Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

Profile photo for Mike Wood
Not Yet Rated
0:00
Audiobooks
11
0

Description

Written by Michael J Melone. Available now on Audible, Amazon, and iTunes.

Vocal Characteristics

Language

English

Voice Age

Middle Aged (35-54)

Accents

North American (General) North American (US General American - GenAM)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
prologue, information security has become one of the most rapidly changing and advancing fields within information technology, in large part due to targeted attacks. As we become a more connected society, hackers become more connected to our confidential information, financial institutions and other sensitive systems. Why is it that we can't seem to keep these Attackers out of our networks? Many organizations spend millions of dollars annually in software licences, employeessalaries and consulting fees to limit the likelihood that their organization is compromised next. Yet they continue to be compromised. Today's compromise is easily circumvent protections which were implemented to defend networks prior to the advent of targeted attacks. Targeted attack became relevant in 2005 when the world was introduced to Stuxnet. Touted as the first weapons grade malware, Stuxnet was the first known malware that transcended a cyber attack into the physical world. Since then, the world has been introduced to numerous variants of remote access, trojans ransomware wipers, credential theft tools and various other forms of malware, which enable an attacker to rapidly take control of an impact. A target network. As software developers know, vulnerability is preventable yet inevitable, while our understanding of secure software development improves, so too are processes for developing such software, resulting in finished products of higher quality. Professionally trained software developers undergo rigorous training regarding the risks associated with buffer overflows, integer under flows, injection attacks and the numerous other forms of software vulnerabilities which can be exploited to enable execution of arbitrary code. Improvements in secure software development have led to software manufacturers incorporating regular updating as part of their software package, reduced number of zero day software vulnerabilities, those that the manufacturer has not yet patched and a reduction in the overall number of critical vulnerabilities throughout the world. Despite these improvements, we've seen an alarming increase in the number of networks compromised by Attackers worldwide. Why is that? Hackers have found another form of vulnerability which runs unbridled throughout most enterprises. This class of vulnerability isn't typically monitored and managed by the security development lifecycle or STL though it should be. These vulnerabilities reside in system design rather than software design, and they're largely responsible for enabling hackers to rapidly translate a single compromised host into a compromise of an entire enterprise. Cybersecurity is STL for the systems Engineers of the world. Hackers have learned that egregious delegation of administration runs rampant throughout enterprises. Hackers have also reaffirmed that humans remain vulnerable regardless of the amount of training there provided. If hackers can get one user tow launch, their Malko owed the entire enterprise conf All in this book we will discuss the cybersecurity problems space, examine how a hacker looks at a target network and theorize on how to remediate and prevent compromise. In the future. We will work together to train your mind to see your enterprise through the eyes of a hacker as a series of access, points and forms of authorization. Together, we will review the benefits and drawbacks behind authentication and authorization design and discuss how we can improve information security during the design phase rather than trying to patch vulnerabilities in a production system after the fact, Let's take a journey together and learn how to think like a hacker