Network Security Strategies
Aditya Mukherjee
- 390 páginas
- English
- ePUB (apto para móviles)
- Disponible en iOS y Android
Network Security Strategies
Aditya Mukherjee
Información del libro
Build a resilient network and prevent advanced cyber attacks and breachesKey Features• Explore modern cybersecurity techniques to protect your networks from ever-evolving cyber threats• Prevent cyber attacks by using robust cybersecurity strategies• Unlock the secrets of network securityBook DescriptionWith advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.You'll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security.By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.What you will learn• Understand network security essentials, including concepts, mechanisms, and solutions to implement secure networks• Get to grips with setting up and threat monitoring cloud and wireless networks• Defend your network against emerging cyber threats in 2020• Discover tools, frameworks, and best practices for network penetration testing• Understand digital forensics to enhance your network security skills• Adopt a proactive approach to stay ahead in network securityWho this book is forThis book is for anyone looking to explore information security, privacy, malware, and cyber threats. Security experts who want to enhance their skill set will also find this book useful. A prior understanding of cyber threats and information security will help you understand the key concepts covered in the book more effectively.
Preguntas frecuentes
Información
- Chapter 1, Network Security Concepts
- Chapter 2, Security for Cloud and Wireless Networks
- Chapter 3, Mitigating the Top Network Threats of 2020
- An overview of network security
- Network security architecture approach
- Network security best practices and guidelines
Technical requirements
An overview of network security
Network security concepts
- Authentication: The process of verifying the identity of a user or process.
- Authorization: This is the process of validating the rights/privileges that a user has for a resource.
- Confidentiality: This refers to protecting information (data and system) from being accessed by unauthorized parties.
- Availability: This refers to data and systems being available for use.
- Integrity: This refers to maintaining the accuracy, consistency, and trustworthiness of data over its entire life cycle.
- Non-repudiation: This refers to the ability to assure that the sender accepts the authenticity of their signature message.
- Resilience: This refers to the ability of an entity to deliver the intended outcome continuously, despite adverse cyber events.
- OSI reference model: 7 layers and their corresponding functions and TCP/IP model
- Networking protocols and concepts: Proxies, security zones, DMZ, subnetting, and NAT/PAT
- Network connectivity devices: Firewall, DLP, IDS/IPS, and load balancer
- Common threats to network security: Virus, worms, trojans, RAT, sniffing, session hijacking, and DoS/DDoS
Network security components
Identify | Detect | Protect | Respond | Recover | Comply |
Breach Stimulation | SOC 1 and SOC 2 | Security Awareness Training | SOAR | Data Backup | ISO Requirements |
Red and Purple Teaming Exercise | Threat Hunting | SecDevOps | Digital Forensics | Data Recovery | GDPR/PIMS/and so on |
Cloud Breach Stimulation | Threat Intel | CASB | Incident Response | Cyber Resilience | National and Regional Policies |
Web/Mobile Application Attacks | Attack Surface Monitoring | WAF Assessment | Cyber Incident Response Team Assessment | BCP and DR | Industry and Regulatory Requirements and Mandates |
Infrastructure Security Attacks | Cloud Security Monitoring | Third-Party Vendor Assessment | |||
Security Architecture and Configuration review | SIEM and SOC Detection Assessment | Data Security and Classification | |||
IoT and IIoT Security | UEBA | Identity and Access Management |