Карточка | Таблица | RUSMARC | |
Mukherjee, Aditya. Network Security Strategies [[electronic resource]]: Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats. — Birmingham: Packt Publishing, Limited, 2020. — 1 online resource (378 p.). — Description based upon print version of record. — <URL:http://elib.fa.ru/ebsco/2648388.pdf>.Дата создания записи: 31.10.2020 Тематика: Computer networks — Security measures. Коллекции: EBSCO Разрешенные действия: –
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа: Анонимные пользователи Сеть: Интернет |
Права на использование объекта хранения
Место доступа | Группа пользователей | Действие | ||||
---|---|---|---|---|---|---|
Локальная сеть Финуниверситета | Все | |||||
Интернет | Читатели | |||||
Интернет | Анонимные пользователи |
Оглавление
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Section 1: Network Security Concepts, Threats, and Vulnerabilities
- Chapter 1: Network Security Concepts
- Technical requirements
- An overview of network security
- Network security concepts
- Network security components
- Network and system hardening
- Network segmentation
- Network choke-points
- Defense-in-Depth
- Due diligence and cyber resilience
- Soft targets
- Continuous monitoring and improvement
- Post-deployment review
- Network security architecture approach
- Planning and analysis
- Designing
- Building
- Testing
- Deployment
- Post-deployment
- Network security best practices and guidelines
- Network Operations Center overview
- Proper incident management
- Functional ticketing system and knowledge base
- Monitoring policy
- A well-defined investigation process
- Reporting and dashboards
- Escalation
- High availability and failover
- Assessing network security effectiveness
- Key attributes to be considered
- The action priority matrix
- Threat modeling
- Assessing the nature of threats
- STRIDE
- PASTA
- Trike
- VAST
- OCTAVE
- Network Operations Center overview
- Summary
- Questions
- Further reading
- Chapter 2: Security for Cloud and Wireless Networks
- Technical requirements
- An introduction to secure cloud computing
- AWS' shared responsibility model
- Major cybersecurity challenges with the cloud
- Amazon Web Services (AWS)
- AWS security features
- Well-defined identity capabilities
- Traceability
- Defense in depth
- Automation of security best practices
- Continuous data protection
- Security event response
- AWS security features
- Microsoft Azure security technologies
- The Zero Trust model
- Security layers
- Identity management using Azure
- Infrastructure protection using Azure
- Criticality of infrastructure
- Encryption
- Identifying and classifying data
- Encryption on Azure
- Network security
- Internet protection
- Virtual networks
- Network integrations
- CipherCloud
- Securing cloud computing
- Security threats
- Countermeasures
- Wireless network security
- Wi-Fi attack surface analysis and exploitation techniques
- Wi-Fi data collection and analysis
- Wi-Fi attack and exploitation techniques
- Best practices
- Wi-Fi attack surface analysis and exploitation techniques
- Security assessment approach
- Software-defined radio attacks
- Types of radio attacks
- Replay attacks
- Cryptanalysis attacks
- Reconnaissance attacks
- Mitigation techniques
- Types of radio attacks
- Summary
- Questions
- Further reading
- Chapter 3: Mitigating the Top Network Threats of 2020
- Technical requirements
- The top 10 network attacks and how to fix them
- Phishing – the familiar foe
- How to fix phishing threats
- Rogue applications and fake security alerts – intimidation and imitation
- How to fix rogue applications and software threats
- Insider threats – the enemy inside the gates
- How to fix insider threats
- Viruses and worms – a prevailing peril
- How to fix viruses and worms threats
- Botnets – an adversarial army at disposal
- How to fix botnet threats
- Trojan horse – covert entry
- How to fix trojan threats
- Rootkit – clandestine malicious applications
- How to fix rootkit threats
- Malvertising – ads of chaos
- How to fix malvertising threats
- DDoS – defending against one too many
- How to fix DDoS threats
- Ransomware – cyber extortions
- How to fix ransomware threats
- Notable mentions
- Drive-by download
- Exploit kits and AI-ML-driven attacks
- Third-party and supply chain attacks
- Creating an integrated threat defense architecture
- Phishing – the familiar foe
- Keeping up with vulnerabilities and threats
- Understanding various defense mechanisms
- Safeguarding confidential information from third parties
- Implementing strong password policies
- Enhancing email security
- Vulnerability management policies
- Vulnerability management life cycle
- Understanding various defense mechanisms
- Network vulnerability assessments
- Utilizing scanning tools in vulnerability assessment
- Exercising continuous monitoring
- The NIST Risk Management Framework
- The NIST Release Special Publication 800-37
- Summary
- Questions
- Further reading
- Section 2: Network Security Testing and Auditing
- Chapter 4: Network Penetration Testing and Best Practices
- Technical requirements
- Approach to network penetration testing
- Pre-engagement
- Reconnaissance
- Threat modeling
- Exploitation
- Post-exploitation
- Reporting
- Retesting
- Top penetration testing platforms
- Setting up our network
- Performing automated exploitation
- OpenVas
- Sparta
- Armitage
- Performing manual exploitation
- Kali Linux
- Nmap
- Nikto
- Dirb
- Metasploit
- Browser Exploitation Framework (BeEF)
- Burp Suite
- Penetration testing best practices
- Case study
- Information gathering
- Scanning the servers
- Identifying and exploiting vulnerabilities
- Reporting
- Presentation
- A few other practices
- Case study
- The concept of teaming
- Red team
- Blue team
- Purple team
- Capture the flag
- Engagement models and methodologies
- Black box
- Gray box
- White box
- Summary
- Questions
- Further reading
- Chapter 5: Advanced Network Attacks
- Technical requirements
- Critical infrastructure and prominent exploitation
- Attack frameworks toward ICS industries
- The cyber kill chain
- Information sharing and analysis centers
- Understanding the threat landscape
- Top threats and vulnerable points in ICS industries
- Well-known critical infrastructure exploitation examples
- Attack frameworks toward ICS industries
- Penetration testing IoT networks and reverse engineering firmware
- Introduction to IoT network security
- Security challenges for IoT
- Penetration testing for IoT networks
- Reconnaissance
- Evaluation
- Exploitation
- Reporting
- Setting up an IoT pen testing lab
- Software tool requirements
- Firmware software tools
- Web application software tools
- Software tool requirements
- Platforms and tools for advanced testing
- UART communication
- Firmware reverse engineering and exploitation
- Exploiting VoIP networks and defense mechanisms
- VoIP threat landscape
- VoIP phone classifications
- Pros and cons of VoIP
- Analyzing VoIP security issues
- Vishing
- Denial of Service (DoS)
- Eavesdropping
- Countermeasures and defense vectors
- Top platforms for VoIP monitoring and security
- VoIP threat landscape
- Summary
- Questions
- Further reading
- Chapter 6: Network Digital Forensics
- Technical requirements
- Concepts of network forensics
- Fundamentals of network forensics
- Technical capabilities for responding to forensic incidents
- Network protocols and communication layers
- Damballa network threat analysis
- Forensics tools – network analysis and response
- Wireshark
- The NIKSUN Suite
- Security Onion
- Xplico
- NetworkMiner
- Hakabana
- NetWitness NextGen
- Solera Networks DS
- DSHELL
- LogRhythm Network Monitor
- Key approaches to network forensics
- Industry best practices and standards
- The four steps to dealing with digital evidence
- Advances in network forensics practices
- Big data analytics-based forensics
- Conducting a tabletop forensics exercise
- Familiarizing yourself with the stakeholders
- Creating the ideal scenario
- Gamification
- Document lessons learned
- Summary
- Questions
- Further reading
- Chapter 7: Performing Network Auditing
- Technical requirements
- Getting started with your audit
- What is a network audit?
- Why do we need a network audit?
- Key concepts of network auditing
- Understanding the fundamentals of an audit
- Understanding the types of audits
- Foundational pillars for network audits
- Policy
- Procedures
- Standards
- Controls
- Risk management in a network audit
- Risk assessment
- Risk management strategies
- Industry standards and governance framework
- Understanding the auditor's role
- Understanding the auditing process
- Performing a network security audit
- Planning and research phase
- Data gathering and data analysis phase
- Audit report and follow-up phase
- Exploring network audit tools
- Network assessment and auditing tools
- SolarWinds
- Open-AudIT
- Nmap
- NetformX
- Security assessment tools
- Nessus
- Nipper
- Wireshark
- Network assessment and auditing tools
- Network audit checklist
- Comprehensive checklist
- Planning phase
- Design and architecture review
- Physical inventory
- Network infrastructure security
- Infrastructure for monitoring and management
- Configuration management
- Performance monitoring and analysis
- Documentation
- Case study
- Network monitoring checklist
- NOC audit checklist
- Audit report (sampling)
- Comprehensive checklist
- Auditing best practices and latest trends
- Best practices
- Latest trends
- SolarWinds Network Automation Manager
- SolarWinds NCM
- TrueSight Network Automation
- Summary
- Questions
- Further reading
- Section 3: Threat Management and Proactive Security Operations
- Chapter 8: Continuous and Effective Threat Management
- Technical requirements
- Cyber threat management concepts
- BCP/DR
- Cyber risk assessment
- Strategic governance framework
- Cyber resilience
- Governance, risk, and compliance (GRC)
- Cyber perimeter establishment
- Threat intelligence gathering
- Continuous threat monitoring
- Actively managing risks and threats
- Unified threat management (UTM)
- Advanced persistent threats (APT)
- The essential eight
- Malware analysis
- Malware analysis process
- Malware analysis lab – overview
- Setting up a malware analysis lab
- Proposed malware analysis lab architecture
- Creating an isolated virtual network
- Creating and restoring snapshots
- Endpoint detection and response (EDR)
- Vulnerability and patch management
- Threat management best practices
- Addressing security leadership concerns
- Conveying risk and threat management to leadership
- Strategies for boardroom discussions
- Cybersecurity and business outcomes
- Summary
- Questions
- Further reading
- Chapter 9: Proactive Security Strategies
- Technical requirements
- Advancing to proactive security
- Key considerations
- Evolving security challenges
- Steps to building a proactive security system
- Understanding how threat intelligence works
- Threat intelligence platforms
- FireEye iSIGHT
- IBM's X-Force Exchange
- IntSights's Enterprise Threat Intelligence & Mitigation Platform
- Digital Shadows SearchLight
- Threat intelligence platforms
- Understanding how threat hunting works
- Stages of threat hunting
- Components of threat hunting
- Developing a threat hunting plan
- Threat hunting maturity model
- Threat hunting platforms
- MITRE ATT&CK
- Endgame threat hunting
- Cybereason
- Understanding deception technology
- Need for deception technology
- Deception technology vendors and platforms
- Illusive Networks
- Attivo Networks
- Smokescreen IllusionBLACK Deception
- TrapX Security
- Security Information and Event Management (SIEM)
- Capabilities of SIEM
- SIEM platforms
- Splunk
- ArcSight Enterprise Security Manager
- IBM QRadar
- ELK SIEM
- AlienVault OSSIM
- Summary
- Questions
- Further reading
- Assessments
- Other Books You May Enjoy
- Index
Статистика использования
Количество обращений: 0
За последние 30 дней: 0 Подробная статистика |