Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Defeat Advanced Malware: New Tools for Protection and Forensics
How to Defeat Advanced Malware: New Tools for Protection and Forensics
How to Defeat Advanced Malware: New Tools for Protection and Forensics
Ebook91 pages39 minutes

How to Defeat Advanced Malware: New Tools for Protection and Forensics

Rating: 0 out of 5 stars

()

Read preview

About this ebook

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.

How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

  • Learn the basics of protecting your company's online-accessible assets
  • Discover strategies that take advantage of micro-virtualization and BYOD
  • Become adept at comparing and utilizing different endpoint security products and strategies
LanguageEnglish
Release dateDec 5, 2014
ISBN9780128027530
How to Defeat Advanced Malware: New Tools for Protection and Forensics
Author

Henry Dalziel

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Read more from Henry Dalziel

Related to How to Defeat Advanced Malware

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for How to Defeat Advanced Malware

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    How to Defeat Advanced Malware - Henry Dalziel

    How to Defeat Advanced Malware

    New Tools for Protection and Forensics

    Henry Dalziel

    Table of Contents

    Cover

    Title page

    Copyright

    Author Biography

    Contributing Editor Biography

    Chapter 1: A Primer on Detection for Security

    Abstract

    1.1. Today’s approach: compromise-first detection

    Chapter 2: 2014 Endpoint Exploitation Trends

    Abstract

    2.1. Zero-day trends

    2.2. Notable zero-day exploitation techniques

    2.3. Emerging zero-day exploitation techniques

    Chapter 3: The Proposed Solution

    Abstract

    3.1. The principle of least privilege

    3.2. Detection’s folly

    Chapter 4: Protection’s Weak Link

    Abstract

    4.1. Desktop virtualization does not secure the endpoint

    4.2. Detection and isolation using VMs

    Chapter 5: Micro-Virtualization

    Abstract

    5.1. Related work

    5.2. A practical example

    5.3. Hardware-enforced task isolation

    5.4. Hardware virtualization technology

    5.5. Micro-virtualization at work

    5.6. The microvisor

    5.7. Memory and CPU isolation

    5.8. Virtualized file system (VFS)

    5.9. Virtualized IP networking – the mobile SDN

    5.10. Virtualized desktop services

    5.11. Creation and management of micro-VMs

    5.12. Reducing the attack surface

    Chapter 6: Advanced Forensics and Analysis

    Abstract

    6.1. Micro-VM behavioral analysis

    6.2. Advanced live forensics

    6.3. LAVA architecture

    6.4. Conclusion

    Copyright

    Syngress is an imprint of Elsevier

    225 Wyman Street, Waltham, MA 02451, USA

    Copyright © 2015 Elsevier Inc. All rights reserved.

    No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

    This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

    Notices

    Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

    To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

    British Library Cataloguing-in-Publication Data

    A catalogue record for this book is available from the British Library.

    Library of Congress Cataloging-in-Publication Data

    A catalog record for this book is available from the Library of Congress.

    ISBN: 978-0-12-802731-8

    For information on all Syngress publications visit our website at http://store.elsevier.com/

    Author Biography

    Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger, and e-book author. He writes for the blog "Concise-Courses.com" and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content (books and courses) for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment’s (UKTI) Global Entrepreneur Programme (GEP).

    Contributing Editor Biography

    Simon Crosby is cofounder and CTO at Bromium and The

    Enjoying the preview?
    Page 1 of 1