Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing, Limited,
2020.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Section 1: Network Security Concepts, Threats, and Vulnerabilities
- Chapter 1: Network Security Concepts
- Technical requirements
- An overview of network security
- Network security concepts
- Network security components
- Network and system hardening
- Network segmentation
- Network choke-points
- Defense-in-Depth
- Due diligence and cyber resilience
- Soft targets
- Continuous monitoring and improvement
- Post-deployment review
- Network security architecture approach
- Planning and analysis
- Designing
- Building
- Testing
- Deployment
- Post-deployment
- Network security best practices and guidelines
- Network Operations Center overview
- Proper incident management
- Functional ticketing system and knowledge base
- Monitoring policy
- A well-defined investigation process
- Reporting and dashboards
- Escalation
- High availability and failover
- Assessing network security effectiveness
- Key attributes to be considered
- The action priority matrix
- Threat modeling
- Assessing the nature of threats
- STRIDE
- PASTA
- Trike
- VAST
- OCTAVE
- Summary
- Questions
- Further reading
- Chapter 2: Security for Cloud and Wireless Networks
- Technical requirements
- An introduction to secure cloud computing
- AWS' shared responsibility model
- Major cybersecurity challenges with the cloud
- Amazon Web Services (AWS)
- AWS security features
- Well-defined identity capabilities
- Traceability
- Defense in depth
- Automation of security best practices
- Continuous data protection
- Security event response
- Microsoft Azure security technologies
- The Zero Trust model
- Security layers
- Identity management using Azure
- Infrastructure protection using Azure
- Criticality of infrastructure
- Encryption
- Identifying and classifying data
- Encryption on Azure
- Network security
- Internet protection
- Virtual networks
- Network integrations
- CipherCloud
- Securing cloud computing
- Security threats
- Countermeasures
- Wireless network security
- Wi-Fi attack surface analysis and exploitation techniques
- Wi-Fi data collection and analysis
- Wi-Fi attack and exploitation techniques
- Best practices
- Security assessment approach
- Software-defined radio attacks
- Types of radio attacks
- Replay attacks
- Cryptanalysis attacks
- Reconnaissance attacks
- Mitigation techniques
- Summary
- Questions
- Further reading
- Chapter 3: Mitigating the Top Network Threats of 2020
- Technical requirements
- The top 10 network attacks and how to fix them
- Phishing
- the familiar foe
- How to fix phishing threats
- Rogue applications and fake security alerts
- intimidation and imitation
- How to fix rogue applications and software threats
- Insider threats
- the enemy inside the gates
- How to fix insider threats