Cargando…

The InfoSec handbook : an introduction to information security /

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginne...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Rao, Umesh Hodeghatta (Autor), Nayak, Umesha (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berkeley, CA : ApressOpen, 2014.
Colección:Expert's voice in information security.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn891381085
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 140926s2014 caua obf 001 0 eng d
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d UMI  |d E7B  |d UPM  |d COO  |d B24X7  |d DEBBG  |d DEBSZ  |d YDXCP  |d EBLCP  |d OCLCF  |d OCLCQ  |d Z5A  |d LIV  |d ESU  |d OCLCQ  |d VT2  |d IOG  |d OCLCA  |d REB  |d VLB  |d CEF  |d UAB  |d VTS  |d OCLCQ  |d U3W  |d WYU  |d AU@  |d YOU  |d AUD  |d OCLCQ  |d UWK  |d DCT  |d OCLCQ  |d BRF  |d OCLCQ  |d COM  |d OCLCO  |d CNTRU  |d LUU  |d OCLCQ  |d INARC  |d OCLCO 
019 |a 892917693  |a 1005789745  |a 1026455459  |a 1041490465  |a 1044402513  |a 1048145179  |a 1055333154  |a 1056442915  |a 1058377632  |a 1066474335  |a 1067202094  |a 1074317396  |a 1086424797  |a 1110314637  |a 1110993959  |a 1112862860  |a 1119452668  |a 1160016069  |a 1166239397  |a 1179902619  |a 1391570872 
020 |a 9781430263838  |q (electronic bk.) 
020 |a 1430263830  |q (electronic bk.) 
020 |a 1430263822  |q (print) 
020 |a 9781430263821  |q (print) 
020 |z 9781430263821 
024 7 |a 10.1007/978-1-4302-6383-8  |2 doi 
029 1 |a AU@  |b 000058380593 
029 1 |a AU@  |b 000060583838 
029 1 |a DEBBG  |b BV042182783 
029 1 |a DEBSZ  |b 417234716 
029 1 |a GBVCP  |b 882734458 
035 |a (OCoLC)891381085  |z (OCoLC)892917693  |z (OCoLC)1005789745  |z (OCoLC)1026455459  |z (OCoLC)1041490465  |z (OCoLC)1044402513  |z (OCoLC)1048145179  |z (OCoLC)1055333154  |z (OCoLC)1056442915  |z (OCoLC)1058377632  |z (OCoLC)1066474335  |z (OCoLC)1067202094  |z (OCoLC)1074317396  |z (OCoLC)1086424797  |z (OCoLC)1110314637  |z (OCoLC)1110993959  |z (OCoLC)1112862860  |z (OCoLC)1119452668  |z (OCoLC)1160016069  |z (OCoLC)1166239397  |z (OCoLC)1179902619  |z (OCoLC)1391570872 
037 |a CL0500000488  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
049 |a UAMI 
100 1 |a Rao, Umesh Hodeghatta,  |e author. 
245 1 4 |a The InfoSec handbook :  |b an introduction to information security /  |c Umesh Hodeghatta Rao, Umesha Nayak. 
264 1 |a Berkeley, CA :  |b ApressOpen,  |c 2014. 
264 2 |a New York, NY :  |b Distributed to the Book trade worldwide by Springer 
264 4 |c ©2014 
300 |a 1 online resource (xxiv, 392 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a Expert's voice in information security 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed September 26, 2014). 
520 |a The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it's an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face. 
546 |a English. 
505 0 |a Intro -- Contents at a Glance -- Contents -- About the Authors -- Acknowledgments -- Introduction -- Part I: Introduction -- Chapter 1: Introduction to Security -- What is Security? -- Why is Security Important? -- What if You Do Not Care About Security? -- The Evolution of the Computer and Information Security -- Information Security Today -- Applicable Standards and Certifications -- The Role of a Security Program -- Chapter 2: History of Computer Security -- Introduction -- Communication -- World Wars and Their Influence on the Field of Security -- Cypher Machine: Enigma -- Bletchley Park -- Code Breakers -- Some Historical Figures of Importance: Hackers and Phreakers -- Kevin Mitnick -- Chapter Summary -- Part II: Key Principles and Practices -- Chapter 3: Key Concepts and Principles -- Introduction -- Security Threats -- External and Internal Threats -- Information Security Frameworks and Information Security Architecture -- Information Security Management Systems Framework Provided by ISO/IEC 27001:2013 -- NIST Special Publication 800-39 complemented by 800-53 -- SABSA® -- Pillars of Security -- People -- Organization of Information Security -- The Need for Independence -- Specific Roles and Responsibilities -- Audit Committee or Information Security Committee at the Board Level -- Information Security Sponsor or Champion -- Chief Information Security Officer or Information Security Officer -- Information Security Forum -- Information Security Specialists -- Project Managers -- Data Owners -- Data Custodians -- Users of the data -- Authority for Information Security -- Policies, Procedures, and Processes -- Technology -- Information Security Concepts -- CIA Triad -- Confidentiality -- Integrity -- Availability -- Parkerian Hexad -- Implementation of Information Security -- Risk Assessment -- Planning and Architecture -- Gap Analysis. 
505 8 |a Integration and Deployment -- Operations -- Monitoring -- Legal Compliance and Audit -- Crisis Management -- Principles of Information Security -- Chapter Summary -- Chapter 4: Access Controls -- Introduction -- Confidentiality and Data Integrity -- Who Can Access the Data? -- What is an Access Control? -- Authentication and Authorization -- Authentication and Access Control Layers -- Administrative Access Controls (Layer) -- Access Control Policy -- Personnel related -- jobs, responsibilities, and authorities -- Segregation of duties -- Supporting policies and procedure -- Control Over Information Access to Trade Restricted Persons -- Technical (Logical) Controls -- Passwords -- Smartcards -- Encryption -- Network Access -- System Access -- Physical Access Controls -- Network Segregation -- Perimeter Security -- Security Guards -- Badge Systems -- Biometric Access Controls -- Access Control Strategies -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- Attribute Based Access Control -- Implementing Access Controls -- Access Control Lists (ACLs) -- File System ACLs -- Network ACLs -- AAA Framework -- RADIUS and TACAS+ -- LDAP and Active Directory -- IDAM -- Chapter Summary -- Chapter 5: Information Systems Management -- Introduction -- Risk -- Incident -- Disaster -- Disaster Recovery -- Business Continuity -- Risk Management -- Identification of Risk -- Risk Analysis -- Risk Responses -- Execution of the Risk Treatment Plans -- The Importance of Conducting a Periodic Risk Assessment -- Incident Response -- Incident Response Policy, Plan, and Processes -- Incident Response Policy -- Purpose and Scope of the Policy -- Definition of Information Security Incidents and Related Terms 2 -- Organizational Structure, Roles, Responsibilities, and Authorities -- Ratings of Incidents -- Measurements. 
505 8 |a Incident Response Plan -- Purpose and Scope -- Strategies, Goals, and Approach to Incident Response -- Internal and External Communication Plan -- Plan for the Incident Response Capability 2 -- Measurement of Incident Response Capability and its Effectiveness -- Integration with the Other Plans of the Organization -- Incident Response Processes -- Incident Response Teams -- Incident Response Team structuring based on distribution of the Responsibilities -- Centralized Incident Response Teams 2 -- Distributed Incident Response Teams 2 -- Hybrid Incident Response Teams -- Incident Response Team Structuring Based on who Constitutes the Teams -- Fully Employee Constituted Incident Response Teams -- Fully Outsourced Incident Response Teams -- Hybrid Teams: Partially Constituted by Employees and Partially Constituted by Outsourced Contractors -- Ensuring Effectiveness of Incident Response -- Preparation 2 -- Incident Detection 2 -- Precursors and Indicators of Incidents 2 -- Sources of Precursors and Indicators -- Analysis of the Incidents: 2 -- Incident Im pact Analysis and Prioritization of the Actions 2 -- Incident Documentation and Incident Notification 2 -- Incident Containment, Eradication, and Recovery 2 -- Containment Strategy 2 -- Evidence Gathering and Handling 2 -- Eradication and Recovery 2 -- Post Incident Analysis and Activities 2 -- Analysis of Learnings -- Use of Incident Data 2 -- Disaster Recovery and Business Continuity -- How to Approach Business Continuity Plan -- Assign Clear Roles and Responsibilities -- Sponsor -- Project Manager -- Business Continuity Planning Team -- Life Cycle of Business Continuity Planning -- Scoping -- Plan for Formulation of Business Continuity Plan -- Business Continuity Plan Kick-Off Meeting -- Business Impact Analysis (BIA) -- Business Continuity Plan Preparation. 
505 8 |a Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors. 
505 8 |a Botnets -- A Closer Look at Spyware -- Trojans and Backdoors -- Rootkits -- Viruses and Worms -- Botnets -- Brief History of Viruses, Worms, and Trojans -- The Current Situation -- Anti-Virus Software -- Need for Anti-Virus Software -- Top 5 Commercially Available Anti-Virus Software -- Symantec Norton Anti-Virus Software -- McAfee Anti- Virus -- Kaspersky Anti- Virus -- Bitdefender Anti- Virus -- AVG Anti-Virus Software -- A Few Words of Caution -- Chapter Summary -- Chapter 8: Cryptography -- Introduction -- Cryptographic Algorithms -- Symmetric Key Cryptography -- Key Distribution -- Asymmetric Key Cryptography -- Public Key Cryptography -- RSA Algorithm -- Advantages of Public Key Cryptography -- Applications of PKC -- Public Key Infrastructure (PKI) -- Certificate Authority (CA) -- Digital Certificate -- Hash Function Cryptography -- Popular Hashes -- Digital Signatures -- Summary of Cryptography Standard Algorithms -- Disk / Drive Encryption -- Attacks on Cryptography -- Chapter Summary -- Part IV: Network Security -- Chapter 9: Understanding Networks and Network Security -- Introduction -- Networking Fundamentals -- Computer Communication -- Network and its Components -- Network Protocols -- OSI (Open Systems Interconnection) Reference Model -- TCP/IP Model -- Network Vulnerabilities and Threats -- Vulnerabilities -- Security Policy Weaknesses -- Technology Weaknesses -- Configuration Weaknesses -- Threats -- Attacks -- Reconnaissance -- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) -- Other Attacks on Networks -- How to counter the Network Attacks -- Chapter Summary -- Chapter 10: Firewalls -- Introduction -- How Do You Protect a Network? -- Firewall -- Basic Functions of Firewall -- Packet Filtering -- How a packet filtering firewall works -- TCP Layer -- An Example of Packet Filtering Rules. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Data encryption (Computer science)  |v Handbooks, manuals, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 6 |a Chiffrement (Informatique)  |v Guides, manuels, etc. 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
655 2 |a Handbook 
655 7 |a handbooks.  |2 aat 
655 7 |a Handbooks and manuals  |2 fast 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
700 1 |a Nayak, Umesha,  |e author. 
776 0 8 |a Rao, Umesh Hodeghatta.  |t InfoSec handbook.  |d Berkeley, CA : ApressOpen, 2014  |z 9781430263838  |w (OCoLC)891381085 
830 0 |a Expert's voice in information security. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781430263838/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00072526 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL3081912 
938 |a ebrary  |b EBRY  |n ebr10935077 
938 |a YBP Library Services  |b YANK  |n 12099938 
938 |a Internet Archive  |b INAR  |n infosechandbooki0000raou 
994 |a 92  |b IZTAP