Cybersecurity: A Practical Engineering Approach

Автор: literator от 4-10-2022, 13:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cybersecurity: A Practical Engineering ApproachНазвание: Cybersecurity: A Practical Engineering Approach
Автор: Henrique M. D. Santos
Издательство: CRC Press
Серия: Chapman & Hall/CRC Textbooks in Computing
Год: 2022
Страниц: 341
Язык: английский
Формат: pdf (true), epub
Размер: 16.9 MB

Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive.

Cybersecurity is becoming a central issue to any Information System utilization, affecting everything we interact with nowadays. In a simple way, it starts with the identification of security properties we want to preserve, the main threats that can affect those properties, the weaknesses of the target system, and the techniques and procedures we can use to mitigate those threats.

Kerberos is a network authentication protocol, aiming to achieve strong authentication using secret-key cryptography, in a local network environment with shared services. In fact, it embraces several sub protocols to accomplish that goal. Among the requirements, we can highlight: i) to avoid user impersonation; ii) to promote information confidentiality; and iii) to allow users to sign in once to have granted access to all authorized shared resources. Kerberos is an open-source project, being the base of several commercial and non-commercial solutions to deploy AC at the local network level (including Windows Active Directory).

Pentest (short for Penetration Test, and also referred to by Ethical Hacking) is a fundamental activity in Cybersecurity, aiming to test a computerized system against possible failures resulting from simulated malicious activity. If performed correctly, it allows to find vulnerabilities and, in case they exist, to what extent they can be explored. Contrarily to all techniques discussed so far, Pentest cannot even be classified as a security control but, instead, a security evaluation function. Organizations decide to perform such activity whenever i) performing am InfoSec auditing, or ii) measuring the efficacy of some defense mechanism.

Contents:
Preface
Chapter 1 - Cybersecurity Fundamentals
Chapter 2 - Access Control Techniques
Chapter 3 - Basic Cryptography Operations
Chapter 4 - Internet and Web Communication Models
Chapter 5 - Synthesis of Perimeter Security Technologies
Chapter 6 - Anatomy of Network and Computer Attacks
6.1 Summary
6.2 Introduction to Pentest
6.3 Problem statement and chapter exercise description
6.4 Introduction to Kali Linux
6.5 Information gathering
6.6 Scanning ports and services
6.7 Vulnerability Scanning
6.8 Target enumeration
6.9 Target exploitation
6.10 Exercises
Bibliography
Index

Скачать Cybersecurity: A Practical Engineering Approach




ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.