Search icon CANCEL
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Hands-On Cybersecurity with Blockchain.

You're reading from  Hands-On Cybersecurity with Blockchain.

Product type Book
Published in Jun 2018
Publisher
ISBN-13 9781788990189
Pages 236 pages
Edition 1st Edition
Languages
Concepts
Author (1):
Rajneesh Gupta Rajneesh Gupta
Profile icon Rajneesh Gupta

Table of Contents (17) Chapters

Title Page
About Packt
Contributors
Preface
1. Cyber Threat Landscape and Security Challenges 2. Security Must Evolve 3. Introducing Blockchain and Ethereum 4. Hyperledger – Blockchain for Businesses 5. Blockchain on the CIA Security Triad 6. Deploying PKI-Based Identity with Blockchain 7. Two-Factor Authentication with Blockchain 8. Blockchain-Based DNS Security Platform 9. Deploying Blockchain-Based DDoS Protection 10. Facts about Blockchain and Cyber Security 1. Assessment 2. Other Books You May Enjoy Index

Chapter 2. Security Must Evolve

After understanding most of the critical aspects of the threat landscape, it's time to change the way we look at cybersecurity. The endless variety of malware has the capability of being persistent, hidden, self-destructive, and can bypass traditional security systems by behaving like a legitimate user, making defenders adopt a new security approach to achieve a better cyber posture. In this chapter, we will understand the different approaches adopted by defenders to combat advanced threats and to strengthen cybersecurity systems.

This chapter will introduce some of the most widely used security practices deployed, from network perimeters to server farms. This chapter will also explore insights on the zero-trust security approach and the breach-acceptance security approach.

In this chapter, you will learn about the following topics:

  • The security ecosystem
  • The zero-trust approach
  • The assume breach approach
  • Evolution at the foundation layer
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}