can take to thwart off Supply Chain Attacks
Forfatter
Ravi Das
ISBN
9781040391600
Språk
Engelsk
Utgivelsesdato
30.6.2025
Forlag
CRC PRESS
Tilgjengelige elektroniske format
  • Epub - Adobe DRM
Les e-boka her
  • E-bokleser i mobil/nettbrett
  • Lesebrett
  • Datamaskin