Il volume è una guida alle conoscenze delle principali problematiche connesse alle minacce cyber con espresso riferimento alle principali strategie e alle prospettive di collaborazione (nazionali ed internazionali) anche tra il settore pubblico e quello privato.
In order to reduce your risk profile from threats such as data leaks, unwanted system access, and system compromises you need to be proactive in implementing cyber security mechanisms. Cyber Security Principles covers the fundamentals of computer/information security and you can apply these principles to systems you want to secure from single computing devices to large network environments.
This book is meant to be a primer and introduce you to the core cyber security principles.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) are among the most common threats to IT security. As it does not require advanced resources, such attacks can be carried out by private individuals as well as organized groups, so-called “hacktivists”. This book gives an overview and detailed description of the different kinds of attacks commonly used by hackers and it shows the challenges for IT security experts. In a practical application exercise, a DoS attack simulation is created by running the tool Low Orbit Ion Canon (LOIC) on the attacker side and a victim running an Apache 2 server. A Wireshark network utility tool is used to capture and analyze the difference between the traffic sent from the LOIC client and the normal user. In addition, to simulate a DDoS attack, a MeTuS Delphi 2.8 tool is used to create the botnet. The configurations required to run the MeTuS Delphi tool such as PortForwarding and setting up a Dynamic DNS Update Client are shown in detail. A SSYN attack is also carried out by using the tool itself. Finally, the different mitigation techniques such as Iptables, ModSecurity, and Mod Evasive are discussed and shown in practice.
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.
Contains insider knowledge of what could be your most likely Low Tech threatIncludes timely advice from some of the top security minds in the worldCovers many detailed countermeasures that you can employ to improve your security posture