<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft
Cybersecurity and Identity Access Management
â Scribed by Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 240
- Edition
- 1st ed. 2023
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. Â
⌠Table of Contents
Preface
Contents
1 Cybersecurity for Beginners
1.1 Introduction to Cybersecurity
1.2 Necessity of Cybersecurity
1.3 Cybersecurity Challenges
1.4 Cybersecurity Threats
1.5 Cyberattack Life Cycle
1.6 Cybersecurity Principles
1.7 Cybersecurity Standards
1.8 Cybersecurity Framework
1.9 Fundamentals of Cybersecurity
1.10 Why is Cybersecurity Important?
1.10.1 Confidentiality
1.10.2 Integrity
1.10.3 Availability
1.11 Why Do We Implement Cybersecurity?
1.12 Cybersecurity Attacks and Their Types
1.12.1 Malware Attack
1.12.2 Phishing Attacks
1.12.3 Denial-of-Service Attacks
1.12.4 SQL Injection Attacks
1.12.5 Cross-Site Scripting
1.12.6 Man-In-The-Middle Attacks
1.13 Cybersecurity Development
1.14 Advantages of Cyber Security
1.15 Applications of Cybersecurity
2 The Basics of Hacking and Penetration Testing
2.1 Hacking Introduction
2.2 Ethical Hacking
2.3 Types of Cybercrime
2.4 Denial-of-Service Attacks (DoS)
2.5 Penetration Testing
2.5.1 Penetration Testing Versus Vulnerability Assessment
2.5.2 Types of Penetration Testing
2.5.3 Penetration TestingâManual and Automated
2.5.4 Penetration Testing Tools
2.5.5 Infrastructure Penetration Testing
2.5.6 Penetration TestingâTester
2.5.7 Penetration TestingâReport Writing
2.5.8 Penetration TestingâEthical Hacking
2.5.9 Penetration Testing Limitations
3 Hacking for Dummies
3.1 Security Hacker
3.2 Classifications of Hacker
3.3 Common Hacking Tools
3.4 Common Hacking Techniques
3.4.1 Ethical Hacking
3.5 Developing Ethical Hacking Plan
3.6 Types of Security Testing
3.7 Ethical Hacking Tools
3.8 Physical Security
3.9 Risk Assessment
4 Networking All-In-One for Dummies
4.1 Network Introduction
4.2 Packet Network
4.3 Topology of Network
4.3.1 Types of Topologies
4.4 Operating System for the Network
4.5 Hardware Networking
4.5.1 Range of the Network Hardware
4.5.2 Computer Components of the Necessary Hardware
4.6 Network Setup
4.7 The Function of Prediction
4.8 Network Security
4.9 Defense Against Computers
4.10 Sharing of the Network
4.10.1 Operation of Network Sharing
4.11 Goals and Competences
4.11.1 Appearances of Problem-Solving
5 Effective Cybersecurity
5.1 Attacks and Vulnerabilities
5.2 Community of Security of Information
5.3 Cybersecurity Managed
5.4 Network Security Governance Framework
5.5 Risk Assessment of Structures
5.6 Security Evaluation Aim
5.6.1 Methodological Approach
5.6.2 Checking for Protection
5.6.3 Protection and Privacy
5.7 Evaluation of Risk
5.8 Study of the Cyber Danger
5.9 Risk Evaluation Forms
5.10 Safety for Software Development
5.11 Strike Cyber
5.12 Facts
6 Malware
6.1 What Does Malware Do?
6.2 How to Protect Against Malware?
6.3 Malware Analyzing Tools
6.3.1 Basic Malware Exploring Tools
6.3.2 Dynamic Malware Analyzing Tools
6.3.3 Difference Between Static and Dynamic Malware Analysis Tools
6.3.4 Warning Signs to Identify Malware Infection
6.4 Most Dangerous Malware of 2018
6.4.1 Malware Detection Techniques Used by Antivirus
6.4.2 Tips to Prevents the System from Malware Actions
7 Firewalls
7.1 Importance of Firewalls
7.2 Uses of Firewalls
7.3 How Does Firewall Works
7.4 Types of Firewall
7.5 Benefits of Firewalls
7.6 Advantages and Disadvantages of Firewalls
7.7 Firewall Threats and Vulnerability
8 Cryptography
8.1 Evaluation of Cryptography
8.2 Features of Cryptography
8.3 Types of Cryptography
8.4 Cryptography and Network Security Principles
8.5 Cryptographic Algorithms
8.6 Tools for Cryptography
8.7 Advantages and Disadvantages of Cryptography
8.8 Applications of Cryptography
9 Control Physical and Logical Access to Assets
9.1 Managing Access to Assets
9.2 Why Access Control is Required: The CIA Triad
9.3 Classification of Access Control
9.3.1 Preventive Access Control
9.3.2 Detective Access Control
9.3.3 Corrective Access Control
9.3.4 Deterrent Access Control
9.3.5 Recovery Access Control
9.3.6 Directive Access Control
9.3.7 Compensation Access Control
9.3.8 Administrative Access Controls
9.3.9 Logical/Technical Controls
9.3.10 Physical Access Controls
10 Manage the Identification and Authentication of People, Devices, and Services
10.1 Registration and Identity Proofing
10.2 Authorization and Accountability
10.3 Effective Password Mechanisms
11 Integrate Identity as a Third-Party Service
11.1 Identity Management Techniques
11.2 Credential Management Systems
12 Implement and Manage Authorization Mechanisms
13 Managing the Identity and Access Provisioning Life Cycle
14 Conduct Security Control Testing
15 Collect Security Process Data
16 Recovery Strategies for Database
17 Analyze Test Output and Generate a Report
18 Ensure Appropriate Asset Retention
19 Determine Information and Security Controls
References
đ SIMILAR VOLUMES
<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft
<p><span>This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft
This book presents a process-based approach to implementing Oracleâs Identity and Access Management Suite. Learn everything from basic installation through to advanced topics such as leveraging Oracle Virtual Directory and Identity Federation. Also covered is integrating with applications such as Or
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. It provides deta
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t