Secured Systems By Design
Technology systems are threatened by inside and outside actors. Secured systems by design, allow administrators to sleep comfortably at night. Online retailing has displaced in-store shopping as the method of choice for consumer goods. Computer security, also called cybersecurity, is the protection of computer systems from harm, theft, and unauthorized access. Computer hardware is protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms.
Some of the most common risks to the security of a computer include malware infections and phishing attacks. The most egregious attacks were made possible by weak passwords, unpatched software vulnerabilities, and social engineering. Some major risks include data breaches, insider threats, and denial-of-service attacks. By far, the target of hackers is the companies private data.
The book presents the industry's best practices for securing the complete technology stack. The tech stack is divided into pillars and their unique security requirements. Coordinating activities between actors for each pillar is challenging and the book highlights actual experiences performed by the staff responsible for those pillars. The commonality is to provide a system hardened against attacks auditors cannot complain about.
Building Secured Systems By Design
Writing this book was an eye-opening experience. What became obvious is this topic could have been broken up into multiple books. Each vendor's platform in the tech stack has its own expectations requiring admins to take specific guidance. The true value of this book is it provides a roadmap for managing IT systems. The number of pages in the book was capped at 1000 pages.
The link below takes you to a viewer where you can see what gets covered in the book. The book is complete and the real-world examples of actual hacks and their prevention methods highlight errors made by admins.. Also included in the book is a section for retrofitting existing systems. What I observed in the industry is how difficult patching online systems can be and many companies push it off. Pushing off maintenance was the reason systems have been hacked. This is covered in detail and real-live examples have been provided for dealing with his scenario. Please give the book a look, it truly has something for everyone.