Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats Mukherjee, Aditya

By: Material type: TextTextPublication details: Limited, Birmingham: Packt Publishing, 2020.Description: ix, 372p.: ill.: 28cmISBN:
  • 9781789806298
LOC classification:
  • HF5548.37 .M85 2020
Contents:
Section 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - Mang'u General Stacks Non-fiction HF5548.37 .M85 2020 (Browse shelf(Opens below)) C1 Available Z011531
Books Books Zetech Library - TRC General Stacks Non-fiction HF5548.37 .M85 2020 (Browse shelf(Opens below)) C2 Available Z011532

Includes indexes

Section 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements
An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation
How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats.

There are no comments on this title.

to post a comment.