Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About the Author
Prologue
Introduction
Chapter 1: Cyber Security Standards
Payment Card Industry Data Security Standard (PCI DSS)
Sarbanes-Oxley Act (SOX)
Chapter 2: What’s In Place
Key Questions to Ask
When There is a Plan
Chart to Assist in Determining What is in Place
Chapter 3: Risks and Mitigations
Why Have Cyber Security?
What Are The Risks?
Security Policy
Cyber Terrorism or Cyber Attack?
Getting Started
Physical Security Is an Important Part of Cyber Security
Passwords
Anti-Virus Software
Firewalls
Spyware and Viruses
Malicious Code
Chapter 4: Impacts and Preparation
Preparations Before an Event or Incident
Cyber Security Incident Response (CSIRT)
Chapter 5: The Attack
Cyber Attacks can take the form of:
What Can Be Done?
Implement at a Minimum.
Process for Cyber Security
Goals and Motivation
Motivation
Cyber Attack Tools
Viruses
Chapter 6: Protection
Protecting the Data Center
Intrusion Detection
Four Types of IDS/IPS
Honeypots
Security Information and Event Management
Summary:
Chapter 7: Self-Assessment Tests
Chapter 1 Test
Chapter 2 Test
Chapter 3 Test
Chapter 4 Test
Chapter 5 Test
Chapter 6 Test
Chapter 8: Self-Assessment Tests (Answers)
Chapter 1 Test
Chapter 2 Test
Chapter 3 Test
Chapter 4 Test
Chapter 5 Test
Chapter 6 Test
Contact the Author
← Prev
Back
Next →
← Prev
Back
Next →