Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
Author |
|
xix | |
|
|
xxi | |
|
Chapter 1 Cybersecurity Technologies Classification |
|
|
1 | (4) |
|
|
1 | (1) |
|
1.2 Different Categories of Cyber Technologies |
|
|
1 | (1) |
|
1.3 Technology Classification |
|
|
2 | (3) |
|
|
5 | (10) |
|
|
5 | (1) |
|
2.2 Brief Historical Background |
|
|
5 | (2) |
|
2.3 How Encryption Technologies Work |
|
|
7 | (1) |
|
2.4 Encryption Technologies |
|
|
8 | (3) |
|
2.4.1 RSA (Rivest-Shamir-Adleman) |
|
|
8 | (2) |
|
|
10 | (1) |
|
2.4.3 Data Encryption Standard (DES) |
|
|
10 | (1) |
|
2.4.4 Triple DES (3DES or TDES) |
|
|
11 | (1) |
|
|
11 | (1) |
|
2.5 Advantages and Disadvantages of Blowfish and RSA Encryption |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
2.6 Which Products Use Encryptions |
|
|
12 | (1) |
|
2.6.1 Products Using Blowfish |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (2) |
|
|
15 | (12) |
|
|
15 | (1) |
|
3.2 Brief Historical Background |
|
|
15 | (1) |
|
3.3 How Authentication Technologies Work |
|
|
16 | (4) |
|
3.3.1 Secret Knowledge-Based Authentication |
|
|
16 | (1) |
|
3.3.1.1 Personal Identification Number (PIN) and Password |
|
|
16 | (2) |
|
3.3.1.2 Cognitive Knowledge Question |
|
|
18 | (1) |
|
3.3.1.3 Pattern and Graphical Password |
|
|
18 | (1) |
|
3.3.2 Token-Based Approach |
|
|
18 | (1) |
|
|
18 | (1) |
|
3.3.4 Compound Authentication |
|
|
19 | (1) |
|
3.3.5 Storing Passwords and Usernames |
|
|
19 | (1) |
|
3.4 Authentication Technologies |
|
|
20 | (1) |
|
3.5 Advantages and Disadvantages of Authentication Technoglogies |
|
|
20 | (2) |
|
|
20 | (1) |
|
3.5.1.1 Personal Identification Number (PIN) and Password Approach |
|
|
20 | (1) |
|
3.5.1.2 Cognitive Knowledge Question (CKQ) |
|
|
20 | (1) |
|
3.5.1.3 Pattern and Graphical Password |
|
|
21 | (1) |
|
3.5.1.4 Token-Based Passwords |
|
|
21 | (1) |
|
3.5.1.5 Biometric Authentication |
|
|
21 | (1) |
|
3.5.1.6 Compound Authentication |
|
|
21 | (1) |
|
|
21 | (1) |
|
3.5.2.1 Personal Identification Number (PIN) and Password Approach |
|
|
21 | (1) |
|
3.5.2.2 Cognitive Knowledge Question |
|
|
22 | (1) |
|
3.5.2.3 Pattern and Graphical Passwords |
|
|
22 | (1) |
|
3.5.2.4 Token-Based One-Time Passwords (OTP) |
|
|
22 | (1) |
|
3.5.2.5 Biometric Authentication |
|
|
22 | (1) |
|
3.5.2.6 Compound Authentication |
|
|
22 | (1) |
|
3.6 What Products Use Authentications |
|
|
22 | (1) |
|
|
23 | (4) |
|
|
27 | (12) |
|
|
27 | (1) |
|
4.2 Brief Historical Background |
|
|
27 | (1) |
|
4.3 How Biometric Technologies Work |
|
|
28 | (3) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
4.3.2.2 Capacitive Scanners |
|
|
30 | (1) |
|
4.3.2.3 Ultrasonic Scanners |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
4.4 Biometric Technologies |
|
|
31 | (1) |
|
4.5 Biometric Traits Comparison |
|
|
31 | (3) |
|
4.6 Advantages and Disadvantages of Biometric Technologies |
|
|
34 | (2) |
|
4.6.1 Advantages of Using Biometrics |
|
|
35 | (1) |
|
4.6.2 Disadvantages of Using Biometrics |
|
|
35 | (1) |
|
4.7 What Products Use Biometrics |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (2) |
|
Chapter 5 Firewall Technologies |
|
|
39 | (10) |
|
|
39 | (1) |
|
5.2 Brief Historical Background |
|
|
39 | (2) |
|
5.3 How Firewall Technologies Work |
|
|
41 | (2) |
|
5.4 Firewall Technologies |
|
|
43 | (3) |
|
5.4.1 Stateless Firewalls or Packet-Filtering |
|
|
43 | (2) |
|
5.4.2 Stateful Firewalls or Dynamic Packet Inspection |
|
|
45 | (1) |
|
5.4.3 Application Proxy/Proxy Server Firewalls |
|
|
45 | (1) |
|
|
46 | (1) |
|
5.5 Advantages and Disadvantages of Firewall Technologies |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (2) |
|
Chapter 6 Virus Detection |
|
|
49 | (8) |
|
|
49 | (1) |
|
6.2 Brief Historical Background |
|
|
49 | (1) |
|
6.3 How Virus Detection Technologies Work |
|
|
50 | (2) |
|
6.3.1 Virus Scanning and Detection Process |
|
|
50 | (2) |
|
6.4 Virus Detection Technologies |
|
|
52 | (1) |
|
|
52 | (1) |
|
6.4.2 Data Mining Techniques |
|
|
53 | (1) |
|
6.4.3 Signature-Based Detection |
|
|
53 | (1) |
|
6.4.4 Heuristic Detection |
|
|
53 | (1) |
|
6.4.5 Real-Time Protection |
|
|
53 | (1) |
|
6.5 Advantages and Disadvantages of Virus Detection Technologies |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
6.6 Approaches Used in Virus Detection |
|
|
54 | (1) |
|
|
55 | (2) |
|
Chapter 7 Phishing Detection |
|
|
57 | (12) |
|
|
57 | (1) |
|
7.2 Brief Historical Background |
|
|
57 | (1) |
|
7.3 How Phishing Detection Technologies Work |
|
|
58 | (2) |
|
7.4 Phishing Detection Technologies |
|
|
60 | (4) |
|
7.4.1 Visual Similarity-Based Phishing Detection |
|
|
61 | (1) |
|
7.4.2 Blacklist-Based Phishing Detection |
|
|
61 | (1) |
|
7.4.3 Web Crawling-Based Phishing Attack Detection |
|
|
62 | (2) |
|
7.5 Advantages and Disadvantages of Phishing Detection Technologies |
|
|
64 | (1) |
|
|
64 | (1) |
|
7.5.1.1 Visual Similarity-Based Phishing Detection |
|
|
64 | (1) |
|
7.5.1.2 Blacklist-Based Phishing Detection |
|
|
64 | (1) |
|
7.5.1.3 Web Crawling-Based Phishing Attack Detection |
|
|
64 | (1) |
|
|
64 | (1) |
|
7.5.2.1 Visual Similarity-Based Phishing Detection |
|
|
64 | (1) |
|
7.5.2.2 Blacklist-Based Phishing Detection |
|
|
65 | (1) |
|
7.5.2.3 Web Crawling-Based Phishing Attack Detection |
|
|
65 | (1) |
|
7.6 What Products Use Phishing Detection |
|
|
65 | (1) |
|
7.6.1 Blacklist-Based Phishing Detection |
|
|
65 | (1) |
|
|
66 | (3) |
|
Chapter 8 Endpoint Protection |
|
|
69 | (10) |
|
|
69 | (1) |
|
8.2 Brief Historical Background |
|
|
70 | (1) |
|
8.2.1 Traditional Antivirus |
|
|
70 | (1) |
|
8.2.2 Endpoint Detection and Response (EDR) |
|
|
70 | (1) |
|
8.2.3 Next-Generation Antivirus Software (NGAV) |
|
|
70 | (1) |
|
8.2.4 Operating System (OS) Centric Security |
|
|
70 | (1) |
|
8.3 How Endpoint Protection Technologies Work |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
8.3.1.2 Behavioral Detection |
|
|
72 | (1) |
|
|
72 | (1) |
|
8.3.2 Secure Email Gateways (SEGS) |
|
|
72 | (1) |
|
8.4 Endpoint Protection Technologies |
|
|
72 | (2) |
|
8.4.1 Antivirus Solutions |
|
|
72 | (1) |
|
8.4.2 Endpoint Detection and Response |
|
|
73 | (1) |
|
8.4.3 Secure Email Gateways |
|
|
73 | (1) |
|
8.5 Advantages and Disadvantages of Endpoint Protection Technologies |
|
|
74 | (1) |
|
8.5.1 Antivirus Solutions |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
8.5.2 Endpoint Detection and Response |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
8.5.3 Secure Email Gateways |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
8.6 What Products Use Endpoint Protection |
|
|
75 | (1) |
|
8.6.1 Antivirus Solutions |
|
|
75 | (1) |
|
8.6.2 Endpoint Detection and Response |
|
|
76 | (1) |
|
8.6.3 Secure Email Gateways |
|
|
76 | (1) |
|
|
76 | (3) |
|
Chapter 9 Malware Protection Technology |
|
|
79 | (10) |
|
|
79 | (1) |
|
9.2 Brief Historical Background |
|
|
79 | (2) |
|
9.3 How Malware Protection Technologies Work |
|
|
81 | (1) |
|
|
82 | (1) |
|
9.3.2 Signature-Based Safety |
|
|
82 | (1) |
|
9.3.3 Host-Based Intrusion Prevention Systems |
|
|
82 | (1) |
|
9.4 Malware Protection Technologies |
|
|
82 | (3) |
|
9.4.1 Main Category of Malware Detection Technology |
|
|
84 | (1) |
|
9.4.1.1 Heuristic Analysis |
|
|
84 | (1) |
|
9.4.1.2 Signature-Based Security |
|
|
84 | (1) |
|
9.4.1.3 Host-Based Intrusion-Prevention Systems (HIPS) |
|
|
85 | (1) |
|
9.5 Advantages and Disadvantages of Malware Protection |
|
|
85 | (1) |
|
|
85 | (1) |
|
9.5.1.1 Heuristic Analysis |
|
|
85 | (1) |
|
9.5.1.2 Signature-Based Protection |
|
|
85 | (1) |
|
9.5.1.3 Host-Based Intrusion Prevention Systems |
|
|
85 | (1) |
|
|
85 | (1) |
|
9.5.2.1 Heuristic Analysis |
|
|
85 | (1) |
|
9.5.2.2 Signature-Based Protection |
|
|
86 | (1) |
|
9.5.2.3 Host-Based Intrusion Prevention Systems |
|
|
86 | (1) |
|
9.6 What Products Use Malware Protection |
|
|
86 | (1) |
|
|
86 | (3) |
|
Chapter 10 The Internet of Things (IoT) |
|
|
89 | (12) |
|
|
89 | (1) |
|
10.2 Brief Historical Background |
|
|
90 | (1) |
|
10.3 How IoT Technologies Work |
|
|
90 | (3) |
|
10.3.1 End-to-End Platform |
|
|
92 | (1) |
|
10.3.2 Connectivity Platform |
|
|
92 | (1) |
|
10.3.3 Cloud and Data Platforms |
|
|
92 | (1) |
|
10.4 IoT Security Technologies |
|
|
93 | (3) |
|
10.4.1 Securing IoT Devices |
|
|
93 | (2) |
|
10.4.2 Smart Device Protection Technologies |
|
|
95 | (1) |
|
10.4.2.1 Host Identity Protocol (HIP) |
|
|
95 | (1) |
|
10.4.2.2 HIP Diet Exchange |
|
|
95 | (1) |
|
10.4.2.3 Intrusion Detection and Mitigation Framework |
|
|
95 | (1) |
|
10.4.2.4 Intrusion Detection System |
|
|
95 | (1) |
|
|
96 | (1) |
|
10.4.2.6 Software-Defined Networking |
|
|
96 | (1) |
|
10.5 Advantages and Disadvantages of IoT Security Technologies |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
10.6 What Products Use IoT Technologies |
|
|
97 | (1) |
|
|
97 | (4) |
|
Chapter 11 Network Security |
|
|
101 | (12) |
|
|
101 | (1) |
|
11.2 Brief Historical Background |
|
|
101 | (1) |
|
11.3 How Network Security Technologies Work |
|
|
102 | (2) |
|
|
102 | (1) |
|
11.3.2 Intrusion Detection System (IDS) and Intrusion Prevention |
|
|
103 | (1) |
|
11.3.3 Wi-Fi Protected Access 3 (WPA3) |
|
|
104 | (1) |
|
11.4 Network Security Technologies |
|
|
104 | (2) |
|
|
105 | (1) |
|
|
105 | (1) |
|
11.4.3 Antivirus and Antimalware Software |
|
|
105 | (1) |
|
11.4.4 Virtual Private Network (VPN) |
|
|
105 | (1) |
|
11.4.5 Intrusion Prevention Systems (IDS) |
|
|
105 | (1) |
|
11.5 Advantages and Disadvantages of Network Security |
|
|
106 | (1) |
|
11.5.1 Advantages of Network Security |
|
|
106 | (1) |
|
11.5.2 Disadvantages of Network Security |
|
|
106 | (1) |
|
11.6 Which Products Use Network Security |
|
|
107 | (2) |
|
11.6.1 Banks/Financial Institutions |
|
|
107 | (1) |
|
11.6.2 Hospitals/Medical Institutions |
|
|
107 | (1) |
|
|
108 | (1) |
|
11.6.4 Use of Network Security Technologies |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
11.6.7 Security Information and Event Management |
|
|
109 | (1) |
|
|
109 | (4) |
|
Chapter 12 Location Tracking |
|
|
113 | (10) |
|
|
113 | (1) |
|
12.2 Brief Historical Background |
|
|
113 | (1) |
|
12.3 How Location Tracking Technologies Work |
|
|
114 | (2) |
|
12.3.1 Uses of GPS Technology |
|
|
114 | (2) |
|
12.4 Location Tracking Technologies |
|
|
116 | (3) |
|
|
116 | (1) |
|
12.4.2 Radio Frequency Identification |
|
|
116 | (1) |
|
|
117 | (1) |
|
12.4.4 Advantages and Disadvantages of Location Tracking |
|
|
117 | (1) |
|
12.4.4.1 Advantages of Location Tracking |
|
|
117 | (1) |
|
12.4.4.2 Disadvantages of Location Tracking |
|
|
118 | (1) |
|
12.5 Which Products Use Location Tracking |
|
|
119 | (1) |
|
|
120 | (3) |
|
|
123 | (12) |
|
|
123 | (1) |
|
13.2 Brief Historical Background |
|
|
123 | (1) |
|
13.3 How Surveillance Technology Works |
|
|
124 | (2) |
|
13.3.1 Video Surveillance and Crime |
|
|
126 | (1) |
|
13.4 Surveillance Technologies |
|
|
126 | (2) |
|
|
127 | (1) |
|
|
127 | (1) |
|
13.4.3 Aerial Surveillance |
|
|
128 | (1) |
|
13.5 Advantages and Disadvantages of Surveillance Technologies |
|
|
128 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
13.6 Which Products Use Surveillance |
|
|
130 | (1) |
|
|
131 | (4) |
|
Chapter 14 Insider Threat Protection |
|
|
135 | (8) |
|
|
135 | (1) |
|
14.2 Brief Historical Background |
|
|
135 | (2) |
|
14.3 How Insider Threat Protection Technologies Work |
|
|
137 | (1) |
|
14.4 Insider Threat Detection Technologies |
|
|
137 | (2) |
|
14.4.1 Data Loss Prevention |
|
|
138 | (1) |
|
14.4.2 Email Security Applications |
|
|
139 | (1) |
|
14.4.3 Privileged Access Management (PAM) |
|
|
139 | (1) |
|
14.5 User Activity Monitoring and Behavior Analytics |
|
|
139 | (1) |
|
14.6 Advantages and Disadvantages of Insider Threat Detection |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (3) |
|
Chapter 15 Intrusion Detection |
|
|
143 | (8) |
|
|
143 | (1) |
|
15.2 Brief Historical Background |
|
|
143 | (1) |
|
15.3 How Intrusion Detection Technologies Work |
|
|
143 | (3) |
|
15.3.1 Network-Based Intrusion Prevention System |
|
|
145 | (1) |
|
15.3.2 Host Intrusion Detection Systems |
|
|
145 | (1) |
|
15.4 Intrusion Detection Technologies |
|
|
146 | (1) |
|
15.5 Advantages and Disadvantages of Intrusion Detection Systems |
|
|
146 | (1) |
|
|
146 | (1) |
|
15.5.1.1 Network-Based Intrusion Prevention System |
|
|
146 | (1) |
|
15.5.1.2 Host Intrusion Detection Systems |
|
|
146 | (1) |
|
|
147 | (1) |
|
15.5.2.1 Network-Based Intrusion Prevention System |
|
|
147 | (1) |
|
15.5.2.2 Host Intrusion Detection Systems |
|
|
147 | (1) |
|
15.6 Which Products to Use for Intrusion Detection |
|
|
147 | (1) |
|
|
147 | (4) |
|
Chapter 16 Vulnerability Scanning |
|
|
151 | (8) |
|
|
151 | (1) |
|
16.2 Brief Historical Background |
|
|
151 | (1) |
|
16.3 How Vulnerability Scanning Technologies Work |
|
|
151 | (3) |
|
16.3.1 Public VS Applications |
|
|
152 | (1) |
|
16.3.1.1 System Weakness Scanning |
|
|
152 | (1) |
|
16.3.1.2 Vulnerability Classification |
|
|
152 | (1) |
|
16.3.2 Web VS Applications |
|
|
153 | (1) |
|
|
154 | (1) |
|
16.4 Vulnerability Scanning Technologies |
|
|
154 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
16.5 Advantages and Disadvantages of Vulnerability Scanning |
|
|
156 | (3) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (3) |
|
Chapter 17 Penetration Testing |
|
|
159 | (8) |
|
|
159 | (1) |
|
17.2 Brief Historical Background |
|
|
159 | (1) |
|
17.3 How Penetration Testing Technologies Work |
|
|
160 | (1) |
|
17.4 Penetration Testing Technologies |
|
|
160 | (3) |
|
17.4.1 Application Scanners |
|
|
162 | (1) |
|
17.5 Advantages and Disadvantages of Penetration Testing |
|
|
163 | (1) |
|
17.5.1 Advantages of Penetration Testing |
|
|
163 | (1) |
|
17.5.2 Disadvantages of Penetration Testing |
|
|
164 | (1) |
|
|
164 | (3) |
|
|
167 | (2) |
Glossary |
|
169 | (14) |
References |
|
183 | (12) |
Index |
|
195 | |