Bharat S. Rawal
Department of Computer and Data Science, Capitol Technology University, Laurel, MD, USA
Gunasekaran Manogaran
Howard University, Washington, DC, USA
Alexender Peter
Blockchain Datacenter Inc., Virginia, VA, USA
ISBN 978-981-19-2657-0 e-ISBN 978-981-19-2658-7
https://doi.org/10.1007/978-981-19-2658-7
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Preface
Cybersecurity protects the computer systems security and their hardware network from theft or damages both the program and the electronic data. The services they provide are distracting or misdirected. As the area increases, it is increasingly becoming an essential component of computer systems. The growth of the Internet, wireless networks like Bluetooth and Wi-Fi, and connected intelligent devices, smartphones, TVs, and various Internet of Something devices, puts more demand for security. The practice of protecting systems is cybersecurity, virtual assault networks, and services. The usual purpose of these cyberattacks is to access and modify or lose sensitive data. Cyber technology is critical for organizations and the public who need information security tools to guard against cyber threats. It is vital to protect three key entities: machines, mobile devices, endpoint devices, networks, routers, and cloud. Standard technology for protecting these organizations includes firewalls for next-generation, filtering DNS, protection of malware, antivirus, and email security solutions. The challenges in cybersecurity are increasing with the evolution of malware, ransomware, AI growth, IoT warning, revolution blockchain, and the increasing use of serverless apps.
This book covers all the challenges mentioned above. The malwares evolution may worsen than a propagating virus; this locks the customers information systems. The business can easily go out of business if you cannot meet the egregious demands of the cybercriminal. Attacks in ransomware are one of the most rapidly growing areas of cybercrime. The major problem with cyberattacks is recovery, and safety professionals seldom can deal immediately with them. Since there is no need to sleep with artificial intelligence, they can oppose defense systems when downloading malware. A risk to prepare security professionals to meet login convergence requirements, user verification, time-out, authentication of two factors, and other advanced defense protocols. The use of blockchain requires additional security integrations with the traditional cybersecurity approach. Serverless apps can call up cyberattacks.
Chapter explains the cybersecurity introduction, fundamentals, principles, importance, challenges, implementation, cyberattack, and types.
Chapter explains the hacking introduction, classification, ethical hacking, cybercrime, penetration test, and a security assessment phase.
Chapter explains the security hacking, techniques, and tools for ethical hacking, security testing, physical security, risk assessment, and protection techniques.
Chapter explains the networking, topology types, operating system, hardware networking, planning and design of the network, problem-solving, and network security.
Chapter explains the cyberattack, vulnerability, network security governance framework, risk assessment, security evaluation and protection, cyber danger, and supply chain.
Chapter explains the malware, vulnerability, network security governance framework, risk assessment, security evaluation and protection, cyber danger, and supply chain.
Chapter explains the firewalls, vulnerability, network security governance framework, risk assessment, security evaluation and protection, cyber danger, and supply chain.
Chapter explains the cryptography, vulnerability, network security governance framework, risk assessment, security evaluation and protection, cyber danger, and supply chain.
Chapter explains the control of physical and logical access to assets.
Chapter explains the management of the identification and authentication of people, devices, and services.
Chapter explains the integration of identity as a third-party service.
Chapter explains the implementation and management of authorization mechanisms.
Chapter explains the management of the identity and access provisioning life cycle.
Chapter explains the conduct of security control testing.
Chapter explains the collection of security process data.
Chapter explains the recovery strategies for databases.
Chapter explains the analysis of test output and generation of a report.
Chapter explains the ensured appropriate asset retention.
Chapter explains the determined information and security controls.
Bharat S. Rawal
Gunasekaran Manogaran
Alexender Peter
Laurel, USA Washington, USA Virginia, USA