|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Danielle Citron takes the conversation about technology and privacy
out of the boardrooms and op-eds to reach readers where we are - in
our bathrooms and bedrooms; with our families and our lovers; in
all the parts of our lives we assume are untouchable - and shows us
that privacy, as we think we know it, is largely already gone. The
boundary that once protected our intimate lives from outside
interests is an artefact of the 20th century. In the 21st, we have
embraced a vast array of technology that enables constant access
and surveillance of the most private aspects of our lives. From
non-consensual pornography, to online extortion, to the sale of our
data for profit, we are vulnerable to abuse. As Citron reveals,
wherever we live, laws have failed miserably to keep up with
corporate or individual violators, letting our privacy wash out
with the technological tide. And the erosion of intimate privacy in
particular, Citron argues, holds immense toxic power to transform
our lives and our societies for the worse (and already has). With
vivid examples drawn from interviews with victims, activists and
lawmakers from around the world, The Fight for Privacy reveals the
threat we face and argues urgently and forcefully for a
reassessment of privacy as a human right. And, as a legal scholar
and expert, Danielle Citron is the perfect person to show us the
way to a happier, better protected future.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
Understand how to set up, configure, and use Azure Sentinel to
provide security incident and event management services for your
environment Key Features Secure your network, infrastructure, data,
and applications on Microsoft Azure effectively Integrate
artificial intelligence, threat analysis, and automation for
optimal security solutions Investigate possible security breaches
and gather forensic evidence to prevent modern cyber threats Book
DescriptionAzure Sentinel is a Security Information and Event
Management (SIEM) tool developed by Microsoft to integrate cloud
security and artificial intelligence (AI). Azure Sentinel not only
helps clients identify security issues in their environment, but
also uses automation to help resolve these issues. With this book,
you'll implement Azure Sentinel and understand how it can help find
security incidents in your environment with integrated artificial
intelligence, threat analysis, and built-in and community-driven
logic. This book starts with an introduction to Azure Sentinel and
Log Analytics. You'll get to grips with data collection and
management, before learning how to create effective Azure Sentinel
queries to detect anomalous behaviors and patterns of activity. As
you make progress, you'll understand how to develop solutions that
automate the responses required to handle security incidents.
Finally, you'll grasp the latest developments in security, discover
techniques to enhance your cloud security architecture, and explore
how you can contribute to the security community. By the end of
this book, you'll have learned how to implement Azure Sentinel to
fit your needs and be able to protect your environment from cyber
threats and other security issues. What you will learn Understand
how to design and build a security operations center Discover the
key components of a cloud security architecture Manage and
investigate Azure Sentinel incidents Use playbooks to automate
incident responses Understand how to set up Azure Monitor Log
Analytics and Azure Sentinel Ingest data into Azure Sentinel from
the cloud and on-premises devices Perform threat hunting in Azure
Sentinel Who this book is forThis book is for solution architects
and system administrators who are responsible for implementing new
solutions in their infrastructure. Security analysts who need to
monitor and provide immediate security solutions or threat hunters
looking to learn how to use Azure Sentinel to investigate possible
security breaches and gather forensic evidence will also benefit
from this book. Prior experience with cloud security, particularly
Azure, is necessary.
|
|