ICS515.4 Threat and Environment Manipulation

فهرست مطالب:

Case Study: BlackEnergy2

ICS Threat and Environment Manipulation Goals and Considerations

Analyzing Acquired Evidence

Case Study: Ukraine Power Grid Attack 2015

Malware Analysis Methodologies

Case Study: CRASHOVERRIDE

Documenting Knowledge

Case Study: TRISIS

Information Security Fundamentals

فهرست مطالب کتاب Information Security Fundamentals:

Chapter 1 Overview

Chapter 2 Threats to Information Security

Chapter 3 The Structure of an Information Security Program

Chapter 4 Information Security Policies

Chapter 5 Asset Classification

Chapter 6 Access Control

Chapter 7 Physical Security

Chapter 8 Risk Analysis and Risk Management

Chapter 9 Business Continuity Planning

Glossary

Bibliography

Information Security Management Handbook (Fifth Edition)

فهرست مطالب کتاب Information Security Management Handbook:

Introduction

  1. 1. ACCESS CONTROL SYSTEMS AND METHODOLOGY

Section 1.1 Access Control Techniques

Section 1.2 Access Control Administration

Section 1.3 Identification and Authentication Techniques

Section 1.4 Access Control Methodologies and Implementation

Section 1.5 Methods of Attack

Section 1.6 Monitoring and Penetration Testing

  1. 2. TELECOMMUNICATIONS, NETWORK, AND INTERNET SECURITY

Section 2.1 Communications and Network Security

Section 2.2 Internet/Intranet/Extranet

Section 2.3 E-mail Security

Section 2.4 Secure Voice Communications

Section 2.5 Network Attacks and Countermeasures

  1. 3. INFORMATION SECURITY MANAGEMENT

Section 3.1 Security Management Concepts and Principles

Section 3.2 Change Control Management

Section 3.3 Data Classification

Section 3.4 Risk Management

Section 3.5 Employment Policies and Practices

Section 3.6 Risk Management

Section 3.7 Security Awareness Training

Section 3.8 Security Management Planning

  1. 4. APPLICATION PROGRAM SECURITY

Section 4.1 Application Issues

Section 4.2 Databases and Data Warehousing

Section 4.3 Systems Development Controls

Section 4.4 Malicious Code

Section 4.5 Methods of Attack

  1. 5. CRYPTOGRAPHY

Section 5.1 Use of Cryptography

Section 5.2 Cryptographic Concepts, Methodologies, and Practices

Section 5.3 Private Key Algorithms

Section 5.4 Public Key Infrastructure (PKI)

Section 5.5 System Architecture for Implementing Cryptographic Functions

Section 5.6 Methods of Attack

  1. 6. ENTERPRISE SECURITY ARCHITECTURE

Section 6.1 Principles of Computer and Network Organizations, Architectures, and Designs

Section 6.2 Principles of Security Models, Architectures and Evaluation Criteria

Section 6.3 Common Flaws and Security Issues — System Architecture and Design

  1. 7. OPERATIONS SECURITY

Section 7.1 Concepts

Section 7.2 Resource Protection Requirements

Section 7.3 Auditing

Section 7.4 Intrusion Detection

Section 7.5 Operations Controls

  1. 8. BUSINESS CONTINUITY PLANNING

Section 8.1 Business Continuity Planning

Section 8.2 Disaster Recovery Planning

Section 8.3 Elements of Business Continuity Planning

  1. 9. LAW, INVESTIGATION, AND ETHICS

Section 9.1 Information Law

Section 9.2 Investigations

Section 9.3 Major Categories of Computer Crime

Section 9.4 Incident Handling

Section 9.5 Ethics

  1. 10. PHYSICAL SECURITY

Section 10.1 Facility Requirements

Section 10.2 Technical Controls

Section 10.3 Environment and Life Safety

Information Security: Principles and Practice

فهرست مطالب کتاب Information Security: Principles and Practice:

INTRODUCTION

CRYPTO

CRYPTO BASICS

SYMMETRIC KEY CRYPTO

PUBLIC KEY CRYPTO

HASH FUNCTIONS AND OTHER TOPICS

ADVANCED CRYPTANALYSIS

ACCESS CONTROL

AUTHENTICATION

AUTHORIZATION

PROTOCOLS

SIMPLE AUTHENTICATION PROTOCOLS

REAL-WORLD SECURITY PROTOCOLS

SOFTWARE

SOFTWARE FLAWS AND MALWARE

INSECURITY IN SOFTWARE

OPERATING SYSTEMS AND SECURITY

APPENDIX

ANNOTATED BIBLIOGRAPHY

INDEX

Kali Linux – Assuring Security by Penetration Testing

فهرست مطالب کتاب Kali Linux – Assuring Security by Penetration Testing:

PART I: Lab Preparation and Testing Procedures

Chapter 1: Beginning with Kali Linux

Chapter 2: Penetration Testing Methodology

PART II: Penetration Testers Armory

Chapter 3: Target Scoping

Chapter 4: Information Gathering

Chapter 5: Target Discovery

Chapter 6: Enumerating Target

Chapter 7: Vulnerability Mapping

Chapter 8: Social Engineering

Chapter 9: Target Exploitation

Chapter 10: Privilege Escalation

Chapter 11: Maintaining Access

Chapter 12: Documentation and Reporting

PART III: Extra Ammunition

Appendix A: Supplementary Tools

Appendix B: Key Resources

Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing

فهرست مطالب کتاب Kali Linux Cookbook: Over 70 Recipes to Help You Master Kali Linux for Effective Penetration Security Testing:

Chapter 1: Up and Running with Kali Linux

Chapter 2: Customizing Kali Linux

Chapter 3: Advanced Testing Lab

Chapter 4: Information Gathering

Chapter 5: Vulnerability Assessment

Chapter 6: Exploiting Vulnerabilities

Chapter 7: Escalating Privileges

Chapter 8: Password Attacks

Chapter 9: Wireless Attacks

Kali Linux CTF Blueprints

فهرست مطالب کتاب Kali Linux CTF Blueprints:

Preface

Chapter 1: Microsoft Environments

Chapter 2: Linux Environments

Chapter 3: Wireless and Mobile

Chapter 4: Social Engineering

Chapter 5: Cryptographic Projects

Chapter 6: Red Teaming

Appendix

Index

LAN Switch Security What Hackers Know About Your Switches

فهرست مطالب کتاب LAN Switch Security What Hackers Know About Your Switches:

Introduction

Part I Vulnerabilities and Mitigation Techniques

Chapter 1 Introduction to Security

Chapter 2 Defeating a Learning Bridge’s Forwarding Process

Chapter 3 Attacking the Spanning Tree Protocol

Chapter 4 Are VLANS Safe?

Chapter 5 Leveraging DHCP Weaknesses

Chapter 6 Exploiting IPv4 ARP

Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement

Chapter 8 What About Power over Ethernet?

Chapter 9 Is HSRP Resilient?

Chapter 10 Can We Bring VRRP Down?

Chapter 11 Information Leaks with Cisco Ancillary Protocols

Part II How Can a Switch Sustain a Denial of Service Attack?

Chapter 12 Introduction to Denial of Service Attacks

Chapter 13 Control Plane Policing

Chapter 14 Disabling Control Plane Protocols

Chapter 15 Using Switches to Detect a Data Plane DoS

Part III Using Switches to Augment the Network Security

Chapter 16 Wire Speed Access Control Lists

Chapter 17 Identity-Based Networking Services with 802.1X

Part IV What Is Next in LAN Security?

Chapter 18 IEEE 802.1AE

Appendix Combining IPsec with L2TPv3 for Secure Pseudowire

Index

 

Learn Kali Linux 2019 Perform powerful penetration testing using Kali Linux

فهرست مطالب کتاب Learn Kali Linux 2019:

Section 1: Kali Linux Basics

Chapter 1: Introduction to Hacking

Chapter 2: Setting Up Kali – Part 1

Chapter 3: Setting Up Kali – Part 2

Chapter 4: Getting Comfortable with Kali Linux 2019

Section 2: Reconnaissance

Chapter 5: Passive Information Gathering

Chapter 6: Active Information Gathering

Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019

Chapter 7: Working with Vulnerability Scanners

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Network Penetration Testing – Pre-Connection Attacks

Chapter 10: Network Penetration Testing – Gaining Access

Chapter 11: Network Penetration Testing – Post-Connection Attacks

Chapter 12: Network Penetration Testing – Detection and Security

Chapter 13: Client-Side Attacks – Social Engineering

Chapter 14: Performing Website Penetration Testing

Chapter 15: Website Penetration Testing – Gaining Access

Chapter 16: Best Practices

Linux Essentials for Cybersecurity

فهرست مطالب:

Introduction

Part I: Introducing Linux

Part II: User and Group Accounts

Part III: File and Data Storage

Part IV: Automation

Part V: Networking

Part VI: Process and Log Administration

Part VII: Software Management

Part VIII: Security Tasks

Appendix A: Answers to Review Questions

Appendix B: Resource Guide

Glossary

Index

LPI Security Essentials Study Guide (Exam 020-100)

فهرست مطالب کتاب LPI Security Essentials Study Guide (Exam 020-100):

Introduction

Chapter 1: Using Digital Resources Responsibly

Chapter 2: What Are Vulnerabilities and Threats?

Chapter 3: Controlling Access to Your Assets

Chapter 4: Controlling Network Connections

Chapter 5: Encrypting Your Data at Rest

Chapter 6: Encrypting Your Moving Data

Chapter 7: Risk Assessment

Chapter 8: Configuring System Backups and Monitoring

Chapter 9: Resource Isolation Design Patterns

Appendix: Answers to Review Questions

Index

End User License Agreement

LPI Security Essentials Study Guide Exam 020-100

فهرست مطالب کتاب LPI Security Essentials Study Guide Exam 020-100:

Chapter 1: Using Digital Resources Responsibly

Chapter 2: What Are Vulnerabilities and Threats?

Chapter 3: Controlling Access to Your Assets

Chapter 4: Controlling Network Connections

Chapter 5: Encrypting Your Data at Rest

Chapter 6: Encrypting Your Moving Data

Chapter 7: Risk Assessment

Chapter 8: Configuring System Backups and Monitoring

Chapter 9: Resource Isolation Design Patterns