|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Plug the gaps in your network's infrastructure with resilient
network security models Key Features Develop a cost-effective and
end-to-end vulnerability management program Explore best practices
for vulnerability scanning and risk assessment Understand and
implement network enumeration with Nessus and Network Mapper (Nmap)
Book DescriptionDigitization drives technology today, which is why
it's so important for organizations to design security mechanisms
for their network infrastructures. Analyzing vulnerabilities is one
of the best ways to secure your network infrastructure. This
Learning Path begins by introducing you to the various concepts of
network security assessment, workflows, and architectures. You will
learn to employ open source tools to perform both active and
passive network scanning and use these results to analyze and
design a threat model for network security. With a firm
understanding of the basics, you will then explore how to use
Nessus and Nmap to scan your network for vulnerabilities and open
ports and gain back door entry into a network. As you progress
through the chapters, you will gain insights into how to carry out
various key scanning tasks, including firewall detection, OS
detection, and access management to detect vulnerabilities in your
network. By the end of this Learning Path, you will be familiar
with the tools you need for network scanning and techniques for
vulnerability scanning and network protection. This Learning Path
includes content from the following Packt books: Network Scanning
Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar
Rahalkar What you will learn Explore various standards and
frameworks for vulnerability assessments and penetration testing
Gain insight into vulnerability scoring and reporting Discover the
importance of patching and security hardening Develop metrics to
measure the success of a vulnerability management program Perform
configuration audits for various platforms using Nessus Write
custom Nessus and Nmap scripts on your own Install and configure
Nmap and Nessus in your network infrastructure Perform host
discovery to identify network devices Who this book is forThis
Learning Path is designed for security analysts, threat analysts,
and security professionals responsible for developing a network
threat model for an organization. Professionals who want to be part
of a vulnerability management team and implement an end-to-end
robust vulnerability management program will also find this
Learning Path useful.
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
Build your organization's cyber defense system by effectively
implementing digital forensics and incident management techniques
Key Features Create a solid incident response framework and manage
cyber incidents effectively Perform malware analysis for effective
incident response Explore real-life scenarios that effectively use
threat intelligence and modeling techniques Book DescriptionAn
understanding of how digital forensics integrates with the overall
response to cybersecurity incidents is key to securing your
organization's infrastructure from attacks. This updated second
edition will help you perform cutting-edge digital forensic
activities and incident response. After focusing on the
fundamentals of incident response that are critical to any
information security team, you'll move on to exploring the incident
response framework. From understanding its importance to creating a
swift and effective response to security incidents, the book will
guide you with the help of useful examples. You'll later get up to
speed with digital forensic techniques, from acquiring evidence and
examining volatile memory through to hard drive examination and
network-based evidence. As you progress, you'll discover the role
that threat intelligence plays in the incident response process.
You'll also learn how to prepare an incident response report that
documents the findings of your analysis. Finally, in addition to
various incident response activities, the book will address malware
analysis, and demonstrate how you can proactively use your digital
forensic skills in threat hunting. By the end of this book, you'll
have learned how to efficiently investigate and report unwanted
security breaches and incidents in your organization. What you will
learn Create and deploy an incident response capability within your
own organization Perform proper evidence acquisition and handling
Analyze the evidence collected and determine the root cause of a
security incident Become well-versed with memory and log analysis
Integrate digital forensic techniques and procedures into the
overall incident response process Understand the different
techniques for threat hunting Write effective incident reports that
document the key findings of your analysis Who this book is forThis
book is for cybersecurity and information security professionals
who want to implement digital forensics and incident response in
their organization. You will also find the book helpful if you are
new to the concept of digital forensics and are looking to get
started with the fundamentals. A basic understanding of operating
systems and some knowledge of networking fundamentals are required
to get started with this book.
Updated and revised edition of the bestselling guide to developing
defense strategies against the latest threats to cybersecurity Key
Features Covers the latest security threats and defense strategies
for 2020 Introduces techniques and skillsets required to conduct
threat hunting and deal with a system breach Provides new
information on Cloud Security Posture Management, Microsoft Azure
Threat Protection, Zero Trust Network strategies, Nation State
attacks, the use of Azure Sentinel as a cloud-based SIEM for
logging and investigation, and much more Book
DescriptionCybersecurity - Attack and Defense Strategies, Second
Edition is a completely revised new edition of the bestselling
book, covering the very latest security threats and defense
mechanisms including a detailed overview of Cloud Security Posture
Management (CSPM) and an assessment of the current threat
landscape, with additional focus on new IoT threats and
cryptomining. Cybersecurity starts with the basics that
organizations need to know to maintain a secure posture against
outside threat and design a robust cybersecurity program. It takes
you into the mindset of a Threat Actor to help you better
understand the motivation and the steps of performing an actual
attack - the Cybersecurity kill chain. You will gain hands-on
experience in implementing cybersecurity using new techniques in
reconnaissance and chasing a user's identity that will enable you
to discover how a system is compromised, and identify and then
exploit the vulnerabilities in your own system. This book also
focuses on defense strategies to enhance the security of a system.
You will also discover in-depth tools, including Azure Sentinel, to
ensure there are security controls in each network layer, and how
to carry out the recovery process of a compromised system. What you
will learn The importance of having a solid foundation for your
security posture Use cyber security kill chain to understand the
attack strategy Boost your organization's cyber resilience by
improving your security policies, hardening your network,
implementing active sensors, and leveraging threat intelligence
Utilize the latest defense tools, including Azure Sentinel and Zero
Trust Network strategy Identify different types of cyberattacks,
such as SQL injection, malware and social engineering threats such
as phishing emails Perform an incident investigation using Azure
Security Center and Azure Sentinel Get an in-depth understanding of
the disaster recovery process Understand how to consistently
monitor security and implement a vulnerability management strategy
for on-premises and hybrid cloud Learn how to perform log analysis
using the cloud to identify suspicious activities, including logs
from Amazon Web Services and Azure Who this book is forFor the IT
professional venturing into the IT security domain, IT pentesters,
security consultants, or those looking to perform ethical hacking.
Prior knowledge of penetration testing is beneficial.
Explore open-source Linux tools and advanced binary analysis
techniques to analyze malware, identify vulnerabilities in code,
and mitigate information security risks Key Features Adopt a
methodological approach to binary ELF analysis on Linux Learn how
to disassemble binaries and understand disassembled code Discover
how and when to patch a malicious binary during analysis Book
DescriptionBinary analysis is the process of examining a binary
program to determine information security actions. It is a complex,
constantly evolving, and challenging topic that crosses over into
several domains of information technology and security. This binary
analysis book is designed to help you get started with the basics,
before gradually advancing to challenging topics. Using a
recipe-based approach, this book guides you through building a lab
of virtual machines and installing tools to analyze binaries
effectively. You'll begin by learning about the IA32 and ELF32 as
well as IA64 and ELF64 specifications. The book will then guide you
in developing a methodology and exploring a variety of tools for
Linux binary analysis. As you advance, you'll learn how to analyze
malicious 32-bit and 64-bit binaries and identify vulnerabilities.
You'll even examine obfuscation and anti-analysis techniques,
analyze polymorphed malicious binaries, and get a high-level
overview of dynamic taint analysis and binary instrumentation
concepts. By the end of the book, you'll have gained comprehensive
insights into binary analysis concepts and have developed the
foundational skills to confidently delve into the realm of binary
analysis. What you will learn Traverse the IA32, IA64, and ELF
specifications Explore Linux tools to disassemble ELF binaries
Identify vulnerabilities in 32-bit and 64-bit binaries Discover
actionable solutions to overcome the limitations in analyzing ELF
binaries Interpret the output of Linux tools to identify security
risks in binaries Understand how dynamic taint analysis works Who
this book is forThis book is for anyone looking to learn how to
dissect ELF binaries using open-source tools available in Linux. If
you're a Linux system administrator or information security
professional, you'll find this guide useful. Basic knowledge of
Linux, familiarity with virtualization technologies and the working
of network sockets, and experience in basic Python or Bash
scripting will assist you with understanding the concepts in this
book
Conversations in Cyberspace is a collection of insights on the
current state of security and privacy in the Internet world. The
book contains a brief introduction to some of the most used
open-source intelligence (OSINT) tools and a selection of
interviews with some of the key figures in industrial control
systems (ICS), advanced persistent threat (APT) and online/deep web
members organizations. It aims to be an introduction to the
relationships between security, OSINT and the vast and complex
world hiding in the deep web. The information provided will be
beneficial to security professionals and system administrators
interested in exploring today's concerns in database design,
privacy and security-by-design, and deep web members organizations,
including Cicada 3301, the Unknowns, Anonymous, and more.
|
|