• Complain

McKINNON - THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business

Here you can read online McKINNON - THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: UNKNOWN, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business
  • Author:
  • Publisher:
    UNKNOWN
  • Genre:
  • Year:
    2020
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

McKINNON: author's other books


Who wrote THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business? Find out the surname, the name of the author of the book and a list of all author's works by series.

THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS A simple and comprehensive - photo 1
THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS
A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business
GUY McKINNON
Copyright 2020 Guy McKinnon
All rights reserved.
DEDICATION
To Jason McGregor, my teacher, mentor, and friend...
CONTENTS

HARDENING OF MOBILE DEVICES .................................................................................. 69
ENCRYPTION ................................................................................................................... 69
STEGANOGRAPHY ........................................................................................................... 74
PKI.................................................................................................................................... 74
LIFE CYCLE OF CERTIFICATES .......................................................................................... 76
DIGITAL SIGN................................................................................................................... 77
SENDER AND RECIPIENT ROLES...................................................................................... 78
OTHER APPLICATIONS .................................................................................................... 78
HARDWARE ENCRYPTION ................................................................................................... 79
VPNS ................................................................................................................................ 80
PHYSICAL SECURITY ........................................................................................................ 82
PRACTICAL EXAMPLES OF PENTESTING AND VULNERABILITY ANALYSIS ....................... 84
INSTALLATION OF OPERATING SYSTEMS .......................................................................... 85
METASPLOITABLE ................................................................................................................ 85
PRELIMINARY STAGE .......................................................................................................... 86
ARMITAGE ........................................................................................................................... 92
OPENVAS ........................................................................................................................... 101
CONCLUSIONS ................................................................................................................... 117
SIGN .................................................................................................................................47
ANOMALIES .....................................................................................................................47
EURISTICA........................................................................................................................48
SDN ..................................................................................................................................48
FALSE POSITIVES AND FALSE NEGATIVES ......................................................................48
SEM AND SIEM ................................................................................................................49
DLP...................................................................................................................................50
LOG MONITORING ..........................................................................................................51
NETWORK LOGGING: SYSLOG ........................................................................................52
ANALYSIS TECHNIQUES...................................................................................................52
VULNERABILITY SCANNER ..............................................................................................53
PENETRATION TEST.........................................................................................................54
ACCESS CONTROL............................................................................................................55
CERTIFICATE ....................................................................................................................56
AUTHENTICATION ...........................................................................................................56
AUTHORIZATION .............................................................................................................58
ACCOUNT MANAGEMENT ..............................................................................................59
SUBNETTING ...................................................................................................................60
THE NAT...........................................................................................................................62
WIRELESS NETWORK VULNERABILITY............................................................................63
WIRELESS NETWORK ENCRYPTION ................................................................................63
WI-FI HARDENING...........................................................................................................65
PATCH MANAGEMENT ...................................................................................................65
HOST HARDENING ..........................................................................................................66
HARDWARE SECURITY ....................................................................................................66
VIRTUALIZATION .................................................................................................................67
CLOUD COMPUTING .......................................................................................................67
DATA PROTECTION .........................................................................................................68
v
vi
INTRODUCTION TO INFORMATION SECURITY
Safety , from the Latin sine cura ("without concern"), is the condition that makes and makes one feel free from danger, or that gives the possibility to prevent, eliminate or make less serious damage, risks, difficulties, unpleasant events and the like. Companies, most of the time, underestimate the security aspect, when it would be enough just a little common sense to devote a small amount of time to staff training to make everyone understand the main issues that concern them; it is necessary to create security policies that are not too complicated for users and to accustom the "distracted" user to have more attention in daily activities. Security can be divided into three distinct types:
1) Physical security
Physical security helps to protect the premises from attempted intrusion through the use of cameras, locks and other security tools; it must also be able to detect intruders and repair damage caused by an intrusion (e.g. copies of data or use of replacement HDDs).
2) Security of operations
This type of security is concerned with protecting data on a daily basis and securing the network, HW and database.
3) Policies
Policies are nothing but guidelines to follow. We distinguish different types of policies that we can subdivide in this way:
A) Administrative Policies
Rules to be followed by those who run the business.
B) Disaster Recovery Plans
Choice of dangerous events.
C) Data policy
Who has access to what.
D) Security policy
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business»

Look at similar books to THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business»

Discussion, reviews of the book THE FUNDAMENTALS OF COMPUTER SECURITY FOR BEGINNERS: A simple and comprehensive guide to start working in cybersecurity. Ethical Hacking to learn and protect your family and business and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.