𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools

✍ Scribed by Abbas Moallem


Publisher
CRC Press
Year
2022
Tongue
English
Leaves
225
Series
The human element in smart and intelligent systems
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Cover
Half Title
Series Page
Title Page
Copyright Page
Contents
Acknowledgments
Introduction
Author
List of Figures
Chapter 1: Cybersecurity Technologies Classification
1.1. Introduction
1.2. Different Categories of Cyber Technologies
1.3. Technology Classification
Chapter 2: Encryption
2.1. Introduction
2.2. Brief Historical Background
2.3. How Encryption Technologies Work
2.4. Encryption Technologies
2.4.1. RSA (Rivest-Shamir-Adleman)
2.4.2. Blowfish Cipher
2.4.3. Data Encryption Standard (Des)
2.4.4. Triple Des (3Des or Tdes)
2.4.5. Twofish
2.5. Advantages and Disadvantages of Blowfish and RSA Encryption
2.5.1. Advantages
2.5.1.1. RSA
2.5.1.2. Blowfish
2.5.2. Disadvantages
2.5.2.1. RSA
2.5.2.2. Blowfish
2.6. Which Products Use Encryptions
2.6.1. Products Using Blowfish
2.6.2. Products Using RSA
2.7. Conclusion
Chapter 3: Authentication
3.1. Introduction
3.2. Brief Historical Background
3.3. How Authentication Technologies Work
3.3.1. Secret Knowledge-Based Authentication
3.3.1.1. Personal Identification Number (PIN) and Password
3.3.1.2. Cognitive Knowledge Question
3.3.1.3. Pattern and Graphical Password
3.3.2. Token-Based Approach
3.3.3. Biometrics
3.3.4. Compound Authentication
3.3.5. Storing Passwords and Usernames
3.4. Authentication Technologies
3.5. Advantages and Disadvantages of Authentication Technoglogies
3.5.1. Advantages
3.5.1.1. Personal Identification Number (PIN) and Password Approach
3.5.1.2. Cognitive Knowledge Question (CKQ)
3.5.1.3. Pattern and Graphical Password
3.5.1.4. Token-Based Passwords
3.5.1.5. Biometric Authentication
3.5.1.6. Compound Authentication
3.5.2. Disadvantages
3.5.2.1. Personal Identification Number (PIN) and Password Approach
3.5.2.2. Cognitive Knowledge Question
3.5.2.3. Pattern and Graphical Passwords
3.5.2.4. Token-Based One-Time Passwords (OTP)
3.5.2.5. Biometric Authentication
3.5.2.6. Compound Authentication
3.6. What Products Use Authentications
3.7. Conclusion
Chapter 4: Biometrics
4.1. Introduction
4.2. Brief Historical Background
4.3. How Biometric Technologies Work
4.3.1. Palm
4.3.2. Fingerprints
4.3.2.1. Optical Scanners
4.3.2.2. Capacitive Scanners
4.3.2.3. Ultrasonic Scanners
4.3.3. Face
4.3.4. IRIS
4.3.5. Voice
4.4. Biometric Technologies
4.5. Biometric Traits Comparison
4.6. Advantages and Disadvantages of Biometric Technologies
4.6.1. Advantages of Using Biometrics
4.6.2. Disadvantages of Using Biometrics
4.7. What Products Use Biometrics
4.7.1. Cars
4.7.2. Banking
4.7.3. Health Care
4.7.4. Food and Beverages
4.7.5. Border Control
4.7.6. Education
4.8. Conclusion
Chapter 5: Firewall Technologies
5.1. Introduction
5.2. Brief Historical Background
5.3. How Firewall Technologies Work
5.4. Firewall Technologies
5.4.1. Stateless Firewalls or Packet-Filtering
5.4.2. Stateful Firewalls or Dynamic Packet Inspection
5.4.3. Application Proxy/Proxy Server Firewalls
5.4.4. Cloud Firewalls
5.5. Advantages and Disadvantages of Firewall Technologies
5.5.1. Advantages
5.5.2. Disadvantages
5.6. Conclusion
Chapter 6: Virus Detection
6.1. Introduction
6.2. Brief Historical Background
6.3. How Virus Detection Technologies Work
6.3.1. Virus Scanning and Detection Process
6.4. Virus Detection Technologies
6.4.1. Sandbox Detection
6.4.2. Data Mining Techniques
6.4.3. Signature-Based Detection
6.4.4. Heuristic Detection
6.4.5. Real-Time Protection
6.5. Advantages and Disadvantages of Virus Detection Technologies
6.5.1. Advantages
6.5.2. Disadvantages
6.6. Approaches Used in Virus Detection
6.7. Conclusion
Chapter 7: Phishing Detection
7.1. Introduction
7.2. Brief Historical Background
7.3. How Phishing Detection Technologies Work
7.4. Phishing Detection Technologies
7.4.1. Visual Similarity-Based Phishing Detection
7.4.2. Blacklist-Based Phishing Detection
7.4.3. Web Crawling-Based Phishing Attack Detection
7.5. Advantages and Disadvantages of Phishing Detection Technologies
7.5.1. Advantages
7.5.1.1. Visual Similarity-Based Phishing Detection
7.5.1.2. Blacklist-Based Phishing Detection
7.5.1.3. Web Crawling-Based Phishing Attack Detection
7.5.2. Disadvantages
7.5.2.1. Visual Similarity-Based Phishing Detection
7.5.2.2. Blacklist-Based Phishing Detection
7.5.2.3. Web Crawling-Based Phishing Attack Detection
7.6. What Products Use Phishing Detection
7.6.1. Blacklist-Based Phishing Detection
7.7. Conclusion
Chapter 8: Endpoint Protection
8.1. Introduction
8.2. Brief Historical Background
8.2.1. Traditional Antivirus
8.2.2. Endpoint Detection and Response (Edr)
8.2.3. Next-Generation Antivirus Software (NGAV)
8.2.4. Operating System (OS) Centric Security
8.3. How Endpoint Protection Technologies Work
8.3.1. Antivirus
8.3.1.1. Signature
8.3.1.2. Behavioral Detection
8.3.1.3. Machine Learning
8.3.2. Secure Email Gateways (Segs)
8.4. Endpoint Protection Technologies
8.4.1. Antivirus Solutions
8.4.2. Endpoint Detection and Response
8.4.3. Secure Email Gateways
8.5. Advantages and Disadvantages of Endpoint Protection Technologies
8.5.1. Antivirus Solutions
8.5.1.1. Advantages
8.5.1.2. Disadvantages
8.5.2. Endpoint Detection and Response
8.5.2.1. Advantages
8.5.2.2. Disadvantages
8.5.3. Secure Email Gateways
8.5.3.1. Advantages
8.5.3.2. Disadvantages
8.6. What Products Use Endpoint Protection
8.6.1. Antivirus Solutions
8.6.2. Endpoint Detection and Response
8.6.3. Secure Email Gateways
8.7. Conclusion
Chapter 9: Malware Protection Technology
9.1. Introduction
9.2. Brief Historical Background
9.3. How Malware Protection Technologies Work
9.3.1. Heuristic Analysis
9.3.2. Signature-Based Safety
9.3.3. Host-Based Intrusion Prevention Systems
9.4. Malware Protection Technologies
9.4.1. Main Category of Malware Detection Technology
9.4.1.1. Heuristic Analysis
9.4.1.2. Signature-Based Security
9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS)
9.5. Advantages and Disadvantages of Malware Protection
9.5.1. Advantages
9.5.1.1. Heuristic Analysis
9.5.1.2. Signature-Based Protection
9.5.1.3. Host-Based Intrusion Prevention Systems
9.5.2. Disadvantages
9.5.2.1. Heuristic Analysis
9.5.2.2. Signature-Based Protection
9.5.2.3. Host-Based Intrusion Prevention Systems
9.6. What Products Use Malware Protection
9.7. Conclusion
Chapter 10: The Internet of Things (IoT)
10.1. Introduction
10.2. Brief Historical Background
10.3. How IoT Technologies Work
10.3.1. End-to-End Platform
10.3.2. Connectivity Platform
10.3.3. Cloud and Data Platforms
10.4. Iot Security Technologies
10.4.1. Securing IoT Devices
10.4.2. Smart Device Protection Technologies
10.4.2.1. Host Identity Protocol (HIP)
10.4.2.2. Hip Diet Exchange
10.4.2.3. Intrusion Detection and Mitigation Framework
10.4.2.4. Intrusion Detection System
10.4.2.5. Openflow
10.4.2.6. Software-Defined Networking
10.5. Advantages and Disadvantages of IoT Security Technologies
10.5.1. Advantages
10.5.2. Disadvantages
10.6. What Products Use IoT Technologies
10.7. Conclusion
Chapter 11: Network Security
11.1. Introduction
11.2. Brief Historical Background
11.3. How Network Security Technologies Work
11.3.1. Firewall
11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention
11.3.3. Wi-Fi Protected Access 3 (WPA3)
11.4. Network Security Technologies
11.4.1. Firewalls
11.4.2. Email Security
11.4.3. Antivirus and Antimalware Software
11.4.4. Virtual Private Network (VPN)
11.4.5. Intrusion Prevention Systems (IDS)
11.5. Advantages and Disadvantages of Network Security
11.5.1. Advantages of Network Security
11.5.2. Disadvantages of Network Security
11.6. Which Products Use Network Security
11.6.1. Banks/Financial Institutions
11.6.2. Hospitals/Medical Institutions
11.6.3. Cloud Computing
11.6.4. Use of Network Security Technologies
11.6.5. Firewalls
11.6.6. Antivirus
11.6.7. Security Information and Event Management
11.7. Conclusion
Chapter 12: Location Tracking
12.1. Introduction
12.2. Brief Historical Background
12.3. How Location Tracking Technologies Work
12.3.1. Uses of GPS Technology
12.4. Location Tracking Technologies
12.4.1. GPS Technology
12.4.2. Radio Frequency Identification
12.4.3. Internet Tracking
12.4.4. Advantages and Disadvantages of Location Tracking
12.4.4.1. Advantages of Location Tracking
12.4.4.2. Disadvantages of Location Tracking
12.5. Which Products Use Location Tracking
12.6. Conclusion
Chapter 13: Surveillance
13.1. Introduction
13.2. Brief Historical Background
13.3. How Surveillance Technology Works
13.3.1. Video Surveillance and Crime
13.4. Surveillance Technologies
13.4.1. Computer
13.4.2. Telephones
13.4.3. Aerial Surveillance
13.5. Advantages and Disadvantages of Surveillance Technologies
13.5.1. Advantages
13.5.2. Disadvantages
13.6. Which Products Use Surveillance
13.7. Conclusion
Chapter 14: Insider Threat Protection
14.1. Introduction
14.2. Brief Historical Background
14.3. How Insider Threat Protection Technologies Work
14.4. Insider Threat Detection Technologies
14.4.1. Data Loss Prevention
14.4.2. Email Security Applications
14.4.3. Privileged Access Management (Pam)
14.5. User Activity Monitoring and Behavior Analytics
14.6. Advantages and Disadvantages of Insider Threat Detection
14.6.1. Advantages
14.6.2. Disadvantages
14.7. Conclusion
Chapter 15: Intrusion Detection
15.1. Introduction
15.2. Brief Historical Background
15.3. How Intrusion Detection Technologies Work
15.3.1. Network-Based Intrusion Prevention System
15.3.2. Host Intrusion Detection Systems
15.4. Intrusion Detection Technologies
15.5. Advantages and Disadvantages of Intrusion Detection Systems
15.5.1. Advantages
15.5.1.1. Network-Based Intrusion Prevention System
15.5.1.2. Host Intrusion Detection Systems
15.5.2. Disadvantages
15.5.2.1. Network-Based Intrusion Prevention System
15.5.2.2. Host Intrusion Detection Systems
15.6. Which Products to Use for Intrusion Detection
15.7. Conclusion
Chapter 16: Vulnerability Scanning
16.1. Introduction
16.2. Brief Historical Background
16.3. How Vulnerability Scanning Technologies Work
16.3.1. Public VS Applications
16.3.1.1. System Weakness Scanning
16.3.1.2. Vulnerability Classification
16.3.2. Web VS Applications
16.3.3. Internal VS Tools
16.4. Vulnerability Scanning Technologies
16.4.1. Public VS
16.4.2. Web VS
16.4.3. Internal VS
16.5. Advantages and Disadvantages of Vulnerability Scanning
16.5.1. Advantages
16.5.2. Disadvantages
16.5.3. Conclusion
Chapter 17: Penetration Testing
17.1. Introduction
17.2. Brief Historical Background
17.3. How Penetration Testing Technologies Work
17.4. Penetration Testing Technologies
17.4.1. Application Scanners
17.5. Advantages and Disadvantages of Penetration Testing
17.5.1. Advantages of Penetration Testing
17.5.2. Disadvantages of Penetration Testing
17.6. Conclusion
Chapter 18: Conclusion
Glossary
References
Index


πŸ“œ SIMILAR VOLUMES


CyberSecurity Demystified: A compact ref
✍ Peter Theobald πŸ“‚ Library 🌐 English

<span>Cybersecurity has become a complex field with a huge number of technologies, products and services. This book demystifies cybersecurity with an overview of the key concepts in easy-to-understand language. It will be helpful to non-technical business leaders, cybersecurity practitioners who wan

Cybersecurity: The Hacker Proof Guide To
✍ Trust Genics πŸ“‚ Library πŸ“… 2020 πŸ› Thomas William 🌐 English

<p><strong>Cybersecurity Issues Challenge Literally Everyone</strong></p><p>In today's connected world, everyone benefits from cybersecurity</p><p>Cyberattacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data, extort money or

Practical Cybersecurity Architecture: A
✍ Ed Moyle, Diana Kelley πŸ“‚ Library πŸ“… 2020 πŸ› Packt Publishing 🌐 English

<p><b>Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop</b></p><h4>Key Features</h4><ul><li>Leverage practical use cases to successfully architect complex security structures</li><li>Learn risk assessment methodologies f

Practical Cybersecurity Architecture: A
✍ Diana Kelley, Ed Moyle πŸ“‚ Library πŸ“… 2023 πŸ› Packt Publishing 🌐 English

<p><span>Plan, design, and build resilient security architectures to secure your organization’s hybrid networks, cloud-based workflows, services, and applications </span></p><h4><span>Key Features</span></h4><ul><li><span><span>Understand the role of the architect in successfully creating complex se