Book description
A must-have, hands-on guide for working in the cybersecurity profession
Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration.
Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills
Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations
Delves into network administration for Windows, Linux, and VMware
Examines penetration testing, cyber investigations, firewall configuration, and security tool customization
Shares techniques for cybersecurity testing, planning, and reporting
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- About the Author
- About the Technical Editor
- Credits
- Acknowledgments
- Contents at a Glance
- Contents
- Introduction
-
Part I: Cyber Network Security Concepts
-
Chapter 1: Executive Summary
- Why Start with Antipatterns?
- Security Architecture
- Antipattern: Signature-Based Malware Detection versus Polymorphic Threats
- Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection
- Antipattern: Document-Driven Certification and Accreditation
- Antipattern: Proliferating IA Standards with No Proven Benefits
- Antipattern: Policy-Driven Security Certifications Do Not Address the Threat
- Refactored Solution: Security Training Roadmap
- Summary
- Assignments
- Chapter 2: The Problems: Cyber Antipatterns
-
Chapter 3: Enterprise Security Using the Zachman Framework
- What Is Architecture? Why Do We Need It?
- Enterprises Are Complex and Changing
- The Zachman Framework for Enterprise Architecture
- Primitive Models versus Composite Models
- How Does the Zachman Framework Help with Cybersecurity?
- Everyone Has Their Own Specifications
- The Goldmine Is in Row 2
- Frameworks for Row 3
- Architectural Problem Solving Patterns
- Summary
- Assignments
-
Chapter 1: Executive Summary
-
Part II: Cyber Network Security Hands-On
-
Chapter 4: Network Administration for Security Professionals
- Managing Administrator and Root Accounts
- Installing Hardware
- Re-Imaging Operating Systems
- Burning and Copying CDs and DVDs
- Installing System Protection / Anti-Malware
- Setting Up Networks
- Installing Applications and Archiving
- Customizing System Management Controls and Settings
- Managing Remote Login
- Managing User Administration
- Managing Services
- Mounting Disks
- Moving Data Between Systems on Networks
- Converting Text Files Between OSes
- Making Backup Disks
- Formatting Disks
- Configuring Firewalls
- Converting and Migrating VMs
- Additional Network Administration Knowledge
- Summary
- Assignments
- Chapter 5: Customizing BackTrack and Security Tools
- Chapter 6: Protocol Analysis and Network Programming
- Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing
-
Chapter 8: Penetration Testing
- Forms of Cyber Attacks
- Network Penetration
- Commercial Pen Testing Tools
- Using Netcat to Create Connections and Move Data and Binaries
- Using Netcat to Create Relays and Pivots
- Using SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks
- Collecting User Identities with Enumeration and Hash Grabbing
- Password Cracking
- Privilege Escalation
- Final Malicious Phases
- Summary
- Assignments
-
Chapter 9: Cyber Network Defense Using Advanced Log Analysis
- Introduction to Cyber Network Defense
- General Methods and Tools for Cyber Investigations
- Continuous Cyber Investigation Strategy
- A Summary of the Cyber Investigation Process
- Network Monitoring
- Text Log Analysis
- Binary Log Analysis
- Reporting Cyber Investigations
- Elimination of Cyber Threats
- Intrusion Discovery on Windows
- Summary
- Assignments
-
Chapter 4: Network Administration for Security Professionals
-
Part III: Cyber Network Application Domains
-
Chapter 10: Cybersecurity for End Users, Social Media, and Virtual Worlds
- Doing an Ego Search
- Protecting Laptops, PCs, and Mobile Devices
- Staying Current with Anti-Malware and Software Updates
- Managing Passwords
- Guarding Against Drive-By Malware
- Staying Safe with E-mail
- Securely Banking and Buying Online
- Understanding Scareware and Ransomware
- Is Your Machine p0wned?
- Being Careful with Social Media
- Staying Safe in Virtual Worlds
- Summary
- Assignments
- Chapter 11: Cybersecurity Essentials for Small Business
- Chapter 12: Large Enterprise Cybersecurity: Data Centers and Clouds
- Chapter 13: Healthcare Information Technology Security
- Chapter 14: Cyber Warfare: An Architecture for Deterrence
-
Chapter 10: Cybersecurity for End Users, Social Media, and Virtual Worlds
- Glossary
- Bibliography
- Index
Product information
- Title: Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
- Author(s):
- Release date: November 2013
- Publisher(s): Wiley
- ISBN: 9781118697115
You might also like
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of …
book
Software Security: Building Security In
"When it comes to software security, the devil is in the details. This book tackles the …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …