Book description
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Authors
- 1 Introduction to Security Threats
-
2 The 2014–2015 Anthem Blue Cross and Blue Shield Break-In Case Study
- Step 1: Reconnaissance
- Step 2: Picking the Right Target and Spear Phishing Them
- Step 3: Initial System Entry
- Next Steps to Establish an Undetectable Anonymous Persistent Presence
- Password Decryption Process and Equipment
- Testbed
- Final Steps
- Tools Used by Hackers to Acquire Valid Entry Credentials and Tools Used by Security Personnel to Detect Activity and Malware and Protect the Stored Data
- 3 Anonymous Persistent Threats
- 4 Creating Secure Code
- 5 Providing a Secure Architecture
- 6 The Hacker Strategy: Expanded
-
7 Malware, Viruses, Worms, Bugs, and Botnets
- Introduction
- Botnets: Process and Components and History
- Viruses and Worms
- A More Detailed Examination of Malware, Viruses, Trojans, and Bots/Botnets
- Payload
- Detecting a Virus
- Anonymity and Sneakiness
- Sneakiness and Side-Channel Attacks
- Bugs
- Detecting Attacks and Removal Systems
- Honeypot Traps out in the Network
- Passive and Reactive Systems
- Statistical Anomaly and Signature-Based IDSs
- Comparison with Firewalls
- Detection Evasion Techniques
- Forensics
- Detecting Attacks and Attackers with Examples
- Detection versus Blocking
- The Problem of Evasion
- 8 Cryptography and the RSA Algorithm
- 9 Browser Security and Cross-Site Scripting
- 10 Banking Security, Zeus, and SpyEye
- 11 Web Application Security
- 12 Session Management, User Authentication, and Web Application Security
- 13 Web Security, DNS Security, and the Internet
- 14 Network Security and Defenses
-
15 Network Security Protocols and Defensive Mechanisms
- Network Security Protocols
- Layer 2: Link-Layer Connectivity of Wireless
- Filtering Network Traffic at the IP Level
- Other Protocols of Concern
- IP Fragmentation
- Transport Layer Security
- Proxy Firewall
- Web Traffic Scanning
- Intrusion Detection Systems
- Two Critical Infrastructure Protocols: BGP and DNS
- Infrastructure Protocols for DNS and DNSSEC
- Network Control Firewalls
- Security Principle Reference Monitors
- 16 Denial-of-Service Attacks
-
17 Mobile Platform Security
- Comparison of Mobile Platforms
- Development of iOS Applications
- Android Mobile Smartphone
- Android Security Model
- Security Features
- App Development Concepts
- Java Sandbox
- Apple iOS versus Android Operating System Comparisons
- Windows Mobile Models 7 and 8 Devices
- .NET Code Access Security That Can Be Exploited on Windows Phones
- Mobile Platform Security
- Attack Vectors for Mobile Devices
-
18 Cellular Access Security: 4G LTE, Mobile WiMAX, 5G, and MIMOs
- First-Generation Cellular Network
- Second-Generation Cellular Network
- Third-Generation Cellular Network
- Information Security
- Security Analysis
- WiMAX Introduction
- History of WiMAX
- Evolution of Mobile WiMAX
- Mobile WiMAX Architecture
- WiMAX Security, Threats, and Solutions
- 4G LTE Introduction
- History of 4G LTE
- 4G LTE Architecture
- 4G LTE Security, Threats, and Solutions
- A 5G Future
- 5G Security
- Conclusion
-
19 Wireless LAN Security
- Regulatory WLAN Security Standards
- Wire Lined to Wireless Transition
- Corporate Background of Wireless Networks
- Wireless Network Security Methods
- CIA Triangle of Confidentiality, Integrity, and Availability
-
Wireless Security History, Standards, and Developments
- Wired Equivalent Privacy
- Wi-Fi Protected Access
- Temporal Key Integrity Protocol (TKIP)
- Extensible Authentication Protocol (EAP)
- Lightweight Extensible Authentication Protocol (LEAP)
- Protected Extensible Authentication Protocol (PEAP)
- Wireless Transport Layer Security (WTLS)
- Wi-Fi Protected Setup (WPS)
- Other Security Considerations
- Threats of Wireless Networks
- Conclusion
-
20 The Stuxnet Worm and the Vulnerability of the U.S. Electric Power Grid
- More Details of the Stuxnet Worm Used for Cyber Warfare
- Stuxnet Damage
- Cyber Terrorism after Stuxnet
- Stuxnet Attack Summary
- Response and Industrial Control Security
- The Vulnerable U.S. Electronic Power Grid
- Components and Operating Elements of the U.S. Electric Power Grid
- Irreplaceable Large Power Transformers and Our Smart Grid Risk
- Smart Meters
- Programmable Logic Controllers
- Advantages of PLCs
- Distribution Transformers and Controllers
- Local PLC Inner-Loop Controller
- A SCADA System
- Conclusion
- 21 Cyber Warfare
- 22 Conclusion
- Bibliography
- Appendix
- Index
Product information
- Title: Network and Data Security for Non-Engineers
- Author(s):
- Release date: August 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781315350219
You might also like
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
book
Securing Network Infrastructure
Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a …
book
Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity …
book
Network Protocols for Security Professionals
Get to grips with network-based attacks and learn to defend your organization's network and network devices …