Acknowledgments |
|
xiii | |
Author |
|
xv | |
|
|
1 | (34) |
|
|
1 | (6) |
|
The Molecular Biology of the COVID-19 Virus |
|
|
7 | (1) |
|
|
7 | (1) |
|
The Key Regions Found in the Novel Corona Virus |
|
|
8 | (2) |
|
The Physiochemical Characteristics of the ORFlab Polyprotein |
|
|
10 | (4) |
|
Special Interest in the Region 4406-5900 of the ORFlab Polyprotein of the Novel COVID-19 Virus |
|
|
14 | (1) |
|
The Specialized Study of the Structural Component of the Genomic Region 4406-5900 |
|
|
14 | (1) |
|
Three-Dimensional Predictions of the Genomic Region 4406-5900 |
|
|
15 | (1) |
|
An Analysis of the Novel COVID-19 Virus and the SARS Corona Virus Spike Proteins |
|
|
16 | (2) |
|
Determining the Chemicals for a Vaccine Based upon the Comparison Level of the RNA Polymerase of the Novel COVID-19 Virus |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
The Results of the Docking Studies |
|
|
21 | (1) |
|
Determining the Criterion for an Effective Booster Vaccine |
|
|
22 | (1) |
|
A Comparison of the ORFlab Polyprotein against the Human Proteome |
|
|
22 | (1) |
|
A Closer Examination of the Antigenic Regions |
|
|
23 | (1) |
|
A Review of the EMBOSS ANTIGENIC Technique and Its Results |
|
|
23 | (2) |
|
Other Possible Treatments for the Novel COVID-19 Virus |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Ocimum tenuiflorum, Tulsi, and Withania somnifera, Ashwagandha |
|
|
27 | (1) |
|
|
28 | (1) |
|
The Development of Testing Kits |
|
|
29 | (4) |
|
|
33 | (2) |
|
2 The Cyber Lessons That Have Been Learned from COVID-19 |
|
|
35 | (72) |
|
|
36 | (1) |
|
|
36 | (4) |
|
|
40 | (1) |
|
How to Make the Most of Your Current Bandwidth |
|
|
41 | (2) |
|
The Lack of a Cybersecurity Workforce |
|
|
43 | (1) |
|
|
43 | (4) |
|
The Poor Performances of the Virtual Private Network |
|
|
47 | (1) |
|
The Inherent Weaknesses of the Firewall |
|
|
47 | (2) |
|
The Next-Generation Firewall |
|
|
49 | (2) |
|
The Lack of Understanding of Cybersecurity Risk |
|
|
51 | (1) |
|
What Exactly Is Cyber Risk? |
|
|
52 | (1) |
|
The Various Cyber Risk Models |
|
|
53 | (2) |
|
How to Share Cyber Risk in Your Company |
|
|
55 | (2) |
|
The Lack of Understanding Cyber Resiliency |
|
|
57 | (1) |
|
An Example of Cyber Resiliency |
|
|
58 | (1) |
|
How the Definition of Cyber Resiliency Was Met |
|
|
59 | (1) |
|
What Is the Difference between Cyber Resiliency & Cyber Security? |
|
|
59 | (1) |
|
The NIST Special Publication 800-160 Volume 2 |
|
|
60 | (1) |
|
The Lack of Vetting of External, Third-Party Suppliers |
|
|
61 | (1) |
|
The Types of Third-Party Risks |
|
|
62 | (1) |
|
How to Manage Third-Party Risks |
|
|
63 | (2) |
|
The Importance of Vendor Compliance Management |
|
|
65 | (1) |
|
What Is Vendor Compliance? |
|
|
65 | (1) |
|
|
66 | (3) |
|
The Lack of Understanding of Data Privacy |
|
|
69 | (1) |
|
|
69 | (1) |
|
Data Privacy versus Data Security |
|
|
70 | (1) |
|
The Key Components of Data Privacy |
|
|
71 | (1) |
|
The Intermingling of Home and Corporate Networks |
|
|
72 | (1) |
|
|
73 | (1) |
|
Examples of How SASE Would Be Used |
|
|
73 | (2) |
|
The Benefits of Using SASE |
|
|
75 | (1) |
|
How to Keep Your IT Security Team Motivated |
|
|
76 | (1) |
|
How to Keep Your Team on Their A-Game |
|
|
77 | (3) |
|
The Lack of a Secure Remote Workforce |
|
|
80 | (1) |
|
The Top Ways to Ensure Cybersecurity |
|
|
80 | (3) |
|
The Lack of Security Awareness Training for Employees |
|
|
83 | (1) |
|
|
83 | (3) |
|
The Dangers of the Dark Web |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (2) |
|
|
88 | (2) |
|
How to Access the Dark Web |
|
|
90 | (1) |
|
How the Whole Process Works |
|
|
91 | (1) |
|
The Challenges for Law Enforcement |
|
|
92 | (2) |
|
What Is Actually Down There |
|
|
94 | (1) |
|
|
94 | (1) |
|
The Available Resources Worth Taking a Look at |
|
|
95 | (2) |
|
The Communication Services |
|
|
97 | (1) |
|
The Difficulties That Law Enforcement Has on the Dark Web |
|
|
98 | (2) |
|
The Emergence of Supply Chain Attacks - Solar Winds |
|
|
100 | (1) |
|
|
100 | (3) |
|
|
103 | (2) |
|
|
105 | (2) |
|
3 How to Prepare for the Next Pandemic |
|
|
107 | (90) |
|
|
107 | (1) |
|
The Need for an Incident Response Plan |
|
|
108 | (1) |
|
The Incident Response Plan |
|
|
109 | (2) |
|
The Risks and the Needs Associated Going Offline |
|
|
111 | (2) |
|
The Benefits and the Needs for Fast Time to Detect and Time to Respond Periods |
|
|
113 | (3) |
|
The Importance of Communications in Incident Response |
|
|
116 | (3) |
|
The Incident Response Communications (Crisis Communications) Plan |
|
|
119 | (4) |
|
How to Report a Security Incident to Internal Stakeholders |
|
|
123 | (2) |
|
How to Report a Security Incident to External Stakeholders |
|
|
125 | (2) |
|
The Need for a Disaster Recovery Plan |
|
|
127 | (2) |
|
The Definition of a Disaster Recovery Plan |
|
|
129 | (1) |
|
The Categories of Disaster |
|
|
130 | (1) |
|
The Benefits of a Disaster Recovery Plan |
|
|
131 | (2) |
|
The Types of Disaster Recovery Plans |
|
|
133 | (2) |
|
The Components of a Disaster Recovery Plan |
|
|
135 | (3) |
|
The Need for a Business Continuity Plan |
|
|
138 | (1) |
|
The Alarming Statistics of the Lack of Proper BC Planning |
|
|
139 | (1) |
|
The Components That Go into a Business Continuity Plan |
|
|
140 | (7) |
|
The Need for Effective Penetration Testing |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (2) |
|
|
151 | (2) |
|
The Different Types of Penetration Testing |
|
|
153 | (1) |
|
The External Penetration Test |
|
|
153 | (1) |
|
|
153 | (1) |
|
The Stages of External Penetration Testing |
|
|
154 | (2) |
|
What Is Web Application Testing? |
|
|
156 | (1) |
|
The Components of Web App Penetration Testing |
|
|
157 | (3) |
|
Understanding the Importance of the VAPT |
|
|
160 | (1) |
|
|
160 | (1) |
|
The Causes for the Vulnerabilities to Exist |
|
|
161 | (1) |
|
The Types of Vulnerability Testing |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
The Importance and Benefits of It |
|
|
164 | (1) |
|
|
165 | (1) |
|
The Differences between a Vulnerability Assessment and a Penetration Test |
|
|
166 | (1) |
|
Breaking Down What Vulnerability Scanning and Penetration Testing Are |
|
|
167 | (1) |
|
Vulnerability Assessments |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (1) |
|
The Importance of Threat Hunting |
|
|
171 | (1) |
|
|
171 | (1) |
|
A Formal Definition of Proactive Threat Hunting |
|
|
172 | (3) |
|
The Process of Proactive Threat Hunting and Its Components |
|
|
175 | (1) |
|
The Need for Endpoint Security |
|
|
176 | (1) |
|
The Importance for Endpoint Security |
|
|
177 | (1) |
|
|
177 | (4) |
|
The Need for the SOAR Methodology |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
The Strategic Benefits of SOAR |
|
|
184 | (1) |
|
The Need for the Use of the SIEM |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
The Functionalities of a SIEM |
|
|
188 | (1) |
|
|
188 | (1) |
|
What Exactly Is Zero Trust? |
|
|
189 | (1) |
|
How to Implement the Zero Trust Framework |
|
|
190 | (2) |
|
|
192 | (2) |
|
|
194 | (3) |
|
|
197 | (4) |
Index |
|
201 | |