Discovering Cybersecurity
A Technical Introduction for the Absolute Beginner
Apress
ISBN 978-1-4842-9560-1
Standardpreis
Bibliografische Daten
eBook. PDF
2023
XIV, 443 p. 137 illus..
In englischer Sprache
Umfang: 443 S.
Verlag: Apress
ISBN: 978-1-4842-9560-1
Weiterführende bibliografische Daten
Das Werk ist Teil der Reihe: Professional and Applied Computing (R0) Professional and Applied Computing Apress Access Books
Produktbeschreibung
The contemporary IT landscape is littered with various technologies that vendors claim will "solve" an organization's cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization's mission.
This book introduces major technologies that are employed in today's cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.
What You Will Learn
- Authentication technologies, including secure password storage and how hackers "crack" password lists
- Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC
- Core cryptography technology, including AES encryption and public key signatures
- Classical host security technologies that protect against malware (viruses, trojans, ransomware)
- Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems
- Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them
- Email and social media security threats such as spam, phishing, social media, and other email threats
Autorinnen und Autoren
Produktsicherheit
Hersteller
Springer Nature Customer Service Center GmbH
ProductSafety@springernature.com