Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats Mukherjee, Aditya
Material type: TextPublication details: Limited, Birmingham: Packt Publishing, 2020.Description: ix, 372p.: ill.: 28cmISBN:- 9781789806298
- HF5548.37 .M85 2020
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - Mang'u General Stacks | Non-fiction | HF5548.37 .M85 2020 (Browse shelf(Opens below)) | C1 | Available | Z011531 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | HF5548.37 .M85 2020 (Browse shelf(Opens below)) | C2 | Available | Z011532 |
Browsing Zetech Library - Mang'u shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
HF 5548 .32 .C472 E-business and e-commerce management : strategy, implementation and practice / | HF5548.32 .C472 2011 E-business and E-commerce management / | HF5548.32 .E183 2007 E-commerce and v-business : | HF5548.37 .M85 2020 Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats | HF5548.37 .T75 2023 Strategic cyber security management/ | HF5548.4 H353 1998 The 97 stable An introduction to microsoft Office 97 / | HF5548.8 .A26 2016 Industrial/organizational psychology: an applied approach / |
Includes indexes
Section 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements
An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation
How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats.
There are no comments on this title.