Network Security Strategies
Protect your network and enterprise against advanced cybersecurity attacks and threats
Aditya Mukherjee
BIRMINGHAM - MUMBAI
Network Security Strategies
Copyright 2020 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author(s), nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
Commissioning Editor: Vijin Boricha
Acquisition Editor: Meeta Rajani
Content Development Editor: Carlton Borges/Alokita Amanna
Senior Editor: Rahul Dsouza
Technical Editor: Sarvesh Jaywant
Copy Editor: Safis Editing
Project Coordinator: Neil Dmello
Proofreader: Safis Editing
Indexer: Rekha Nair
Production Designer: Jyoti Chauhan
First published: October 2020
Production reference: 1061020
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.
ISBN 978-1-78980-629-8
www.packt.com
Packt.com
Subscribe to our online digital library for full access to over 7,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.
Why subscribe?
Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
Improve your learning with Skill Plans built especially for you
Get a free eBook or video every month
Fully searchable for easy access to vital information
Copy and paste, print, and bookmark content
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at customercare@packtpub.com for more details.
At www.packt.com , you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.
Contributors
About the author
Dr. Aditya Mukherjee is a cybersecurity veteran and an information security leader with over 14 years' experience in leadership roles across information security domains, including defense and law enforcement, financial services, health and public services, products, resources, communications, and media and technology. His core expertise includes cybersecurity strategy, strategic risk and cyber resilience assessment, tactical leadership and development, GRC and security auditing, security operations, architecture and engineering, threat management, security investigations, and forensics.
I would like to sincerely thank my mother and Shri. KumKum Roy Choudhury for all their support and encouragement in my life. I would also like to express my gratitude to those fine individuals and colleagues who have helped me tremendously in the formulation of this piece of literature by sharing their knowledge and constructive criticism Sameer Bengeri, Pradipta Mukherjee, Abhinav Singh, and Deep Shankar Yadav. Dhanyavaadaha.
About the reviewer
Yasser Ali is a cybersecurity consultant at Thales in the Middle East. He has extensive experience in providing consultancy and advisory services to enterprises regarding the implementation of cybersecurity best practices, critical infrastructure protection, red teaming, penetration testing, and vulnerability assessment, managing bug bounty programs, and web and mobile application security assessment. He is also an advocate speaker and participant in information security industry discussions, panels, committees, and conferences, and is a specialized trainer, featuring regularly on different media platforms around the world.
Packt is searching for authors like you
If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.
Preface
Every small, medium, and large enterprise across the globe today carries out at least a few, if not all, operations with the help of Information Technology (IT). IT networks form the basic building blocks of these complex structures with the help of associated technologies and business logic. Securing such networks is therefore of paramount importance.
In this book, we will learn advanced skills and their real-world implementation, which will enable us to build a resilient network security apparatus, secure existing network infrastructure, and implement a high-fidelity, repeatable improvement plan to stay up to date with the latest cybersecurity threats and how to mitigate them. We will be taking a deep dive into subjects including network penetration testing, network audits, network digital forensics, threat intelligence, threat hunting, deception technology, and attack vectors impacting ICS/SCADA, IoT, and VOIP, among others.
By the end of this book, you should be able to:
- Understand the building blocks of a network and how to apply security to it
- Understand threats and vulnerabilities that commonly plague networks today
- Understand how to perform security testing for your network
- Understand how to imply business impact and risk prioritization for the purpose of remediation and management discussion
- Understand how to move to a proactive security mindset from a reactive security mindset
Who this book is for
This book is for anyone looking to explore information security, privacy, malware, and cyber threats. Security experts who want to enhance their skillsets will also find this book useful. An understanding of cyber threats and information security will help in understanding the key concepts covered in this book.
What this book covers
Next page