Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
About This eBook
Title Page
Copyright Page
Credits
Contents at a Glance
Table of Contents
About the Author
About the Technical Reviewer
Dedication
Acknowledgments
We Want to Hear from You!
Reader Services
Introduction
Chapter 1. Introduction to Computer Security
Introduction
How Seriously Should You Take Threats to Network Security?
Identifying Types of Threats
Assessing the Likelihood of an Attack on Your Network
Basic Security Terminology
Concepts and Approaches
How Do Legal Issues Impact Network Security?
Online Security Resources
Summary
Test Your Skills
Chapter 2. Networks and the Internet
Introduction
Network Basics
How the Internet Works
History of the Internet
Basic Network Utilities
Other Network Devices
Advanced Network Communications Topics
Summary
Test Your Skills
Chapter 3. Cyber Stalking, Fraud, and Abuse
Introduction
How Internet Fraud Works
Identity Theft
Cyber Stalking
Protecting Yourself Against Cybercrime
Summary
Test Your Skills
Chapter 4. Denial of Service Attacks
Introduction
DoS Attacks
Illustrating an Attack
Common Tools Used for DoS Attacks
DoS Weaknesses
Specific DoS Attacks
Real-World Examples of DoS Attacks
How to Defend Against DoS Attacks
Summary
Test Your Skills
Chapter 5. Malware
Introduction
Viruses
Trojan Horses
The Buffer-Overflow Attack
Spyware
Other Forms of Malware
Detecting and Eliminating Viruses and Spyware
Summary
Test Your Skills
Chapter 6. Techniques Used by Hackers
Introduction
Basic Terminology
The Reconnaissance Phase
Actual Attacks
Malware Creation
Penetration Testing
The Dark Web
Summary
Test Your Skills
Chapter 7. Industrial Espionage in Cyberspace
Introduction
What Is Industrial Espionage?
Information as an Asset
Real-World Examples of Industrial Espionage
How Does Espionage Occur?
Protecting Against Industrial Espionage
The Industrial Espionage Act
Spear Phishing
Summary
Test Your Skills
Chapter 8. Encryption
Introduction
Cryptography Basics
History of Encryption
Modern Cryptography Methods
Public Key (Asymmetric) Encryption
PGP
Legitimate Versus Fraudulent Encryption Methods
Digital Signatures
Hashing
MAC and HMAC
Steganography
Cryptanalysis
Cryptography Used on the Internet
Quantum Computing Cryptography
Summary
Test Your Skills
Chapter 9. Computer Security Technology
Introduction
Virus Scanners
Firewalls
Antispyware
IDSs
Digital Certificates
SSL/TLS
Virtual Private Networks
Wi-Fi Security
Summary
Test Your Skills
Chapter 10. Security Policies
Introduction
What Is a Policy?
Defining User Policies
Defining System Administration Policies
Defining Access Control
Development Policies
Standards, Guidelines, and Procedures
Disaster Recovery
Important Laws
Summary
Test Your Skills
Chapter 11. Network Scanning and Vulnerability Scanning
Introduction
Basics of Assessing a System
Securing Computer Systems
Scanning Your Network
Getting Professional Help
Summary
Test Your Skills
Chapter 12. Cyber Terrorism and Information Warfare
Introduction
Actual Cases of Cyber Terrorism
Weapons of Cyber Warfare
Economic Attacks
Military Operations Attacks
General Attacks
Supervisory Control and Data Acquisitions (SCADA)
Information Warfare
Actual Cases
Future Trends
Defense Against Cyber Terrorism
Terrorist Recruiting and Communication
TOR and the Dark Web
Summary
Test Your Skills
Chapter 13. Cyber Detective
Introduction
General Searches
Court Records and Criminal Checks
Usenet
Summary
Test Your Skills
Chapter 14. Introduction to Forensics
Introduction
General Guidelines
Finding Evidence on the PC
Finding Evidence in System Logs
Getting Back Deleted Files
Operating System Utilities
The Windows Registry
Mobile Forensics: Cell Phone Concepts
The Need for Forensic Certification
Expert Witnesses
Additional Types of Forensics
Summary
Test Your Skills
Chapter 15. Cybersecurity Engineering
Introduction
Defining Cybersecurity Engineering
SecML
Summary
Test Your Skills
Glossary
Appendix A. Resources
General Computer Crime and Cyber Terrorism
General Knowledge
Cyber Stalking
Identity Theft
Port Scanners and Sniffers
Password Crackers
Countermeasures
Cyber Investigation Tools
General Tools
Virus Research
Appendix B. Answers to the Multiple Choice Questions
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Index
Code Snippets
← Prev
Back
Next →
← Prev
Back
Next →