Cargando…

Network Security Strategies Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mukherjee, Aditya
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • About Packt
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: Network Security Concepts, Threats, and Vulnerabilities
  • Chapter 1: Network Security Concepts
  • Technical requirements
  • An overview of network security
  • Network security concepts
  • Network security components
  • Network and system hardening
  • Network segmentation
  • Network choke-points
  • Defense-in-Depth
  • Due diligence and cyber resilience
  • Soft targets
  • Continuous monitoring and improvement
  • Post-deployment review
  • Network security architecture approach
  • Planning and analysis
  • Designing
  • Building
  • Testing
  • Deployment
  • Post-deployment
  • Network security best practices and guidelines
  • Network Operations Center overview
  • Proper incident management
  • Functional ticketing system and knowledge base
  • Monitoring policy
  • A well-defined investigation process
  • Reporting and dashboards
  • Escalation
  • High availability and failover
  • Assessing network security effectiveness
  • Key attributes to be considered
  • The action priority matrix
  • Threat modeling
  • Assessing the nature of threats
  • STRIDE
  • PASTA
  • Trike
  • VAST
  • OCTAVE
  • Summary
  • Questions
  • Further reading
  • Chapter 2: Security for Cloud and Wireless Networks
  • Technical requirements
  • An introduction to secure cloud computing
  • AWS' shared responsibility model
  • Major cybersecurity challenges with the cloud
  • Amazon Web Services (AWS)
  • AWS security features
  • Well-defined identity capabilities
  • Traceability
  • Defense in depth
  • Automation of security best practices
  • Continuous data protection
  • Security event response
  • Microsoft Azure security technologies
  • The Zero Trust model
  • Security layers
  • Identity management using Azure
  • Infrastructure protection using Azure
  • Criticality of infrastructure
  • Encryption
  • Identifying and classifying data
  • Encryption on Azure
  • Network security
  • Internet protection
  • Virtual networks
  • Network integrations
  • CipherCloud
  • Securing cloud computing
  • Security threats
  • Countermeasures
  • Wireless network security
  • Wi-Fi attack surface analysis and exploitation techniques
  • Wi-Fi data collection and analysis
  • Wi-Fi attack and exploitation techniques
  • Best practices
  • Security assessment approach
  • Software-defined radio attacks
  • Types of radio attacks
  • Replay attacks
  • Cryptanalysis attacks
  • Reconnaissance attacks
  • Mitigation techniques
  • Summary
  • Questions
  • Further reading
  • Chapter 3: Mitigating the Top Network Threats of 2020
  • Technical requirements
  • The top 10 network attacks and how to fix them
  • Phishing
  • the familiar foe
  • How to fix phishing threats
  • Rogue applications and fake security alerts
  • intimidation and imitation
  • How to fix rogue applications and software threats
  • Insider threats
  • the enemy inside the gates
  • How to fix insider threats