Cybersecurity A Practical Engineering Approach 1st Edition by Henrique Santos – Ebook PDF Instant Download/Delivery. 9781000562491 ,1000562492
Full download Cybersecurity A Practical Engineering Approach 1st Edition after payment
Product details:
ISBN 10: 1000562492
ISBN 13: 9781000562491
Author: Henrique Santos
Cybersecurity A Practical Engineering Approach 1st Edition Table of contents:
Chapter 1 ◾ Cybersecurity Fundamentals
1.1 Summary
1.2 Introduction
1.3 Problem statement and chapter exercise description
1.4 Information Security Model based on ISO/IEC 27001
1.4.1 Main Information Security Properties
1.4.2 Resource or Asset
1.4.3 Security Events and Incidents
1.4.4 Threats
1.4.5 Attack
1.4.6 Vulnerability
1.4.7 Security Controls
1.4.8 Cybersecurity Risk
1.4.9 InfoSec Model Implementation
1.5 Risk Assessment Basis
1.5.1 Risk Analysis
1.5.2 Risk Evaluation
1.6 Security Controls
1.7 Exercises
1.8 Information Security Evaluation
1.8.1 Security Metrics and Measurements
1.8.1.1 The Effect of Maturity
1.8.1.2 Details about metrics
1.9 Cybersecurity Lab Requirements and Implementation
1.9.1 Host Machine
1.9.2 Virtualization Platform
1.9.3 Network Issues
1.9.4 External Interface and Integration Issues
Chapter 2 ◾ Access Control Techniques
2.1 Summary
2.2 Problem Statement and Chapter Exercise Description
2.3 Access Control fundamentals
2.3.1 Basic Components
2.4 Access Control Models
2.4.1 Specification Languages
2.4.2 Bell-Lapadula Model
2.4.3 Biba Model
2.4.4 Clark-Wilson Model
2.4.5 Chinese Wall Model
2.4.6 Lattices for Multilevel Models
2.5 Network Access Control
2.5.1 RADIUS
2.5.2 TACACS+
2.5.3 802.1X Authentication
2.5.4 Kerberos
2.6 Exercises
2.7 Authentication Modalities
2.7.1 Knowledge-Based
2.7.2 Token-Based
2.7.3 ID-Based (Biometrics)
2.7.4 Multimodal Authentication
2.8 Identity Management
2.8.1 A Framework for IdM in Cyberspace
Chapter 3 ◾ Basic Cryptography Operations
3.1 Summary
3.2 Problem Statement and Chapter Exercise Description
3.3 Concepts and Terminology
3.3.1 Key-Based Algorithms
3.3.1.1 Symmetric Key Algorithms
3.3.1.2 Public-Key Algorithms
3.3.1.3 Attack Types
3.3.2 Hash Functions
3.3.3 Digital Signatures
3.3.4 Key Management Issues
3.3.5 Email Security Protocols
3.3.6 Public-Key Infrastructures (PKI)
3.4 PKI Tools
3.5 Exercises
3.5.1 Basic Tasks
3.5.2 Advanced Tasks
Chapter 4 ◾ Internet and Web Communication Models
4.1 Summary
4.2 Computer Network Fundamentals
4.2.1 Link Level
4.2.2 Network Level
4.2.2.1 ICMP protocol
4.2.2.2 Security issues at the link level
4.2.3 Transport Level
4.2.3.1 TCP
4.2.3.2 UDP
4.2.3.3 Security issues at the transport level
4.2.4 Application Level
4.3 Problem Statement and Chapter Exercise Description
4.4 Network Analysis Tools
4.5 Network Traffic Anomaly Signs
4.6 Analysis strategy
4.7 Exercises
Chapter 5 ◾ Synthesis of Perimeter Security Technologies
5.1 Summary
5.2 Preliminary considerations
5.2.1 Defense in Depth
5.3 Problem statement and chapter exercise description
5.4 Firewalls
5.4.1 Netfilter/Iptables – Where It All Begins
5.4.2 Iptables – Looking into the Future
5.4.3 Firewall Types
5.5 Exercise – Firewall
5.5.1 Summary of Tasks
5.5.2 Basic Tasks
5.5.3 Advanced Tasks
5.6 Intrusion detection systems (IDS)
5.6.1 IDS Types
5.6.2 IDS Evaluation
5.7 Exercise – Intrusion Detection
5.7.1 Summary of Tasks
5.7.2 Basic Tasks
5.7.3 Advanced Tasks
5.7.4 Recommended Complementary Tasks
5.8 Network and Transport Security Protocols
5.8.1 VPNs
5.8.2 TLS/SSL
5.8.3 SSH
5.8.4 IPSec
5.9 Exercise – Security Protocols
Chapter 6 ◾ Anatomy of Network and Computer Attacks
6.1 Summary
6.2 Introduction to Pentest
6.2.1 Types of Pentest
6.2.2 Pentest Limitations
6.3 Problem statement and chapter exercise description
6.4 Introduction to Kali Linux
6.5 Information gathering
6.6 Scanning ports and services
6.7 Vulnerability Scanning
6.8 Target enumeration
6.9 Target exploitation
6.10 Exercises
Bibliography
People also search for Cybersecurity A Practical Engineering Approach 1st Edition:
cybersecurity a practical guide to the law of cyber risk
practical cybersecurity architecture
practical cybersecurity
a cyber analyst is drafting a memorandum