Muutke küpsiste eelistusi

Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools [Kõva köide]

(Adjunct Faculty, San Jose State University, CA)
  • Formaat: Hardback, 202 pages, kõrgus x laius: 234x156 mm, kaal: 480 g, 33 Halftones, black and white; 33 Illustrations, black and white
  • Sari: The Human Element in Smart and Intelligent Systems
  • Ilmumisaeg: 15-Dec-2021
  • Kirjastus: CRC Press
  • ISBN-10: 0367457458
  • ISBN-13: 9780367457457
  • Formaat: Hardback, 202 pages, kõrgus x laius: 234x156 mm, kaal: 480 g, 33 Halftones, black and white; 33 Illustrations, black and white
  • Sari: The Human Element in Smart and Intelligent Systems
  • Ilmumisaeg: 15-Dec-2021
  • Kirjastus: CRC Press
  • ISBN-10: 0367457458
  • ISBN-13: 9780367457457
Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field.

FEATURES











Presents descriptions for each type of cybersecurity technology and their specifications





Explains applications, usages, and offers case studies to enhance comprehension





Offers an easy-to-understand classification of existing cybersecurity technologies





Provides an understanding of the technologies without getting lost in technical details





Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies

This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.
Acknowledgments xv
Introduction xvii
Author xix
List of Figures
xxi
Chapter 1 Cybersecurity Technologies Classification
1(4)
1.1 Introduction
1(1)
1.2 Different Categories of Cyber Technologies
1(1)
1.3 Technology Classification
2(3)
Chapter 2 Encryption
5(10)
2.1 Introduction
5(1)
2.2 Brief Historical Background
5(2)
2.3 How Encryption Technologies Work
7(1)
2.4 Encryption Technologies
8(3)
2.4.1 RSA (Rivest-Shamir-Adleman)
8(2)
2.4.2 Blowfish Cipher
10(1)
2.4.3 Data Encryption Standard (DES)
10(1)
2.4.4 Triple DES (3DES or TDES)
11(1)
2.4.5 Twofish
11(1)
2.5 Advantages and Disadvantages of Blowfish and RSA Encryption
11(1)
2.5.1 Advantages
11(1)
2.5.1.1 RSA
11(1)
2.5.1.2 Blowfish
12(1)
2.5.2 Disadvantages
12(1)
2.5.2.1 RSA
12(1)
2.5.2.2 Blowfish
12(1)
2.6 Which Products Use Encryptions
12(1)
2.6.1 Products Using Blowfish
13(1)
2.6.2 Products Using RSA
13(1)
2.7 Conclusion
13(2)
Chapter 3 Authentication
15(12)
3.1 Introduction
15(1)
3.2 Brief Historical Background
15(1)
3.3 How Authentication Technologies Work
16(4)
3.3.1 Secret Knowledge-Based Authentication
16(1)
3.3.1.1 Personal Identification Number (PIN) and Password
16(2)
3.3.1.2 Cognitive Knowledge Question
18(1)
3.3.1.3 Pattern and Graphical Password
18(1)
3.3.2 Token-Based Approach
18(1)
3.3.3 Biometrics
18(1)
3.3.4 Compound Authentication
19(1)
3.3.5 Storing Passwords and Usernames
19(1)
3.4 Authentication Technologies
20(1)
3.5 Advantages and Disadvantages of Authentication Technoglogies
20(2)
3.5.1 Advantages
20(1)
3.5.1.1 Personal Identification Number (PIN) and Password Approach
20(1)
3.5.1.2 Cognitive Knowledge Question (CKQ)
20(1)
3.5.1.3 Pattern and Graphical Password
21(1)
3.5.1.4 Token-Based Passwords
21(1)
3.5.1.5 Biometric Authentication
21(1)
3.5.1.6 Compound Authentication
21(1)
3.5.2 Disadvantages
21(1)
3.5.2.1 Personal Identification Number (PIN) and Password Approach
21(1)
3.5.2.2 Cognitive Knowledge Question
22(1)
3.5.2.3 Pattern and Graphical Passwords
22(1)
3.5.2.4 Token-Based One-Time Passwords (OTP)
22(1)
3.5.2.5 Biometric Authentication
22(1)
3.5.2.6 Compound Authentication
22(1)
3.6 What Products Use Authentications
22(1)
3.7 Conclusion
23(4)
Chapter 4 Biometrics
27(12)
4.1 Introduction
27(1)
4.2 Brief Historical Background
27(1)
4.3 How Biometric Technologies Work
28(3)
4.3.1 Palm
29(1)
4.3.2 Fingerprints
29(1)
4.3.2.1 Optical Scanners
30(1)
4.3.2.2 Capacitive Scanners
30(1)
4.3.2.3 Ultrasonic Scanners
30(1)
4.3.3 Face
30(1)
4.3.4 Iris
30(1)
4.3.5 Voice
30(1)
4.4 Biometric Technologies
31(1)
4.5 Biometric Traits Comparison
31(3)
4.6 Advantages and Disadvantages of Biometric Technologies
34(2)
4.6.1 Advantages of Using Biometrics
35(1)
4.6.2 Disadvantages of Using Biometrics
35(1)
4.7 What Products Use Biometrics
36(1)
4.7.1 Cars
36(1)
4.7.2 Banking
36(1)
4.7.3 HealthCare
36(1)
4.7.4 Food and Beverages
37(1)
4.7.5 Border Control
37(1)
4.7.6 Education
37(1)
4.8 Conclusion
37(2)
Chapter 5 Firewall Technologies
39(10)
5.1 Introduction
39(1)
5.2 Brief Historical Background
39(2)
5.3 How Firewall Technologies Work
41(2)
5.4 Firewall Technologies
43(3)
5.4.1 Stateless Firewalls or Packet-Filtering
43(2)
5.4.2 Stateful Firewalls or Dynamic Packet Inspection
45(1)
5.4.3 Application Proxy/Proxy Server Firewalls
45(1)
5.4.4 Cloud Firewalls
46(1)
5.5 Advantages and Disadvantages of Firewall Technologies
46(1)
5.5.1 Advantages
46(1)
5.5.2 Disadvantages
47(1)
5.6 Conclusion
47(2)
Chapter 6 Virus Detection
49(8)
6.1 Introduction
49(1)
6.2 Brief Historical Background
49(1)
6.3 How Virus Detection Technologies Work
50(2)
6.3.1 Virus Scanning and Detection Process
50(2)
6.4 Virus Detection Technologies
52(1)
6.4.1 Sandbox Detection
52(1)
6.4.2 Data Mining Techniques
53(1)
6.4.3 Signature-Based Detection
53(1)
6.4.4 Heuristic Detection
53(1)
6.4.5 Real-Time Protection
53(1)
6.5 Advantages and Disadvantages of Virus Detection Technologies
53(1)
6.5.1 Advantages
53(1)
6.5.2 Disadvantages
54(1)
6.6 Approaches Used in Virus Detection
54(1)
6.7 Conclusion
55(2)
Chapter 7 Phishing Detection
57(12)
7.1 Introduction
57(1)
7.2 Brief Historical Background
57(1)
7.3 How Phishing Detection Technologies Work
58(2)
7.4 Phishing Detection Technologies
60(4)
7.4.1 Visual Similarity-Based Phishing Detection
61(1)
7.4.2 Blacklist-Based Phishing Detection
61(1)
7.4.3 Web Crawling-Based Phishing Attack Detection
62(2)
7.5 Advantages and Disadvantages of Phishing Detection Technologies
64(1)
7.5.1 Advantages
64(1)
7.5.1.1 Visual Similarity-Based Phishing Detection
64(1)
7.5.1.2 Blacklist-Based Phishing Detection
64(1)
7.5.1.3 Web Crawling-Based Phishing Attack Detection
64(1)
7.5.2 Disadvantages
64(1)
7.5.2.1 Visual Similarity-Based Phishing Detection
64(1)
7.5.2.2 Blacklist-Based Phishing Detection
65(1)
7.5.2.3 Web Crawling-Based Phishing Attack Detection
65(1)
7.6 What Products Use Phishing Detection
65(1)
7.6.1 Blacklist-Based Phishing Detection
65(1)
7.7 Conclusion
66(3)
Chapter 8 Endpoint Protection
69(10)
8.1 Introduction
69(1)
8.2 Brief Historical Background
70(1)
8.2.1 Traditional Antivirus
70(1)
8.2.2 Endpoint Detection and Response (EDR)
70(1)
8.2.3 Next-Generation Antivirus Software (NGAV)
70(1)
8.2.4 Operating System (OS) Centric Security
70(1)
8.3 How Endpoint Protection Technologies Work
71(1)
8.3.1 Antivirus
72(1)
8.3.1.1 Signature
72(1)
8.3.1.2 Behavioral Detection
72(1)
8.3.1.3 Machine Learning
72(1)
8.3.2 Secure Email Gateways (SEGS)
72(1)
8.4 Endpoint Protection Technologies
72(2)
8.4.1 Antivirus Solutions
72(1)
8.4.2 Endpoint Detection and Response
73(1)
8.4.3 Secure Email Gateways
73(1)
8.5 Advantages and Disadvantages of Endpoint Protection Technologies
74(1)
8.5.1 Antivirus Solutions
74(1)
8.5.1.1 Advantages
74(1)
8.5.1.2 Disadvantages
74(1)
8.5.2 Endpoint Detection and Response
74(1)
8.5.2.1 Advantages
74(1)
8.5.2.2 Disadvantages
75(1)
8.5.3 Secure Email Gateways
75(1)
8.5.3.1 Advantages
75(1)
8.5.3.2 Disadvantages
75(1)
8.6 What Products Use Endpoint Protection
75(1)
8.6.1 Antivirus Solutions
75(1)
8.6.2 Endpoint Detection and Response
76(1)
8.6.3 Secure Email Gateways
76(1)
8.7 Conclusion
76(3)
Chapter 9 Malware Protection Technology
79(10)
9.1 Introduction
79(1)
9.2 Brief Historical Background
79(2)
9.3 How Malware Protection Technologies Work
81(1)
9.3.1 Heuristic Analysis
82(1)
9.3.2 Signature-Based Safety
82(1)
9.3.3 Host-Based Intrusion Prevention Systems
82(1)
9.4 Malware Protection Technologies
82(3)
9.4.1 Main Category of Malware Detection Technology
84(1)
9.4.1.1 Heuristic Analysis
84(1)
9.4.1.2 Signature-Based Security
84(1)
9.4.1.3 Host-Based Intrusion-Prevention Systems (HIPS)
85(1)
9.5 Advantages and Disadvantages of Malware Protection
85(1)
9.5.1 Advantages
85(1)
9.5.1.1 Heuristic Analysis
85(1)
9.5.1.2 Signature-Based Protection
85(1)
9.5.1.3 Host-Based Intrusion Prevention Systems
85(1)
9.5.2 Disadvantages
85(1)
9.5.2.1 Heuristic Analysis
85(1)
9.5.2.2 Signature-Based Protection
86(1)
9.5.2.3 Host-Based Intrusion Prevention Systems
86(1)
9.6 What Products Use Malware Protection
86(1)
9.7 Conclusion
86(3)
Chapter 10 The Internet of Things (IoT)
89(12)
10.1 Introduction
89(1)
10.2 Brief Historical Background
90(1)
10.3 How IoT Technologies Work
90(3)
10.3.1 End-to-End Platform
92(1)
10.3.2 Connectivity Platform
92(1)
10.3.3 Cloud and Data Platforms
92(1)
10.4 IoT Security Technologies
93(3)
10.4.1 Securing IoT Devices
93(2)
10.4.2 Smart Device Protection Technologies
95(1)
10.4.2.1 Host Identity Protocol (HIP)
95(1)
10.4.2.2 HIP Diet Exchange
95(1)
10.4.2.3 Intrusion Detection and Mitigation Framework
95(1)
10.4.2.4 Intrusion Detection System
95(1)
10.4.2.5 Openflow
96(1)
10.4.2.6 Software-Defined Networking
96(1)
10.5 Advantages and Disadvantages of IoT Security Technologies
96(1)
10.5.1 Advantages
96(1)
10.5.2 Disadvantages
97(1)
10.6 What Products Use IoT Technologies
97(1)
10.7 Conclusion
97(4)
Chapter 11 Network Security
101(12)
11.1 Introduction
101(1)
11.2 Brief Historical Background
101(1)
11.3 How Network Security Technologies Work
102(2)
11.3.1 Firewall
102(1)
11.3.2 Intrusion Detection System (IDS) and Intrusion Prevention
103(1)
11.3.3 Wi-Fi Protected Access 3 (WPA3)
104(1)
11.4 Network Security Technologies
104(2)
11.4.1 Firewalls
105(1)
11.4.2 Email Security
105(1)
11.4.3 Antivirus and Antimalware Software
105(1)
11.4.4 Virtual Private Network (VPN)
105(1)
11.4.5 Intrusion Prevention Systems (IDS)
105(1)
11.5 Advantages and Disadvantages of Network Security
106(1)
11.5.1 Advantages of Network Security
106(1)
11.5.2 Disadvantages of Network Security
106(1)
11.6 Which Products Use Network Security
107(2)
11.6.1 Banks/Financial Institutions
107(1)
11.6.2 Hospitals/Medical Institutions
107(1)
11.6.3 Cloud Computing
108(1)
11.6.4 Use of Network Security Technologies
108(1)
11.6.5 Firewalls
108(1)
11.6.6 Antivirus
109(1)
11.6.7 Security Information and Event Management
109(1)
11.7 Conclusion
109(4)
Chapter 12 Location Tracking
113(10)
12.1 Introduction
113(1)
12.2 Brief Historical Background
113(1)
12.3 How Location Tracking Technologies Work
114(2)
12.3.1 Uses of GPS Technology
114(2)
12.4 Location Tracking Technologies
116(3)
12.4.1 GPS Technology
116(1)
12.4.2 Radio Frequency Identification
116(1)
12.4.3 Internet Tracking
117(1)
12.4.4 Advantages and Disadvantages of Location Tracking
117(1)
12.4.4.1 Advantages of Location Tracking
117(1)
12.4.4.2 Disadvantages of Location Tracking
118(1)
12.5 Which Products Use Location Tracking
119(1)
12.6 Conclusion
120(3)
Chapter 13 Surveillance
123(12)
13.1 Introduction
123(1)
13.2 Brief Historical Background
123(1)
13.3 How Surveillance Technology Works
124(2)
13.3.1 Video Surveillance and Crime
126(1)
13.4 Surveillance Technologies
126(2)
13.4.1 Computer
127(1)
13.4.2 Telephones
127(1)
13.4.3 Aerial Surveillance
128(1)
13.5 Advantages and Disadvantages of Surveillance Technologies
128(2)
13.5.1 Advantages
128(1)
13.5.2 Disadvantages
129(1)
13.6 Which Products Use Surveillance
130(1)
13.7 Conclusion
131(4)
Chapter 14 Insider Threat Protection
135(8)
14.1 Introduction
135(1)
14.2 Brief Historical Background
135(2)
14.3 How Insider Threat Protection Technologies Work
137(1)
14.4 Insider Threat Detection Technologies
137(2)
14.4.1 Data Loss Prevention
138(1)
14.4.2 Email Security Applications
139(1)
14.4.3 Privileged Access Management (PAM)
139(1)
14.5 User Activity Monitoring and Behavior Analytics
139(1)
14.6 Advantages and Disadvantages of Insider Threat Detection
140(1)
14.6.1 Advantages
140(1)
14.6.2 Disadvantages
140(1)
14.7 Conclusion
140(3)
Chapter 15 Intrusion Detection
143(8)
15.1 Introduction
143(1)
15.2 Brief Historical Background
143(1)
15.3 How Intrusion Detection Technologies Work
143(3)
15.3.1 Network-Based Intrusion Prevention System
145(1)
15.3.2 Host Intrusion Detection Systems
145(1)
15.4 Intrusion Detection Technologies
146(1)
15.5 Advantages and Disadvantages of Intrusion Detection Systems
146(1)
15.5.1 Advantages
146(1)
15.5.1.1 Network-Based Intrusion Prevention System
146(1)
15.5.1.2 Host Intrusion Detection Systems
146(1)
15.5.2 Disadvantages
147(1)
15.5.2.1 Network-Based Intrusion Prevention System
147(1)
15.5.2.2 Host Intrusion Detection Systems
147(1)
15.6 Which Products to Use for Intrusion Detection
147(1)
15.7 Conclusion
147(4)
Chapter 16 Vulnerability Scanning
151(8)
16.1 Introduction
151(1)
16.2 Brief Historical Background
151(1)
16.3 How Vulnerability Scanning Technologies Work
151(3)
16.3.1 Public VS Applications
152(1)
16.3.1.1 System Weakness Scanning
152(1)
16.3.1.2 Vulnerability Classification
152(1)
16.3.2 Web VS Applications
153(1)
16.3.3 Internal VS Tools
154(1)
16.4 Vulnerability Scanning Technologies
154(2)
16.4.1 Public VS
155(1)
16.4.2 WebVS
155(1)
16.4.3 Internal VS
155(1)
16.5 Advantages and Disadvantages of Vulnerability Scanning
156(3)
16.5.1 Advantages
156(1)
16.5.2 Disadvantages
156(1)
16.5.3 Conclusion
156(3)
Chapter 17 Penetration Testing
159(8)
17.1 Introduction
159(1)
17.2 Brief Historical Background
159(1)
17.3 How Penetration Testing Technologies Work
160(1)
17.4 Penetration Testing Technologies
160(3)
17.4.1 Application Scanners
162(1)
17.5 Advantages and Disadvantages of Penetration Testing
163(1)
17.5.1 Advantages of Penetration Testing
163(1)
17.5.2 Disadvantages of Penetration Testing
164(1)
17.6 Conclusion
164(3)
Chapter 18 Conclusion
167(2)
Glossary 169(14)
References 183(12)
Index 195
Dr. Abbas Moallem is a consultant and adjunct professor at San Jose State University, California where he teaches human-computer interaction, cybersecurity, information visualization and human factors. He is the program chair of HCI-CPT, the International Conference on HCI for Cybersecurity, Privacy and Trust.

Dr. Moallem is the editor of "HCI in cybersecurity Handbook" and the author of "Cybersecurity Awareness Among College Students and Faculty". He is also the editor of a book series from CRC PRESS called "The Human Element in Smart and Intelligent Systems Series".