Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats Mukherjee, Aditya
Material type: TextPublication details: Limited, Birmingham: Packt Publishing, 2020.Description: ix, 372p.: ill.: 28cmISBN:- 9781789806298
- HF5548.37 .M85 2020
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - Mang'u General Stacks | Non-fiction | HF5548.37 .M85 2020 (Browse shelf(Opens below)) | C1 | Available | Z011531 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | HF5548.37 .M85 2020 (Browse shelf(Opens below)) | C2 | Available | Z011532 |
Includes indexes
Section 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements
An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation
How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats.
There are no comments on this title.