Cybersecurity Fundamentals
eBook - ePub

Cybersecurity Fundamentals

A Real-World Perspective

  1. 288 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Cybersecurity Fundamentals

A Real-World Perspective

About this book

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cybersecurity Fundamentals by Kutub Thakur,Al-Sakib Khan Pathan in PDF and/or ePUB format, as well as other popular books in Education & Computer Networking. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2020
Print ISBN
9780367476489

1

Computers and Networks

Images

1.1 Introduction to Computers

Computer is an electronic device that takes the raw data through the input components and processes that into meaningful information and produces that information through the output components of the device for use. A complete unit of modern computer system consists of many components, which can be classified into two major categories – referred to as the software components and the hardware components as shown in Figure 1.1.
Images
FIGURE 1.1 Personal computer (PC).
The software components consist of the following:
  • Firmware
  • Operating system or OS software
  • Device drivers
  • Application software
And, the hardware components consist of the following:
  • Central processing unit (CPU)
  • Data storage
  • Input devices
  • Output devices (input and output devices are often together called “I/O devices”)
Every software and hardware component can consist of many other small hardware and software items, which altogether form a modern computer machine that we use for our day-to-day activities.

1.2 History of Computers

The history of computers dates back to the 19th century when an English mathematician Charles Babbage first designed a computer named as “Analytic Engine”. That basic design lays the foundation for the evolution of computers to the modern shape and scale.
The history of computers can be divided into five major eras or generations as described below.

1.2.1 First Generation (1937–1946)

The first-generation computers were based on the vacuum tubes. The first machine was invented by J P Eckert and J W Mauchy between 1943 and 1945. It was a huge machine developed in the state of Pennsylvania in the United States. The name of this machine was Electronic Numerical Integrator and Computer (ENIAC). This machine consisted of over 20 thousand vacuum tubes, 70 thousand resistors, and 10 thousand capacitors. The gigantic machine weighed about 30 tons. When it was first powered up, a big dip in power was observed in many surrounding areas of the state.

1.2.2 Second Generation (1947–1962)

The second-generation computers were based on the transistor technology. The first commercial computer named as Universal Automatic Computer (UNIVAC 1) was based on the transistor technology. It was launched in 1951. IBM launched 650 and 700 series computers in 1953. A large number of computer programming languages emerged in the marketplace. The assembly languages got grounds in this computer era.

1.2.3 Third Generation (1963–1971)

The third-generation computers were based on the integrated circuits or ICs. The advent of silicon material miniaturized the size of the transistors, and ICs were built for the electronic circuitries. The punch cards were replaced by the keyboards and new operating systems emerged, which were able to run more than one application simultaneously. The examples of third-generation computers include IBM 360 & 370 and DPD 11.

1.2.4 Fourth Generation (1971–2010)

The fourth-generation computers became very popular with the masses. These computers were mostly based on the very large-scale integration (VLSI) microprocessors. Many new companies and manufacturers of computers emerged in this tenure. New types of machines were introduced with many different types of operating systems and technologies. Personal computers (PCs), laptops, personal digital assistants (PDAs), and other computer machines were introduced under this generation of computers. Windows, Linux, UNIX, Solaris, and Macintosh operating systems were introduced in this era as well.

1.2.5 Fifth Generation (2010–Present)

The fifth-generation computers are those machines that are substantially powered by the artificial intelligence (AI) and ultra-large-scale integration (ULSI) and robotic processes. Although the use of AI started long before 2010, the higher level of influence started in the present decade. This generation includes the new computers such as IBM Watson, multicore processing machines, distributed processing machines, and the latest AI-enabled mobile devices and tablets.

1.3 Components of Modern Computer

As a machine, computer has evolved from first-generation computer to the modern day’s fifth-generation computer machine by passing through many changes in the software and hardware components. The components explained below form a modern computer device extensively used in our regular life and industries nowadays. A few images of modern computers are shown in Figure 1.2.
Images
FIGURE 1.2 Modern computers.

1.3.1 Input Devices

The input devices of a computer are those components that are connected to the computer to insert raw data in different formats for processing purpose. A few major input and output devices are shown in Figure 1.3.
Images
FIGURE 1.3 Computer input/output devices.
The major input devices for our modern computers include the following:
  • Keyboard
  • Microphone
  • Barcode reader
  • Camera
  • Electronic pen
  • Joystick
  • MIDI (Musical Instru...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Preface
  8. About the Authors
  9. 1 Computers and Networks
  10. 2 Cybersecurity Basics
  11. 3 Types of Cyberattacks
  12. 4 Recent Cyberattacks and Their Impact
  13. 5 Types of Computer Malware
  14. 6 Securing Your Computers
  15. 7 Password Management
  16. 8 Prevention from Cyberattacks
  17. 9 Wireless Network Security
  18. 10 Secure Online Shopping and Internet Browsing
  19. 11 Mobile Device Security
  20. 12 Cybersecurity Standards
  21. Index