Jump to ratings and reviews
Rate this book

Cyber Security 101: Knowing the Enemy & Protecting Your Network

Rate this book
Updated Contents
I. Security Principles -- 4 (Lecture 1)
Introduction -- 5
Ia. Continuous Attacks on Networks -- 20
Ib. Rootkits -- 32
Ic. Seven Myths about the Resilience of
the Commercial Power Grid -- 55
1d. Cryptography and Computer Networks -- 59
Ie. Anatomy of a Cyber attack -- 98
If. System Security -- 107
Ig. Top Security Breaches -- 141
Ih. Mobile data leakage
and Employee risky behavior -- 161

II. Network Security -- 187 (Lecture 2)
IIa. Prevention of Intrusion and Information Security -- 188
IIb. Network Security -- 233
IIc. Cloud Computing and Virtualization -- 267
IId. OS and Computer Architecture -- 277
IIe. Deploying VMware High Availability and Fault
Tolerance cluster on EonNAS (NFS) -- 281
IIf. Client-side Vulnerability Assessment -- 298
IIg. Security Issues NoSQL databases -- 312
IIh. Preventing Cross-site scripting -- 328
IIi. Buffer Overflow -- 342
IIj. Fuzzing Strategy and Tools -- 385
IIk. Securing the Internet of Things -- 402
IIl. BYOD Security -- 409

Appendix -- 420
Glossary -- 431

Using the Internet, hackers and terrorists can tap into thousands of databases, libraries and newsgroups around the world to gather information on any subjects that they need to research. The information can be in the form of text, maps, satellite images, pictures or even video material. The use of search engines, such as Google, have made searching the Internet very easy and allows terrorists to obtain critical information located in the public domain using very simple resources. For example, by typing “Bombs” in the Google search engine, 2,870,000 references were found in 0.17 seconds. To narrow this list, typing “Bombs AND Homemade,” resulted in 47,200 references being found in 0.08 seconds. Although most of these are harmless references that may just refer to news articles, many provide detailed information on how to manufacture bombs. One site not only provided information on bombs, but also provided additional references on subjects such as drugs, fake IDs, fraud, lock picking, and weapons.

The purpose of the tutorial are as follows:
·to assist readers/students in understanding the benefits of a secure network
·to help readers/students place in context their current stage of networking development in their home/office/school.
·to assist readers/students in planning the next stage of network security in their home/office/school.
·to provide standard networking ‘models’ and best practice to readers/students that will assist students in their network planning.

764 pages, Kindle Edition

Published April 3, 2017

1 person want to read

About the author

George Haynes

48 books14 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.