Cybersecurity Advice from the Best Hackers in the World
Marcus J. Carey, Jennifer Jin
This is a test
This is a test
Buch teilen
English
ePUB (handyfreundlich)
Ăber iOS und Android verfĂŒgbar
eBook - ePub
Tribe of Hackers
Cybersecurity Advice from the Best Hackers in the World
Marcus J. Carey, Jennifer Jin
Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben
Ăber dieses Buch
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product.
Looking for real-world advice from leading cybersecurity experts? You've found your tribe.
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.
Get the scoop on the biggest cybersecurity myths and misconceptions about security
Learn what qualities and credentials you need to advance in the cybersecurity field
Uncover which life hacks are worth your while
Understand how social media and the Internet of Things has changed cybersecurity
Discover what it takes to make the move from the corporate world to your own cybersecurity venture
Find your favorite hackers online and continue the conversation
Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.
HĂ€ufig gestellte Fragen
Wie kann ich mein Abo kĂŒndigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf âAbo kĂŒndigenâ â ganz einfach. Nachdem du gekĂŒndigt hast, bleibt deine Mitgliedschaft fĂŒr den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich BĂŒcher herunterladen?
Derzeit stehen all unsere auf MobilgerĂ€te reagierenden ePub-BĂŒcher zum Download ĂŒber die App zur VerfĂŒgung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die ĂŒbrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den AboplÀnen?
Mit beiden AboplÀnen erhÀltst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst fĂŒr LehrbĂŒcher, bei dem du fĂŒr weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhĂ€ltst. Mit ĂŒber 1 Million BĂŒchern zu ĂŒber 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
UnterstĂŒtzt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nÀchsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Tribe of Hackers als Online-PDF/ePub verfĂŒgbar?
Ja, du hast Zugang zu Tribe of Hackers von Marcus J. Carey, Jennifer Jin im PDF- und/oder ePub-Format sowie zu anderen beliebten BĂŒchern aus Computer Science & Cryptography. Aus unserem Katalog stehen dir ĂŒber 1Â Million BĂŒcher zur VerfĂŒgung.
âEven if an organization is compromised by a zero-day attack, the lateral movement, registry manipulation, network communications, and so on, will be apparent to a mature cybersecurity practitioner and program.â
Marcus J. Carey is a cybersecurity community advocate and startup founder with more than 25 years of protecting government and commercial sensitive data. He started his cybersecurity career in U.S. Navy cryptology with further service in the National Security Agency (NSA).
If there is one myth that you could debunk incybersecurity, what would it be?
The biggest myth that I hear is how attackers are always changing up their tactics. While it is true that new exploits come out over time, the initial exploit is just the tip of the iceberg when it comes to attacker movement on a system or network.
Even if an organization is compromised by a zero-day attack, the lateral movement, registry manipulation, network communications, and so on, will be apparent to a mature cybersecurity practitioner and program. So, their tactics donât really change a lot.
What is one of the biggest bang-for-the-buck actions that an organization can take to improve its cybersecurityposture?
The easiest thing an organization can do to prevent massive compromise is to limit administrative accounts on systems. In the military, we obeyed the âleast privilege principleâ when it came to information access. Organizations should do the same when it comes to their own administrative access. If attackers are able to compromise a user with administrative credentials, itâs essentially game-over; they now have all the keys to the castle.
Howis itthatcybersecurityspending is increasing but breaches are still happening?
Unfortunately, I believe that we are spending too much money on cybersecurity products that bill themselves as silver bullets. Another thing is that there will always be breaches. Anything connected to a network can be compromised and the information pilfered. What really matters is can an organization detect and defend the attacks?
I recommend that organizations get the basics down really well before they blow money on a lot of products. Instead, organizations should hire and train people to defend their networks. In most cases, Iâve found that there isnât enough investment in the personnel responsible for securing networks.
Do you need a college degree or certification to be acybersecurityprofessional?
Years ago, the answer would certainly have been âYes, you need a college degree.â When I was growing up, I was told that I needed to go to college. All of the âsuccessful peopleâ I knew had some form of higher education. Luckily, I went to the military and was able to eventually earn a masterâs in network security. I still believe I needed it back then and surely do not regret anything.
I understand that college degrees or certifications are still valid because they show minimal mastery of a subject matter. But nowadays, there are so many more ways to show actual experience. So, in short, my answer to this question is yes, no, maybe, and it depends.
How did you get started in thecybersecurityfield, and what advice would you give to a beginner pursuing a career incybersecurity?
I remember being fascinated by computers ever since I saw the movieWarGames. I never had a computer growing up, but I did take a few classes on coding in middle school and high school. Since I couldnât afford to go to college and really wanted to, I joined the U.S. Navy for the Montgomery G.I. Bill.
I scored pretty well on my ASVAB (military aptitude test). At the military processing center, I told them that I didnât care what job I got as long as it had to do with computers. I was told I would be training at a school for cryptologic technical communications. It ended up being awesome. It allowed me to work for the Naval Security Group and the National Security Agency for the first eight years of my adulthood. I learned a lot about cryptography, telecommunications, system administration, basic programming, and internetworking.
The military isnât for everyone, but it definitely helped me. I always tell anyone considering the military route to demand from their recruiter a career field and skills that are applicable to the civilian world.
What is your specialty incybersecurity, and how can others gain expertise in your specialty?
Iâd say my specialty is understanding internetworking really well. I gained these skills while working in the Navy and at the NSA. A big part of gaining expertise in that subject was reading a lot of books and taking several Cisco Systems certifications. After getting the certifications, I was in a better position to practice related skills and gain even more experience.
My advice is to try as hard as you can to validate your knowledge so that others will give you a chance. This is extremely important. Every time I acquired a certification, I was given so many more opportunities. Eventually, I was the first military service member to become part of the NSAâs global network engineering team. That was a big deal, and I learned a lot from my time there.
What is your advice for career success when it comes to getting hired, climbing the corporate ladder, or starting a company incybersecurity?
Starting a company in cybersecurity has been one of the most grueling processes I have ever been through. There are typically two types of companies: those that sell products and those that ...