Book description
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence
Table of contents
- Front Cover
- Infosecurity 2008 Threat Analysis
- Copyright Page (1/2)
- Copyright Page (2/2)
- Contents (1/2)
- Contents (2/2)
- Foreword
- Part I: Botnets
-
Part II: Cross Site Scripting Attacks
- Chapter 3. Cross-site Scripting Fundamentals
-
Chapter 4. XSS Theory
- Introduction
- Getting XSS'ed
- DOM-based XSS in Detail (1/3)
- DOM-based XSS in Detail (2/3)
- DOM-based XSS in Detail (3/3)
- Redirection (1/2)
- Redirection (2/2)
- CSRF
- Flash, QuickTime, PDF, Oh My (1/6)
- Flash, QuickTime, PDF, Oh My (2/6)
- Flash, QuickTime, PDF, Oh My (3/6)
- Flash, QuickTime, PDF, Oh My (4/6)
- Flash, QuickTime, PDF, Oh My (5/6)
- Flash, QuickTime, PDF, Oh My (6/6)
- HTTP Response Injection
- Source vs. DHTML Reality (1/2)
- Source vs. DHTML Reality (2/2)
- Bypassing XSS Length Limitations
- XSS Filter Evasion (1/6)
- XSS Filter Evasion (2/6)
- XSS Filter Evasion (3/6)
- XSS Filter Evasion (4/6)
- XSS Filter Evasion (5/6)
- XSS Filter Evasion (6/6)
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 5. XSS Attack Methods
-
Part III: Physical and Logical Security Convergence
-
Chapter 6. Protecting Critical Infrastructure: Process Control and SCADA
- Introduction
- Technology Background: Process Control Systems (1/3)
- Technology Background: Process Control Systems (2/3)
- Technology Background: Process Control Systems (3/3)
- Why Convergence?
- Threats and Challenges (1/5)
- Threats and Challenges (2/5)
- Threats and Challenges (3/5)
- Threats and Challenges (4/5)
- Threats and Challenges (5/5)
- Conclusion
- Chapter 7. Final Thoughts
-
Chapter 6. Protecting Critical Infrastructure: Process Control and SCADA
-
Part IV: PCI Compliance
- Chapter 8. Why PCI Is Important
-
Chapter 9. Protect Cardholder Data
- Protecting Cardholder Data
- PCI Requirement 3: Protect Stored Cardholder Data (1/2)
- PCI Requirement 3: Protect Stored Cardholder Data (2/2)
- PCI Requirement 4—Encrypt Transmission of Cardholder Data Across Open, Public Networks
- Using Compensating Controls
- Mapping Out a Strategy
- The Absolute Essentials
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Part V: Asterisk and VoIP Hacking
-
Part VI: Hack the Stack
-
Chapter 12. Social Engineering
- Introduction
- Attacking the People Layer
- Defending the People Layer (1/3)
- Defending the People Layer (2/3)
- Defending the People Layer (3/3)
- Making the Case for Stronger Security (1/2)
- Making the Case for Stronger Security (2/2)
- People Layer Security Project
- Summary
- Solutions Fast Track
- Frequently Asked Questions
-
Chapter 12. Social Engineering
- Index (1/6)
- Index (2/6)
- Index (3/6)
- Index (4/6)
- Index (5/6)
- Index (6/6)
Product information
- Title: InfoSecurity 2008 Threat Analysis
- Author(s):
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080558691
You might also like
book
Red Hat® Enterprise Linux® 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
Secrets Stolen, Fortunes Lost
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly …
book
Data Protection and the Cloud: Are the risks too great?
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies …