The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done. One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. This is what this book is about, and it covers the following: Important Cybersecurity Concepts An introduction to Supply Chain Attacks and its impact on the Critical Infrastructure in the United States. Examples of Supply Chain Attacks, most notably those of Solar Winds and Crowd Strike. Mitigation strategies that the CISO and their IT Security team can take to thwart off Supply Chain Attacks.
-
Autore:
-
Editore:
-
Anno:2025
-
Rilegatura:Hardback
-
Pagine:122 p.
Le schede prodotto sono aggiornate in conformità al Regolamento UE 988/2023. Laddove ci fossero taluni dati non disponibili per ragioni indipendenti da Feltrinelli, vi informiamo che stiamo compiendo ogni ragionevole sforzo per inserirli. Vi invitiamo a controllare periodicamente il sito www.lafeltrinelli.it per eventuali novità e aggiornamenti.
Per le vendite di prodotti da terze parti, ciascun venditore si assume la piena e diretta responsabilità per la commercializzazione del prodotto e per la sua conformità al Regolamento UE 988/2023, nonché alle normative nazionali ed europee vigenti.
Per informazioni sulla sicurezza dei prodotti, contattare productsafety@feltrinelli.it