Cyber Security Essentials

Front Cover
James Graham, Ryan Olson, Rick Howard
CRC Press, 2016 M04 19 - 342 pages
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish


Chapter 1 Cyber Security Fundamentals
Chapter 2 Attacker Techniques and Motivations
Chapter 3 Exploitation
Chapter 4 Malicious Code
Chapter 5 Defense and Analysis Techniques
Chapter 6 iDefense Special File Investigation Tools
Back Cover

Other editions - View all

Common terms and phrases

About the author (2016)

This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense Security Intelligence Services; a business unit of VeriSign, Inc.

iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and "three-letter agencies" in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country's business sectors.

iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the "what", the "when" and the "where"), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the "who" and the "why").

For more information, please contact

Bibliographic information