Local cover image
Local cover image

Advance cyber security / Manmohan Singh [and three others]

By: Contributor(s): Material type: TextTextPublisher: Burlington, Ontario : Arcler Press, [2023]Description: xviii, 269 pages : color illustrationsContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781774695333
Subject(s): DDC classification:
  • 005.8
Contents:
Chapter I. Introduction to cybercrime
Computer crime
Unauthorized access
History of cybercrime
Categories of cybercrime
Types of cybercrime
Cybercrime in modern society
Chapter 2. System vulnerabilities
Network vulnerabilities
Key actions
Web application vulnerability (OWASP 10)
Chapter 3. Network security
Firewall
Types of firewall
DMZ
IP addressing scheme
Authentication, authorization, and accounting
Honey pot
Intrusion detection and prevention system
Virtual Private Network (VPN)
VPN security
Network Address Translation (NAT) and port forwarding
Chapter 4. Cyber forensics
In-house investigation
Lifecycle : digital forensics
Issues facing computer forensics
Digital forensics laboratory usages
Special purpose forensics workstation
Basic customized forensic workstation
Stocking hardware peripherals
Computer forensics tools
Chapter 5. IR - incident response
Understanding the cyber security incident
Conducting triage
Carrying out first response
Performing initial analysis
Containing the cyber security incident
Eradicating the cause of the incident
Gathering and preserving evidence
Recover systems, data, and connectivity back to normal
Chapter 6. Online safety and precautions
E-mail scams safety precautions
Securing your computer from cybercrime attacks
Staying safe on social media
Social media safety precautions
Exercising caution when shopping online
Safety installation of application
Prevent spyware from getting onto your computer
Protect your identity online
Golden rules for online safety
Practical approach
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Barcode
Book Book Lagro Branch Reference Section Reference R 005.8 Si617a 2023 (Browse shelf(Opens below)) c. 3 Room use only 57929QC
Book Book Main Library Reference Section Reference R 005.8 Si617a 2023 (Browse shelf(Opens below)) c. 1 Room use only 57927QC
Browsing Cubao Branch shelves, Shelving location: Reference Section, Collection: Reference Close shelf browser (Hides shelf browser)
R 005.743 F967b 2024 Beginning Power BI for business users : learning to turn data into insights R 005.76 P913c 2012 Concepts of database management R 005.8 R351d 2023 Data governance for dummies R 005.8 Si617a 2023 Advance cyber security R 006.66 Si617c 2023 Computer graphics science R 006.74 V872h 2016 HTML5 and CSS3 complete R 006.74 W629b 2003 Basic HTML

Includes index.

Chapter I. Introduction to cybercrime

Computer crime

Unauthorized access

History of cybercrime

Categories of cybercrime

Types of cybercrime

Cybercrime in modern society

Chapter 2. System vulnerabilities

Network vulnerabilities

Key actions

Web application vulnerability (OWASP 10)

Chapter 3. Network security

Firewall

Types of firewall

DMZ

IP addressing scheme

Authentication, authorization, and accounting

Honey pot

Intrusion detection and prevention system

Virtual Private Network (VPN)

VPN security

Network Address Translation (NAT) and port forwarding

Chapter 4. Cyber forensics

In-house investigation

Lifecycle : digital forensics

Issues facing computer forensics

Digital forensics laboratory usages

Special purpose forensics workstation

Basic customized forensic workstation

Stocking hardware peripherals

Computer forensics tools

Chapter 5. IR - incident response

Understanding the cyber security incident

Conducting triage

Carrying out first response

Performing initial analysis

Containing the cyber security incident

Eradicating the cause of the incident

Gathering and preserving evidence

Recover systems, data, and connectivity back to normal

Chapter 6. Online safety and precautions

E-mail scams safety precautions

Securing your computer from cybercrime attacks

Staying safe on social media

Social media safety precautions

Exercising caution when shopping online

Safety installation of application

Prevent spyware from getting onto your computer

Protect your identity online

Golden rules for online safety

Practical approach

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image