| Format | Paperback |
|---|
The Hidden Potential of DNS In Security: Combating Malware, Data Exfiltration, and more – The Guide for Security Professionals
$36.93 $52.81Save:$16.00(30%)
Available in stock
| Print length: | 166 pages |
|---|---|
| Language: | English |
| Publication date: | 11 July 2023 |
| Dimensions: | 15.24 x 0.99 x 22.86 cm |
| ISBN-10: | 1960940015 |
| ISBN-13: | 978-1960940018 |
People Also Viewed
-
How to Draw Fantasy Art and RPG Maps: Step by Step Cartography for Gamers and Fans
$23.40 $34.20 -
Food & Drink: Coloring Book with Easy and Bold Designs for Adults, Beginners, and Kids, Simple Illustrations of Food, Snacks, Desserts, Fruits, and Many More to Relax and Boost Creativity
$12.64 $17.17 -
The Master Guide to Drawing Anime: How to Draw Original Characters from Simple Templates: 1
$25.21 $29.64
Description
DNS is a foundational element of network communications. It’s also the starting point for countless cyberattacks. Threat actors abuse DNS to install malware, exfiltrate data, and perpetrate malware threats. Cyber threats that leverage DNS are widespread, sophisticated, and rapidly evolving. DNS is used by over 90 percent of malware and in an ever-growing range of pernicious attacks. However, despite its vulnerabilities, DNS can unlock a hidden world of security capabilities that can help protect today’s highly distributed and cloud-integrated networks. The Hidden Potential of DNS in Security reveals how attackers exploit DNS and how cybersecurity professionals can proactively use DNS to turn the tables and mitigate those threats. Knowing how to leverage the protective capabilities of DNS can give you an unprecedented head start in stopping today’s advanced cyberthreats. This book gives you that knowledge. Written specifically for security practitioners, and including real-world case studies, this book offers a thorough yet easy-to-digest understanding of today’s most urgent and potentially damaging DNS-based cyberthreats, how to mitigate them, and how to leverage your DNS infrastructure to further your security mission. In it, you will discover: Why DNS is inherently vulnerable and why knowledge of DNS is now crucial for security teams How malware uses DNS to avoid detection and communicate with command-and-control (C2) infrastructure How threat actors leverage DNS in executing a broad array of attacks involving look-alike domains, domain generation algorithms, DNS tunneling, data exfiltration, and cache poisoning What DNSSEC is (and is not) and how it works How recently emerging encrypted DNS standards can impact security controls, along with the security advantages they can provide How DNS can be leveraged in Zero Trust architectures How you can improve your security posture using the DNS infrastructure you already have —- ISBN: 9781960940018 | ISBN10: 1960940015 | ISBN-13: 978-1960940018
Reviews (0)
0.0
Review this product
Share your thoughts with other customers
Only logged in customers who have purchased this product may leave a review.
Similar Products
-
-17%Sku: B094NTK2RB
A Dictionary Of Color Combinations Vol.1 and Vol.2 with Japanese Traditional Colors Chart
$65.80$79.22 -
-25%Sku: 0997799374
The Drawing Book for Kids: 365 Daily Things to Draw, Step by Step (Woo! Jr. Kids Activities Books)
$12.40$16.54 -
-24%
-
-26%Sku: 1925968782
Memento Mori and Depictions of Death: An Image Archive for Artists and Designers
$24.30$32.91 -
-25%Sku: 1035403633
Down with the System: The highly-awaited memoir from the System Of A Down legend
$31.49$41.89







Reviews
There are no reviews yet.