Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Saved in:
Main Author: | |
---|---|
Format: | Electronic |
Language: | English |
Published: |
Birmingham :
Packt Publishing, Limited,
2020.
|
Subjects: | |
ISBN: | 9781789801057 1789801052 1789806291 9781789806298 |
Physical Description: | 1 online resource (378 p.) |
LEADER | 04657cam a2200385Mu 4500 | ||
---|---|---|---|
001 | kn-on1202459066 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 201031s2020 xx o ||| 0 eng d | ||
040 | |a EBLCP |b eng |c EBLCP |d YDX |d N$T |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781789801057 | ||
020 | |a 1789801052 | ||
020 | |z 1789806291 | ||
020 | |z 9781789806298 | ||
035 | |a (OCoLC)1202459066 |z (OCoLC)1200306695 |z (OCoLC)1202449485 |z (OCoLC)1305544537 | ||
100 | 1 | |a Mukherjee, Aditya. | |
245 | 1 | 0 | |a Network Security Strategies |h [electronic resource] : |b Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2020. | ||
300 | |a 1 online resource (378 p.) | ||
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Network Security Concepts, Threats, and Vulnerabilities -- Chapter 1: Network Security Concepts -- Technical requirements -- An overview of network security -- Network security concepts -- Network security components -- Network and system hardening -- Network segmentation -- Network choke-points -- Defense-in-Depth -- Due diligence and cyber resilience -- Soft targets -- Continuous monitoring and improvement -- Post-deployment review | |
505 | 8 | |a Network security architecture approach -- Planning and analysis -- Designing -- Building -- Testing -- Deployment -- Post-deployment -- Network security best practices and guidelines -- Network Operations Center overview -- Proper incident management -- Functional ticketing system and knowledge base -- Monitoring policy -- A well-defined investigation process -- Reporting and dashboards -- Escalation -- High availability and failover -- Assessing network security effectiveness -- Key attributes to be considered -- The action priority matrix -- Threat modeling -- Assessing the nature of threats | |
505 | 8 | |a STRIDE -- PASTA -- Trike -- VAST -- OCTAVE -- Summary -- Questions -- Further reading -- Chapter 2: Security for Cloud and Wireless Networks -- Technical requirements -- An introduction to secure cloud computing -- AWS' shared responsibility model -- Major cybersecurity challenges with the cloud -- Amazon Web Services (AWS) -- AWS security features -- Well-defined identity capabilities -- Traceability -- Defense in depth -- Automation of security best practices -- Continuous data protection -- Security event response -- Microsoft Azure security technologies -- The Zero Trust model | |
505 | 8 | |a Security layers -- Identity management using Azure -- Infrastructure protection using Azure -- Criticality of infrastructure -- Encryption -- Identifying and classifying data -- Encryption on Azure -- Network security -- Internet protection -- Virtual networks -- Network integrations -- CipherCloud -- Securing cloud computing -- Security threats -- Countermeasures -- Wireless network security -- Wi-Fi attack surface analysis and exploitation techniques -- Wi-Fi data collection and analysis -- Wi-Fi attack and exploitation techniques -- Best practices -- Security assessment approach | |
505 | 8 | |a Software-defined radio attacks -- Types of radio attacks -- Replay attacks -- Cryptanalysis attacks -- Reconnaissance attacks -- Mitigation techniques -- Summary -- Questions -- Further reading -- Chapter 3: Mitigating the Top Network Threats of 2020 -- Technical requirements -- The top 10 network attacks and how to fix them -- Phishing -- the familiar foe -- How to fix phishing threats -- Rogue applications and fake security alerts -- intimidation and imitation -- How to fix rogue applications and software threats -- Insider threats -- the enemy inside the gates -- How to fix insider threats | |
500 | |a Viruses and worms - a prevailing peril. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer networks |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
776 | 0 | 8 | |i Print version: |a Mukherjee, Aditya |t Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats |d Birmingham : Packt Publishing, Limited,c2020 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpNSS00001/network-security-strategies?kpromoter=marc |y Full text |