En savoir plus 
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You'll Learn:
- Understand the history of cyber-security from the early 1950's through today.
 - Explore the history of terminology that defines the threat landscape.
 - Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
 - Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
 - Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
 
Who This Book Is For?New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
Table des matières
Chapter 1: The History of Attack Vectors.- Chapter 2: Business Justification.- Chapter 3: Definitions.- Chapter 4: Malware.- Chapter 5: Exploits.- Chapter 6: Breaches.- Chapter 7: Regulations.- Chapter 8: People.- Chapter 9: Syndicates.- Chapter 10: Social Engineering.- Chapter 11: Solutions.- Chapter 12: The Human Threat.- Chapter 13:  Lateral Movement.- Chapter 14: Return on Investment.- Chapter 15: It s Not If, But When.- Chapter 16: Supply Chain Attacks.- Chapter 17: Been Hacked?.- Chapter 18: History Lesson.- Chapter 19: Conclusion.
A propos de l'auteur
Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previous served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during nearly his 13-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.
Résumé
From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You’ll Learn:
- Understand the history of cyber-security from the early 1950’s through today.
 - Explore the history of terminology that defines the threat landscape.
 - Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
 - Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
 - Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
 
Who This Book Is For?New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.