Cybersecurity A Practical Engineering Approach Chapman Hall CRC Textbooks in Computing 1st Edition by Henrique MD Santos – Ebook PDF Instant Download/Delivery: 9780367252427 ,0367252422
Full download Cybersecurity A Practical Engineering Approach Chapman Hall CRC Textbooks in Computing 1st Edition after payment
Product details:
ISBN 10: 0367252422
ISBN 13: 9780367252427
Author: Henrique MD Santos
Cybersecurity A Practical Engineering Approach Chapman Hall CRC Textbooks in Computing 1st Edition Table of contents:
Chapter 1 ◾ Cybersecurity Fundamentals
1.1 Summary
1.2 Introduction
1.3 Problem statement and chapter exercise description
1.4 Information Security Model based on ISO/IEC 27001
1.4.1 Main Information Security Properties
1.4.2 Resource or Asset
1.4.3 Security Events and Incidents
1.4.4 Threats
1.4.5 Attack
1.4.6 Vulnerability
1.4.7 Security Controls
1.4.8 Cybersecurity Risk
1.4.9 InfoSec Model Implementation
1.5 Risk Assessment Basis
1.5.1 Risk Analysis
1.5.2 Risk Evaluation
1.6 Security Controls
1.7 Exercises
1.8 Information Security Evaluation
1.8.1 Security Metrics and Measurements
1.8.1.1 The Effect of Maturity
1.8.1.2 Details about metrics
1.9 Cybersecurity Lab Requirements and Implementation
1.9.1 Host Machine
1.9.2 Virtualization Platform
1.9.3 Network Issues
1.9.4 External Interface and Integration Issues
Chapter 2 ◾ Access Control Techniques
2.1 Summary
2.2 Problem Statement and Chapter Exercise Description
2.3 Access Control fundamentals
2.3.1 Basic Components
2.4 Access Control Models
2.4.1 Specification Languages
2.4.2 Bell-Lapadula Model
2.4.3 Biba Model
2.4.4 Clark-Wilson Model
2.4.5 Chinese Wall Model
2.4.6 Lattices for Multilevel Models
2.5 Network Access Control
2.5.1 RADIUS
2.5.2 TACACS+
2.5.3 802.1X Authentication
2.5.4 Kerberos
2.6 Exercises
2.7 Authentication Modalities
2.7.1 Knowledge-Based
2.7.2 Token-Based
2.7.3 ID-Based (Biometrics)
2.7.4 Multimodal Authentication
2.8 Identity Management
2.8.1 A Framework for IdM in Cyberspace
Chapter 3 ◾ Basic Cryptography Operations
3.1 Summary
3.2 Problem Statement and Chapter Exercise Description
3.3 Concepts and Terminology
3.3.1 Key-Based Algorithms
3.3.1.1 Symmetric Key Algorithms
3.3.1.2 Public-Key Algorithms
3.3.1.3 Attack Types
3.3.2 Hash Functions
3.3.3 Digital Signatures
3.3.4 Key Management Issues
3.3.5 Email Security Protocols
3.3.6 Public-Key Infrastructures (PKI)
3.4 PKI Tools
3.5 Exercises
3.5.1 Basic Tasks
3.5.2 Advanced Tasks
Chapter 4 ◾ Internet and Web Communication Models
4.1 Summary
4.2 Computer Network Fundamentals
4.2.1 Link Level
4.2.2 Network Level
4.2.2.1 ICMP protocol
4.2.2.2 Security issues at the link level
4.2.3 Transport Level
4.2.3.1 TCP
4.2.3.2 UDP
4.2.3.3 Security issues at the transport level
4.2.4 Application Level
4.3 Problem Statement and Chapter Exercise Description
4.4 Network Analysis Tools
4.5 Network Traffic Anomaly Signs
4.6 Analysis strategy
4.7 Exercises
Chapter 5 ◾ Synthesis of Perimeter Security Technologies
5.1 Summary
5.2 Preliminary considerations
5.2.1 Defense in Depth
5.3 Problem statement and chapter exercise description
5.4 Firewalls
5.4.1 Netfilter/Iptables – Where It All Begins
5.4.2 Iptables – Looking into the Future
5.4.3 Firewall Types
5.5 Exercise – Firewall
5.5.1 Summary of Tasks
5.5.2 Basic Tasks
5.5.3 Advanced Tasks
5.6 Intrusion detection systems (IDS)
5.6.1 IDS Types
5.6.2 IDS Evaluation
5.7 Exercise – Intrusion Detection
5.7.1 Summary of Tasks
5.7.2 Basic Tasks
5.7.3 Advanced Tasks
5.7.4 Recommended Complementary Tasks
5.8 Network and Transport Security Protocols
5.8.1 VPNs
5.8.2 TLS/SSL
5.8.3 SSH
5.8.4 IPSec
5.9 Exercise – Security Protocols
Chapter 6 ◾ Anatomy of Network and Computer Attacks
6.1 Summary
6.2 Introduction to Pentest
6.2.1 Types of Pentest
6.2.2 Pentest Limitations
6.3 Problem statement and chapter exercise description
6.4 Introduction to Kali Linux
6.5 Information gathering
6.6 Scanning ports and services
6.7 Vulnerability Scanning
6.8 Target enumeration
6.9 Target exploitation
6.10 Exercises
Bibliography
Index
People also search for Cybersecurity A Practical Engineering Approach Chapman Hall CRC Textbooks in Computing 1st Edition:
cybersecurity a practical engineering approach chapman hall
cybersecurity a practical engineering approach
cybersecurity engineering uah flowchart
chapman cyber security
cybersecurity a practical guide to the law of cyber risk
Tags: Henrique MD Santos, Cybersecurity, Practical Engineering, Chapman Hall