|
|
Showing 1 - 2 of
2 matches in All Departments
Cyber security is one of the most critical problems faced by
enterprises, government organizations, education institutes, small
and medium scale businesses, and medical institutions today.
Creating a cyber security posture through proper cyber security
architecture, deployment of cyber defense tools, and building a
security operation center are critical for all such organizations
given the preponderance of cyber threats. However, cyber defense
tools are expensive, and many small and medium-scale business
houses cannot procure these tools within their budgets. Even those
business houses that manage to procure them cannot use them
effectively because of the lack of human resources and the
knowledge of the standard enterprise security architecture. In
2020, the C3i Center at the Indian Institute of Technology Kanpur
developed a professional certification course where IT
professionals from various organizations go through rigorous
six-month long training in cyber defense. During their training,
groups within the cohort collaborate on team projects to develop
cybersecurity solutions for problems such as malware analysis,
threat intelligence collection, endpoint detection and protection,
network intrusion detection, developing security incidents, event
management systems, etc. All these projects leverage open-source
tools, and code from various sources, and hence can be also
constructed by others if the recipe to construct such tools is
known. It is therefore beneficial if we put these recipes out in
the form of book chapters such that small and medium scale
businesses can create these tools based on open-source components,
easily following the content of the chapters. In 2021, we published
the first volume of this series based on the projects done by
cohort 1 of the course. This volume, second in the series has new
recipes and tool development expertise based on the projects done
by cohort 3 of this training program. This volume consists of nine
chapters that describe experience and know-how of projects in
malware analysis, web application security, intrusion detection
system, and honeypot in sufficient detail so they can be recreated
by anyone looking to develop home grown solutions to defend
themselves from cyber-attacks.
Many small and medium scale businesses cannot afford to procure
expensive cybersecurity tools. In many cases, even after
procurement, lack of a workforce with knowledge of the standard
architecture of enterprise security, tools are often used
ineffectively. The Editors have developed multiple projects which
can help in developing cybersecurity solution architectures and the
use of the right tools from the open-source software domain. This
book has 8 chapters describing these projects in detail with
recipes on how to use open-source tooling to obtain standard cyber
defense and the ability to do self-penetration testing and
vulnerability assessment. This book also demonstrates work related
to malware analysis using machine learning and implementation of
honeypots, network Intrusion Detection Systems in a security
operation center environment. It is essential reading for
cybersecurity professionals and advanced students.
|
You may like...
The Highway Rat
Julia Donaldson
Paperback
(1)
R233
R212
Discovery Miles 2 120
Fox's Socks
Julia Donaldson
Board book
(1)
R245
R222
Discovery Miles 2 220
Gans
Laura Wall
Paperback
R100
R93
Discovery Miles 930
|