Cybersecurity Fundamentals A Real-World Perspective

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to gi...

Full description

Saved in:
Bibliographic Details
Main Authors Thakur, Kutub, Pathan, Al-Sakib Khan
Format eBook
LanguageEnglish
Published Milton CRC Press 2020
Taylor & Francis Group
Edition1
Subjects
Online AccessGet full text
ISBN0367472503
0367476487
9780367472504
9780367476489
DOI10.1201/9781003035626

Cover

Table of Contents:
  • 9.2.1 Reconnaissance Vulnerability -- 9.2.2 Resource Stealing and Invasion -- 9.2.3 Rogue Access Points (APs) -- 9.2.4 STA and AP Plain Text Transaction -- 9.2.5 Denial of Service (DoS) -- 9.2.6 Default AP Configuration -- 9.2.7 Rogue Insiders -- 9.2.8 Protocol Vulnerabilities -- 9.2.9 Ad Hoc Network Mode Security Problems -- 9.3 Wireless WAN Vulnerabilities -- 9.4 IoT Vulnerabilities -- 9.5 Wireless Network Security Measures -- 9.5.1 Modify Default Configuration -- 9.5.2 Wireless Router Location -- 9.5.3 Update Router Software -- 9.5.4 Stronger Encryption Algorithms -- 9.5.5 MAC Address Filtering -- 9.6 Useful Tips on Safe Use of Wireless Network -- Sample Questions and Answers for What We Have Learned in Chapter 9 -- Sources -- 10 Secure Online Shopping and Internet Browsing -- 10.1 Introduction -- 10.2 HTTP Websites -- 10.2.1 Hypertext Transfer Protocol Secure (HTTPS) -- 10.2.2 Installing Security Certificate on Windows IIS Server -- 10.2.3 How SSL Encryption Works -- 10.3 Secure Electronic Transactions (SET) -- 10.3.1 What is SET Transaction Flow? -- 10.3.2 Main Features of SET Technology -- 10.3.3 Key Stakeholders of SET Protocol -- 10.4 Web Fraud Detection Systems -- 10.4.1 What is a Card Not Present Transaction? -- 10.4.2 Workflow of Web Fraud Detection System -- 10.4.3 What Algorithms are Used in WFDS? -- 10.5 Browser Cache Clearing -- 10.5.1 Google Chrome -- 10.5.2 Mozilla Firefox -- 10.5.3 Internet Explorer -- 10.6 Frequent Password Changes -- 10.7 Updating OS -- 10.7.1 Updating Windows 10 -- 10.7.2 Updating Windows 7 -- 10.8 Updating Apps -- 10.8.1 Updating Google Chrome Application -- 10.8.2 Important Computer Application Updaters -- 10.9 Useful Tips on Safe Browsing and Online Shopping -- Sample Questions and Answers for What We Have Learned in Chapter 10 -- Sources -- 11 Mobile Device Security -- 11.1 Introduction
  • Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- About the Authors -- 1 Computers and Networks -- 1.1 Introduction to Computers -- 1.2 History of Computers -- 1.2.1 First Generation (1937-1946) -- 1.2.2 Second Generation (1947-1962) -- 1.2.3 Third Generation (1963-1971) -- 1.2.4 Fourth Generation (1971-2010) -- 1.2.5 Fifth Generation (2010-Present) -- 1.3 Components of Modern Computer -- 1.3.1 Input Devices -- 1.3.2 Output Devices -- 1.3.3 Central Processing Unit (CPU) -- 1.3.4 Storage Components -- 1.3.5 Software Components -- 1.4 Future Machines -- 1.4.1 Artificial Intelligence -- 1.4.2 Quantum Computing -- 1.4.3 Nanotechnology -- 1.4.4 Parallel Processing -- 1.5 Introduction to Computer Networks -- 1.5.1 Network Topologies -- 1.5.2 Major Network Protocols -- 1.5.3 Elements of Computer Network -- 1.5.4 Types of Networks -- 1.6 The Internet Explored -- 1.6.1 History and Evolution of Internet -- 1.7 Internet in Today's World -- 1.7.1 Telecommunication -- 1.7.2 Retail Sales -- 1.7.3 Education -- 1.7.4 Business Processes -- 1.8 Elements of the Internet -- 1.8.1 Internet Cloud -- 1.8.2 Edge Router -- 1.8.3 Core Router -- 1.8.4 Firewalls -- 1.8.5 Switches -- 1.8.6 Hubs -- 1.8.7 Servers -- 1.8.8 Connectivity -- 1.8.9 Hosts -- 1.9 Internet Software Infrastructure &amp -- Protocols -- 1.9.1 IP Address -- 1.9.2 DNS Server -- 1.9.3 TCP/IP Protocol -- 1.9.4 HTTP -- 1.9.5 World Wide Web (WWW) -- Sample Questions and Answers for What We Have Learned in Chapter 1 -- Sources -- 2 Cybersecurity Basics -- 2.1 Introduction -- 2.2 Importance of Cybersecurity -- 2.3 Introduction to Cyberattacks -- 2.4 Objectives of Cyberattacks -- 2.4.1 Condfientiality Breach -- 2.4.2 Availability Breach -- 2.4.3 Integrity Breach -- Sample Questions and Answers for What We Have Learned in Chapter 2 -- Sources
  • 11.2 Importance of Mobile Security -- 11.3 Types of Mobile Platforms -- 11.3.1 Android Operating System -- 11.3.2 iOS Operating System -- 11.4 Locked Branded Phones -- 11.5 Android Phone Security Guidelines -- 11.5.1 Guidelines for Security -- 11.5.2 How to Enable Biometric Security on Android Phone -- 11.6 iPhone Security Guidelines -- 11.6.1 Major Guidelines for iPhone Security -- 11.6.2 How to Enable Biometric Security on Apple iPhone -- 11.7 Windows Phone Security Guidelines -- 11.8 Mobile Application Management -- Sample Questions and Answers for What We Have Learned in Chapter 11 -- Sources -- 12 Cybersecurity Standards -- 12.1 Introduction -- 12.2 ISO/IEC 27001 &amp -- 27002 Standards -- 12.3 Information Security Forum (ISF) Standards -- 12.4 Payment Card Industry Data Security Standard (PCI/DSS) -- Sample Questions and Answers for What We Have Learned in Chapter 12 -- Sources -- Index
  • 3 Types of Cyberattacks -- 3.1 Introduction -- 3.2 Denial of Service (DoS) -- 3.3 Distributed Denial of Service (DDoS) -- 3.4 Man-in-the-Middle (MITM) Attacks -- 3.5 Cryptojacking -- 3.6 SQL Injection -- 3.7 Spamming -- 3.8 Cyberterrorism -- 3.9 Digital Property Misappropriation -- 3.10 Zero-Day Exploitation -- 3.11 Phishing -- 3.12 Digital Vandalism -- 3.13 Cyberstalking -- 3.14 Cyber Frauds and Forgery -- Sample Questions and Answers for What We Have Learned in Chapter 3 -- Sources -- 4 Recent Cyberattacks and Their Impact -- 4.1 Introduction -- 4.2 Equifax Data Theft -- 4.3 VPNFilter Cyberattack -- 4.4 WannaCry Ransom Attack -- 4.5 Peta Cyberattack -- 4.6 US Election Manipulation -- 4.7 Power Grid Hacking -- 4.8 Shadow Network Attack -- 4.9 GitHub DDoS Attack 2018 -- 4.10 Under Armor Account Hacking -- Sample Questions and Answers for What We Have Learned in Chapter 4 -- Sources -- 5 Types of Computer Malware -- 5.1 Introduction -- 5.2 Viruses -- 5.3 Trojan Horse -- 5.4 Rootkit -- 5.5 Spyware -- 5.6 Worms -- 5.7 Adware -- 5.8 Scareware -- 5.9 Browser Hijacker -- Sample Questions and Answers for What We Have Learned in Chapter 5 -- Sources -- 6 Securing Your Computers -- 6.1 Introduction -- 6.2 Firewall Settings -- 6.3 Antivirus Software -- 6.4 Anti-Spyware Software -- 6.5 Anti-Spam Software -- 6.6 Security Updates -- 6.7 Secure Browsing Settings -- 6.8 Scan Devices before Data Transfer -- 6.9 Social Engineering Attack Precautions -- 6.10 Miscellaneous Tips -- Sample Questions and Answers for What We Have Learned in Chapter 6 -- Sources -- 7 Password Management -- 7.1 Introduction -- 7.2 Basics of Passwords -- 7.2.1 Threats to Passwords -- 7.2.2 Good and Bad about Passwords -- 7.2.3 How Do Bad Guys Hack Your Password? -- 7.3 Effective Password Management Tips -- 7.4 Creating and Managing Secure Passwords -- 7.4.1 Strong Password
  • 7.4.2 Use of Biometrics -- 7.4.3 Two-Factor Authentication -- 7.4.4 Multi-Factor Authentication -- 7.4.4.1 What you know -- 7.4.4.2 What you are -- 7.4.4.3 What you have -- 7.4.5 One-Time Password (OTP) -- 7.4.6 Using Password Managers -- 7.4.6.1 Main Reasons to Use a Password Manager -- 7.5 Password Manager Tools -- 7.5.1 Dashlane -- 7.5.2 LastPass -- 7.5.3 ZOHO Vault -- 7.5.4 KeePass -- 7.5.5 RoboForm -- Sample Questions and Answers for What We Have Learned in Chapter 7 -- Sources -- 8 Prevention from Cyberattacks -- 8.1 Introduction -- 8.2 Algorithms and Techniques -- 8.2.1 Cyberattack Detection -- 8.2.2 Cyberattack Prediction -- 8.2.3 Cyberattack Prevention -- 8.3 Firewalls -- 8.3.1 Activating Windows Firewall -- 8.3.1.1 Windows 10 Firewall -- 8.3.1.2 Windows 7 Firewall -- 8.3.1.3 Enabling Windows 7 Firewall -- 8.3.1.4 Enabling Windows Firewall Service -- 8.3.2 Traffic Issues -- 8.3.2.1 What are Traffic Rules? -- 8.3.2.2 Creating a New Inbound Rule -- 8.3.2.3 Creating Outbound Rule -- 8.3.2.4 Creating Connection Security Rule -- 8.3.2.5 What is the Monitoring Feature on Advanced Firewall Settings? -- 8.4 Intrusion Detection/Prevention Systems -- 8.4.1 Intrusion Detection System (IDS) -- 8.4.2 Intrusion Prevention System (IPS) -- 8.5 Authentication Using Hash -- 8.5.1 Message Digest 5 -- 8.5.2 Secure Hash Algorithm -- 8.6 Multi-Factor Authentication -- 8.6.1 Activating Two-Factor Authentication -- 8.6.2 Creating Application Specific Passwords -- 8.6.3 What If Your Phone with All Apps Enabled is Lost? -- 8.7 Mac Computer Firewall Configuration -- 8.7.1 Important Note -- 8.8 Choosing the Right Browser -- 8.9 Secure Sockets Layer -- 8.10 Virtual Private Network -- Sample Questions and Answers for What We Have Learned in Chapter 8 -- Sources -- 9 Wireless Network Security -- 9.1 Introduction -- 9.2 LAN Vulnerabilities