Advance cyber security
Singh, Manmohan
Advance cyber security / Manmohan Singh [and three others] - xviii, 269 pages : color illustrations
Includes index.
Chapter I. Introduction to cybercrime Computer crime Unauthorized access History of cybercrime Categories of cybercrime Types of cybercrime Cybercrime in modern society Chapter 2. System vulnerabilities Network vulnerabilities Key actions Web application vulnerability (OWASP 10) Chapter 3. Network security Firewall Types of firewall DMZ IP addressing scheme Authentication, authorization, and accounting Honey pot Intrusion detection and prevention system Virtual Private Network (VPN) VPN security Network Address Translation (NAT) and port forwarding Chapter 4. Cyber forensics In-house investigation Lifecycle : digital forensics Issues facing computer forensics Digital forensics laboratory usages Special purpose forensics workstation Basic customized forensic workstation Stocking hardware peripherals Computer forensics tools Chapter 5. IR - incident response Understanding the cyber security incident Conducting triage Carrying out first response Performing initial analysis Containing the cyber security incident Eradicating the cause of the incident Gathering and preserving evidence Recover systems, data, and connectivity back to normal Chapter 6. Online safety and precautions E-mail scams safety precautions Securing your computer from cybercrime attacks Staying safe on social media Social media safety precautions Exercising caution when shopping online Safety installation of application Prevent spyware from getting onto your computer Protect your identity online Golden rules for online safety Practical approach
9781774695333
Computer security
Data protection
005.8
Advance cyber security / Manmohan Singh [and three others] - xviii, 269 pages : color illustrations
Includes index.
Chapter I. Introduction to cybercrime Computer crime Unauthorized access History of cybercrime Categories of cybercrime Types of cybercrime Cybercrime in modern society Chapter 2. System vulnerabilities Network vulnerabilities Key actions Web application vulnerability (OWASP 10) Chapter 3. Network security Firewall Types of firewall DMZ IP addressing scheme Authentication, authorization, and accounting Honey pot Intrusion detection and prevention system Virtual Private Network (VPN) VPN security Network Address Translation (NAT) and port forwarding Chapter 4. Cyber forensics In-house investigation Lifecycle : digital forensics Issues facing computer forensics Digital forensics laboratory usages Special purpose forensics workstation Basic customized forensic workstation Stocking hardware peripherals Computer forensics tools Chapter 5. IR - incident response Understanding the cyber security incident Conducting triage Carrying out first response Performing initial analysis Containing the cyber security incident Eradicating the cause of the incident Gathering and preserving evidence Recover systems, data, and connectivity back to normal Chapter 6. Online safety and precautions E-mail scams safety precautions Securing your computer from cybercrime attacks Staying safe on social media Social media safety precautions Exercising caution when shopping online Safety installation of application Prevent spyware from getting onto your computer Protect your identity online Golden rules for online safety Practical approach
9781774695333
Computer security
Data protection
005.8