Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by
How Cybersecurity Really Works
Title Page
Copyright
Dedication
About the Author
Preface
A Note on the Book’s Exercises
Who This Book Is For
What’s in the Book?
ACKNOWLEDGMENTS
Chapter 1: An Introduction to Cybersecurity
What Is Cybersecurity?
Cybersecurity and Privacy
What Cybersecurity Isn’t
Black Hats vs. White Hats
Types of Black Hats
Types of White Hats
Exercise: Learning More About Cybersecurity and Threats
Conclusion
Chapter 2: Attack Targets on the Internet
How the Internet Works
TCP/IP: The Backbone of the Internet
Public vs. Private Networks
How the Internet Looks to a Black Hat
The Black Hat Attack Methodology
Reconnaissance
Weaponization
Delivery
Exploitation and Installation
Command and Control, and Attack on Objectives
How Black Hats Find You
Example 1: The Merger
Example 2: Social Media Hunting
How to Hide from Black Hats
The Internet Is Open
The Internet Is Public
The Internet Is Forever
Exercise: Analyzing Your Network
Network Command Line Tools
Using Shodan
Conclusion
Chapter 3: Phishing Tactics
What Is Phishing?
An Obvious Phish
Not All Phishing Is Obvious
Using Details for a More Convincing Phish
Vishing and Other Non-Email Phishing
How to Protect Yourself Against Phishing
How Black Hats Trick You with URLs
Typosquatting
Complex URLs and Redirects
Modifying DNS Records
Hoaxes
Why Black Hats Love Phishing
Think Twice to Avoid Phishing
Take an Alternate Route
Listen to Your Spidey Sense
Exercise: Analyzing a Phishing Email
Phishing Email Indicators
Header Analysis
URL Analysis
Conclusion
Chapter 4: Malware Infections
What Is Malware?
Types of Malware
Viruses
Worms
Trojans
Ransomware
Spyware and Adware
Rootkits and Bootkits
Polymorphic Malware
How Black Hats Deploy Malware
How to Defend Against Malware
Exercise: Analyzing Malware and Managing Antivirus Settings
Analyzing Malware in Attachments
Reviewing Antivirus Settings
Conclusion
Chapter 5: Password Thefts and Other Account Access Tricks
Authentication
Types of Authentication
Multi-Factor Authentication
Authorization
Mandatory Access Control
Rule-Based Access Control
Role-Based Access Control
Attribute-Based Access Control
Discretionary Access Control
Accounting
Logging
Auditing
Indicators of Attack
Exercise: Setting Up Accounts in Windows 10 and macOS
Windows 10
Access Control on macOS
Conclusion
Chapter 6: Network Tapping
The Basics of Network Design
Attacking Your Network
How Black Hats See Your Traffic
Man-in-the-Middle Attacks
Denial of Service
Distributed Denial of Service
Defense Against Network Attacks
Firewalls
Intrusion Detection Systems
Intrusion Prevention Systems
Exercise: Setting Up Your Firewall
Windows
macOS
Conclusion
Chapter 7: Attacks in the Cloud
How Cloud Computing Works
Software as a Service
Platform as a Service
Infrastructure as a Service
Security as a Service
Attacking the Cloud
Web Application Attacks
Defending the Cloud
Exercise: Performing SQL Injection on the Damn Vulnerable Web Application
Installing Docker and the DVWA
Listing Users
Finding Database Table Names
Finding Passwords
Conclusion
Chapter 8: Wireless Network Pirating
How Wireless Networks Work
Wireless Standards
Wireless Security
Wireless Authentication
Wireless Encryption
Wireless Attacks
Rogue Access Points
Disassociation Attacks
Jamming
Setting Up a Wireless Network with Security in Mind
Exercise: Secure Your WAP
Setting Up Your Access Point
Setting Up Wireless Security
Enabling Filtering
Conclusion
Chapter 9: Encryption Cracking
What Is Cryptography?
What We Encrypt
Early Cryptography
Substitution Ciphers
Transposition Ciphers
Modern Cryptography
Symmetric Cryptography
Asymmetric Cryptography
Validating Public Keys
Hashing
What Happens When You Visit a Website?
How Black Hats Steal Your Keys
Cryptanalysis
Asymmetric Algorithm Attacks
Protecting Your Keys
How Black Hats Break Hashes
Salting Your Hashes
Exercise: Encrypting and Hashing Files
Encrypting and Hashing a File in Windows 10
Protecting Files Using macOS
Using ssh-keygen to Generate a Public Key (Windows 10 or macOS)
Conclusion
Chapter 10: How to Defeat Black Hats
What’s the Worst That Could Happen?
Risks
Threats
Controls
Risk Management Programs
Putting It All Together
Exercise: Conducting a Risk Analysis
Farewell and Good Luck
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
How Cybersecurity Really Works
Next
Next Chapter
Copyright
How Cybersecurity Really Works
A Hands-on Guide for Total Beginners
by Sam Grubb
San Francisco
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset