Cyber Security Essentials

Cyber Security Essentials

Published:
Content:
Editor(s):
Free Standard Shipping

Purchasing Options

Paperback
$69.95 $55.96
ISBN 9781439851234
Cat# K12343
Add to cart
SAVE 20%
eBook (VitalSource)
$69.95 $48.97
ISBN 9781439851265
Cat# KE12363
Add to cart
SAVE 30%
eBook Rentals
Other eBook Options:
 
 

Features

  • Illustrates more than 75 key security concepts with short, easy-to-understand descriptions
  • Explains the concepts behind today’s most prevalent threats, tactics, and procedures
  • Provides actionable advice for the mitigation of common vulnerabilities
  • Supplies a fundamental understanding of the issues impacting cyber security
  • Breaks down the code used to write exploits into understandable diagrams

Summary

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.

To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book:

  • Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors
  • Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding
  • Supplies actionable advice for the mitigation of threats
  • Breaks down the code used to write exploits into understandable diagrams

This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Table of Contents

Cyber Security Fundamentals
Network and Security Concepts 
     Information Assurance Fundamentals
     Basic Cryptography
     Symmetric Encryption
     Public Key Encryption
     The Domain Name System (DNS) 
     Firewalls
     Virtualization
     Radio-Frequency Identification
Microsoft Windows Security Principles
     Windows Tokens
     Window Messaging
     Windows Program Execution
     The Windows Firewall

Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Anti-forensics) 
     How and Why Attackers Use Proxies 
     Tunneling Techniques
Fraud Techniques
     Phishing, Smishing, Vishing and Mobile Malicious Code
     Rogue Anti-Virus
     Click Fraud
Threat Infrastructure 
     Botnets 
     Fast-Flux 
     Advanced Fast-Flux

Exploitation
Techniques to Gain a Foothold
     Shellcode 
      Integer Overflow Vulnerabilities 
     Stack-Based Buffer Overflows 
     Format-String Vulnerabilities
     SQL Injection 
     Malicious PDF Files 
     Race Conditions 
     Web Exploit Tools 
     DoS Conditions 
     Brute-Force and Dictionary Attacks
Misdirection, Reconnaissance and Disruption Methods 
     Cross-Site Scripting (XSS) 
     Social Engineering 
     WarXing 
     DNS Amplification Attacks

Malicious Code
Self-Replicating Malicious Code 
     Worms 
     Viruses
Evading Detection and Elevating Privileges 
     Obfuscation 
     Virtual Machine Obfuscation 
     Persistent Software Techniques 
     Rootkits 
     Spyware 
     Attacks against Privileged User Accounts and Escalation of Privileges 
     Token Kidnapping 
     Virtual Machine Detection
Stealing Information and Exploitation 
     Form Grabbing 
     Man-in-the-Middle Attacks 
     DLL Injection 
     Browser Helper Objects

Defense and Analysis Techniques
Memory Forensics 
     Why Memory Forensics Is Important 
     Capabilities of Memory Forensics 
     Memory Analysis Frameworks 
     Dumping Physical Memory 
     Installing and Using Volatility 
     Finding Hidden Processes 
     Volatility Analyst Pack
Honeypots
Malicious Code Naming
Automated Malicious Code Analysis Systems
     Passive Analysis
     Active Analysis
     Physical or Virtual Machines
Intrusion Detection Systems 

 iDefense Special File Investigation Tools

 

Editor Bio(s)

This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense® Security Intelligence Services; a business unit of VeriSign, Inc.

iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and "three-letter agencies" in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country’s business sectors.

iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the "what", the "when" and the "where"), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the "who" and the "why").

For more information, please contact customerservice@idefense.com.

 
Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us