توضیحاتی در مورد کتاب Cybersecurity and Identity Access Management
نام کتاب : Cybersecurity and Identity Access Management
ویرایش : 1st ed. 2023
عنوان ترجمه شده به فارسی : امنیت سایبری و مدیریت دسترسی به هویت
سری :
نویسندگان : Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 240
ISBN (شابک) : 9811926573 , 9789811926570
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 6 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Contents
1 Cybersecurity for Beginners
1.1 Introduction to Cybersecurity
1.2 Necessity of Cybersecurity
1.3 Cybersecurity Challenges
1.4 Cybersecurity Threats
1.5 Cyberattack Life Cycle
1.6 Cybersecurity Principles
1.7 Cybersecurity Standards
1.8 Cybersecurity Framework
1.9 Fundamentals of Cybersecurity
1.10 Why is Cybersecurity Important?
1.10.1 Confidentiality
1.10.2 Integrity
1.10.3 Availability
1.11 Why Do We Implement Cybersecurity?
1.12 Cybersecurity Attacks and Their Types
1.12.1 Malware Attack
1.12.2 Phishing Attacks
1.12.3 Denial-of-Service Attacks
1.12.4 SQL Injection Attacks
1.12.5 Cross-Site Scripting
1.12.6 Man-In-The-Middle Attacks
1.13 Cybersecurity Development
1.14 Advantages of Cyber Security
1.15 Applications of Cybersecurity
2 The Basics of Hacking and Penetration Testing
2.1 Hacking Introduction
2.2 Ethical Hacking
2.3 Types of Cybercrime
2.4 Denial-of-Service Attacks (DoS)
2.5 Penetration Testing
2.5.1 Penetration Testing Versus Vulnerability Assessment
2.5.2 Types of Penetration Testing
2.5.3 Penetration Testing—Manual and Automated
2.5.4 Penetration Testing Tools
2.5.5 Infrastructure Penetration Testing
2.5.6 Penetration Testing—Tester
2.5.7 Penetration Testing—Report Writing
2.5.8 Penetration Testing—Ethical Hacking
2.5.9 Penetration Testing Limitations
3 Hacking for Dummies
3.1 Security Hacker
3.2 Classifications of Hacker
3.3 Common Hacking Tools
3.4 Common Hacking Techniques
3.4.1 Ethical Hacking
3.5 Developing Ethical Hacking Plan
3.6 Types of Security Testing
3.7 Ethical Hacking Tools
3.8 Physical Security
3.9 Risk Assessment
4 Networking All-In-One for Dummies
4.1 Network Introduction
4.2 Packet Network
4.3 Topology of Network
4.3.1 Types of Topologies
4.4 Operating System for the Network
4.5 Hardware Networking
4.5.1 Range of the Network Hardware
4.5.2 Computer Components of the Necessary Hardware
4.6 Network Setup
4.7 The Function of Prediction
4.8 Network Security
4.9 Defense Against Computers
4.10 Sharing of the Network
4.10.1 Operation of Network Sharing
4.11 Goals and Competences
4.11.1 Appearances of Problem-Solving
5 Effective Cybersecurity
5.1 Attacks and Vulnerabilities
5.2 Community of Security of Information
5.3 Cybersecurity Managed
5.4 Network Security Governance Framework
5.5 Risk Assessment of Structures
5.6 Security Evaluation Aim
5.6.1 Methodological Approach
5.6.2 Checking for Protection
5.6.3 Protection and Privacy
5.7 Evaluation of Risk
5.8 Study of the Cyber Danger
5.9 Risk Evaluation Forms
5.10 Safety for Software Development
5.11 Strike Cyber
5.12 Facts
6 Malware
6.1 What Does Malware Do?
6.2 How to Protect Against Malware?
6.3 Malware Analyzing Tools
6.3.1 Basic Malware Exploring Tools
6.3.2 Dynamic Malware Analyzing Tools
6.3.3 Difference Between Static and Dynamic Malware Analysis Tools
6.3.4 Warning Signs to Identify Malware Infection
6.4 Most Dangerous Malware of 2018
6.4.1 Malware Detection Techniques Used by Antivirus
6.4.2 Tips to Prevents the System from Malware Actions
7 Firewalls
7.1 Importance of Firewalls
7.2 Uses of Firewalls
7.3 How Does Firewall Works
7.4 Types of Firewall
7.5 Benefits of Firewalls
7.6 Advantages and Disadvantages of Firewalls
7.7 Firewall Threats and Vulnerability
8 Cryptography
8.1 Evaluation of Cryptography
8.2 Features of Cryptography
8.3 Types of Cryptography
8.4 Cryptography and Network Security Principles
8.5 Cryptographic Algorithms
8.6 Tools for Cryptography
8.7 Advantages and Disadvantages of Cryptography
8.8 Applications of Cryptography
9 Control Physical and Logical Access to Assets
9.1 Managing Access to Assets
9.2 Why Access Control is Required: The CIA Triad
9.3 Classification of Access Control
9.3.1 Preventive Access Control
9.3.2 Detective Access Control
9.3.3 Corrective Access Control
9.3.4 Deterrent Access Control
9.3.5 Recovery Access Control
9.3.6 Directive Access Control
9.3.7 Compensation Access Control
9.3.8 Administrative Access Controls
9.3.9 Logical/Technical Controls
9.3.10 Physical Access Controls
10 Manage the Identification and Authentication of People, Devices, and Services
10.1 Registration and Identity Proofing
10.2 Authorization and Accountability
10.3 Effective Password Mechanisms
11 Integrate Identity as a Third-Party Service
11.1 Identity Management Techniques
11.2 Credential Management Systems
12 Implement and Manage Authorization Mechanisms
13 Managing the Identity and Access Provisioning Life Cycle
14 Conduct Security Control Testing
15 Collect Security Process Data
16 Recovery Strategies for Database
17 Analyze Test Output and Generate a Report
18 Ensure Appropriate Asset Retention
19 Determine Information and Security Controls
References