Advance cyber security / Manmohan Singh [and three others]
Material type:
- text
- unmediated
- volume
- 9781774695333
- 005.8
Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Lagro Branch Reference Section | Reference | R 005.8 Si617a 2023 (Browse shelf(Opens below)) | c. 3 | Room use only | 57929QC | |
![]() |
Main Library Reference Section | Reference | R 005.8 Si617a 2023 (Browse shelf(Opens below)) | c. 1 | Room use only | 57927QC |
Includes index.
Chapter I. Introduction to cybercrime
Computer crime
Unauthorized access
History of cybercrime
Categories of cybercrime
Types of cybercrime
Cybercrime in modern society
Chapter 2. System vulnerabilities
Network vulnerabilities
Key actions
Web application vulnerability (OWASP 10)
Chapter 3. Network security
Firewall
Types of firewall
DMZ
IP addressing scheme
Authentication, authorization, and accounting
Honey pot
Intrusion detection and prevention system
Virtual Private Network (VPN)
VPN security
Network Address Translation (NAT) and port forwarding
Chapter 4. Cyber forensics
In-house investigation
Lifecycle : digital forensics
Issues facing computer forensics
Digital forensics laboratory usages
Special purpose forensics workstation
Basic customized forensic workstation
Stocking hardware peripherals
Computer forensics tools
Chapter 5. IR - incident response
Understanding the cyber security incident
Conducting triage
Carrying out first response
Performing initial analysis
Containing the cyber security incident
Eradicating the cause of the incident
Gathering and preserving evidence
Recover systems, data, and connectivity back to normal
Chapter 6. Online safety and precautions
E-mail scams safety precautions
Securing your computer from cybercrime attacks
Staying safe on social media
Social media safety precautions
Exercising caution when shopping online
Safety installation of application
Prevent spyware from getting onto your computer
Protect your identity online
Golden rules for online safety
Practical approach
There are no comments on this title.