Cybersecurity Fundamentals A Real-World Perspective.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Milton :
Taylor & Francis Group,
2020.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Preface
- About the Authors
- 1 Computers and Networks
- 1.1 Introduction to Computers
- 1.2 History of Computers
- 1.2.1 First Generation (1937-1946)
- 1.2.2 Second Generation (1947-1962)
- 1.2.3 Third Generation (1963-1971)
- 1.2.4 Fourth Generation (1971-2010)
- 1.2.5 Fifth Generation (2010-Present)
- 1.3 Components of Modern Computer
- 1.3.1 Input Devices
- 1.3.2 Output Devices
- 1.3.3 Central Processing Unit (CPU)
- 1.3.4 Storage Components
- 1.3.5 Software Components
- 1.4 Future Machines
- 1.4.1 Artificial Intelligence
- 1.4.2 Quantum Computing
- 1.4.3 Nanotechnology
- 1.4.4 Parallel Processing
- 1.5 Introduction to Computer Networks
- 1.5.1 Network Topologies
- 1.5.2 Major Network Protocols
- 1.5.3 Elements of Computer Network
- 1.5.4 Types of Networks
- 1.6 The Internet Explored
- 1.6.1 History and Evolution of Internet
- 1.7 Internet in Today's World
- 1.7.1 Telecommunication
- 1.7.2 Retail Sales
- 1.7.3 Education
- 1.7.4 Business Processes
- 1.8 Elements of the Internet
- 1.8.1 Internet Cloud
- 1.8.2 Edge Router
- 1.8.3 Core Router
- 1.8.4 Firewalls
- 1.8.5 Switches
- 1.8.6 Hubs
- 1.8.7 Servers
- 1.8.8 Connectivity
- 1.8.9 Hosts
- 1.9 Internet Software Infrastructure & Protocols
- 1.9.1 IP Address
- 1.9.2 DNS Server
- 1.9.3 TCP/IP Protocol
- 1.9.4 HTTP
- 1.9.5 World Wide Web (WWW)
- Sample Questions and Answers for What We Have Learned in Chapter 1
- Sources
- 2 Cybersecurity Basics
- 2.1 Introduction
- 2.2 Importance of Cybersecurity
- 2.3 Introduction to Cyberattacks
- 2.4 Objectives of Cyberattacks
- 2.4.1 Condfientiality Breach
- 2.4.2 Availability Breach
- 2.4.3 Integrity Breach
- Sample Questions and Answers for What We Have Learned in Chapter 2
- Sources
- 3 Types of Cyberattacks
- 3.1 Introduction
- 3.2 Denial of Service (DoS)
- 3.3 Distributed Denial of Service (DDoS)
- 3.4 Man-in-the-Middle (MITM) Attacks
- 3.5 Cryptojacking
- 3.6 SQL Injection
- 3.7 Spamming
- 3.8 Cyberterrorism
- 3.9 Digital Property Misappropriation
- 3.10 Zero-Day Exploitation
- 3.11 Phishing
- 3.12 Digital Vandalism
- 3.13 Cyberstalking
- 3.14 Cyber Frauds and Forgery
- Sample Questions and Answers for What We Have Learned in Chapter 3
- Sources
- 4 Recent Cyberattacks and Their Impact
- 4.1 Introduction
- 4.2 Equifax Data Theft
- 4.3 VPNFilter Cyberattack
- 4.4 WannaCry Ransom Attack
- 4.5 Peta Cyberattack
- 4.6 US Election Manipulation
- 4.7 Power Grid Hacking
- 4.8 Shadow Network Attack
- 4.9 GitHub DDoS Attack 2018
- 4.10 Under Armor Account Hacking
- Sample Questions and Answers for What We Have Learned in Chapter 4
- Sources
- 5 Types of Computer Malware
- 5.1 Introduction
- 5.2 Viruses
- 5.3 Trojan Horse
- 5.4 Rootkit
- 5.5 Spyware
- 5.6 Worms
- 5.7 Adware
- 5.8 Scareware
- 5.9 Browser Hijacker