000 | 03304nam a22001937a 4500 | ||
---|---|---|---|
003 | ZET-ke | ||
005 | 20240203100247.0 | ||
008 | 240203b |||||||| |||| 00| 0 eng d | ||
020 | _a9781789806298 | ||
040 |
_aDLC _beng _cDlC _dZET-ke |
||
050 |
_aHF5548.37 _b.M85 2020 |
||
100 | _4Mukherjee, Aditya | ||
245 |
_a Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats _cMukherjee, Aditya |
||
260 |
_aLimited, Birmingham: _bPackt Publishing, _c2020. |
||
300 |
_aix, 372p.: _bill.: _c28cm. |
||
500 | _aIncludes indexes | ||
505 | _aSection 1: Network Security Concepts, Threats, and Vulnerabilities--Chapter 1: Network Security Concepts--Technical requirements--An overview of network security--Network security concepts--Network security components--Network and system hardening--Network segmentation--Network choke-points--Defense-in-Depth--Due diligence and cyber resilience--Soft targets--Continuous monitoring and improvement--Post-deployment review Network security architecture approach--Planning and analysis--Designing--Building--Testing--Deployment--Post-deployment--Network security best practices and guidelines--Network Operations--Center overview--Proper incident management--Functional ticketing system and knowledge base--Monitoring policy--A well-defined investigation process--Reporting and dashboards--Escalation--High availability and failover--Assessing network security effectiveness--Key attributes to be considered--The action priority matrix--Threat modeling--Assessing the nature of threats STRIDE--PASTA--Trike--VAST--OCTAVE--Summary--Questions--Further reading--Chapter 2: Security for Cloud and Wireless Networks--Technical requirements An introduction to secure cloud computing--AWS' shared responsibility model--Major cybersecurity challenges with the cloud--Amazon Web Services (AWS)--AWS security features--Well-defined identity capabilities--Traceability--Defense in depth--Automation of security best practices--Continuous data protection--Security event response--Microsoft Azure security technologies--The Zero Trust model Security layers--Identity management using Azure--Infrastructure protection using Azure--Criticality of infrastructure--Encryption--Identifying and classifying data--Encryption on Azure--Network security--Internet protection--Virtual networks--Network integrations--CipherCloud--Securing cloud computing--Security threats--Countermeasures--Wireless network security--Wi-Fi attack surface analysis and exploitation techniques--Wi-Fi data collection and analysis--Wi-Fi attack and exploitation techniques--Best practices--Security assessment approach Software-defined radio attacks--Types of radio attacks--Replay attacks--Cryptanalysis attacks--Reconnaissance attacks--Mitigation techniques--Summary--Questions--Further reading00Chapter 3: Mitigating the Top Network Threats of 2020--Technical requirements--The top 10 network attacks and how to fix them--Phishing the familiar foe--How to fix phishing threats--Rogue applications and fake security alerts intimidation and imitation How to fix rogue applications and software threats--Insider threats the enemy inside the gates--How to fix insider threats. | ||
942 |
_2lcc _cBK _hHF5548.37 _kHF5548.37 _m.M85 2020 |
||
999 |
_c5922 _d5922 |