Skip to content

Cyber Security Essentials

ISBN-10: 1439851239

ISBN-13: 9781439851234

Edition: 2011

Authors: Rick Howard, James Graham, Ryan Olson

Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

A collection of intelligence and security articles, this book covers common security terms and vulnerabilities, such as Stack Based Buffer Overflows, Malware_Naming, Fast-Flux, SQL Injection, and Format_String_ Vulnerability. It explains more than 75 common security vulnerabilities clearly and concisely in short, well-illustrated, easy-to-read and comprehend descriptions. The author provides actionable advice on how to mitigate each vulnerability that enables a proactive response to threats and attacks.
Customers also bought

Book details

Copyright year: 2011
Publisher: Taylor & Francis Group
Publication date: 12/15/2010
Binding: Paperback
Pages: 342
Size: 6.25" wide x 9.25" long x 0.75" tall
Weight: 1.100
Language: English

James Graham won the Catherine Johnson Award for the Best Play 2007 for Eden's Empire. Other plays include Albert's Boy (recipient of a Pearson Playwriting Bursary), Little Madam (Finborough), Tory Boyz (Soho Theatre), The Man (Finborough), The Whisky Taster (Bush), Sons of York (Finborough) suddenlossofdignity.com (Bush), This House (National Theatre) and Privacy (Donmar Warehouse). James Graham also writes for TV and film.

This book is the direct result of the outstanding efforts of a talented pool of security analysts, editors, business leaders and security professionals, all of whom work for iDefense ® Security Intelligence Services; a business unit of VeriSign, Inc.iDefense is an open-source, cyber security intelligence operation that maintains expertise in vulnerability research and alerting, exploit development, malicious code analysis, underground monitoring and international actor attribution. iDefense provides intelligence products to Fortune 1,000 companies and "three-letter agencies" in various world governments. iDefense also maintains the Security Operations Center for the Financial Sector Information Sharing and Analysis Center (FS-ISAC); one of 17 ISACs mandated by the US government to facilitate information sharing throughout the country�s business sectors.iDefense has the industry-unique capability of determining not only the technical details of cyber security threats and events (the "what", the "when" and the "where"), but because of their international presence, iDefense personnel can ascertain the most likely actors and motivations behind these attacks (the "who" and the "why").For more information, please contact customerservice@idefense.com.

A Note from the Executive Editors
About the Authors
Contributors
Cyber Security Fundamentals
Network and Security Concepts
Information Assurance Fundamentals
Authentication
Authorization
Nonrepudiation
Confidentiality
Integrity
Availability
Basic Cryptography
Symmetric Encryption
Example of Simple Symmetric Encryption with Exclusive OR (XOR)
Improving upon Stream Ciphers with Block Ciphers
Public Key Encryption
The Domain Name System (DNS)
Security and the DNS
Firewalls
History Lesson
What's in a Name?
Packet-Filtering Firewalls
Stateful Firewalls
Application Gateway Firewalls
Conclusions
Virtualization
In the Beginning, There Was Blue...
The Virtualization Menu
Full Virtualization
Getting a Helping Hand from the Processor
If All Else Fails, Break It to Fix It
Use What You Have
Doing It the Hard Way
Biting the Hand That Feeds
Conclusion
Radio-Frequency Identification
Identify What?
Security and Privacy Concerns
Microsoft Windows Security Principles
Windows Tokens
Introduction
Concepts behind Windows Tokens
Access Control Lists
Conclusions
Window Messaging
Malicious Uses of Window Messages
Solving Problems with Window Messages
Windows Program Execution
Validation of Parameters
Load Image, Make Decisions
Creating the Process Object
Context Initialization
Windows Subsystem Post Initialization
Initial Thread... Go!
Down to the Final Steps
Exploiting Windows Execution for Fun and Profit
The Windows Firewall
References
Attacker Techniques and Motivations
How Hackers Cover Their Tracks (Antiforensics)
How and Why Attackers Use Proxies
Types of Proxies
Detecting the Use of Proxies
Conclusion
Tunneling Techniques
HTTP
DNS
ICMP
Intermediaries, Steganography, and Other Concepts
Detection and Prevention
Fraud Techniques
Phishing, Smishing, Vishing, and Mobile Malicious Code
Mobile Malicious Code
Phishing against Mobile Devices
Conclusions
Rogue Antivirus
Following the Money: Payments
Conclusions
Click Fraud
Pay-per-Click
Click Fraud Motivations
Click Fraud Tactics and Detection
Conclusions
Threat Infrastructure
Botnets
Fast-Flux
Advanced Fast-Flux
References
Exploitation
Techniques to Gain a Foothold
Shellcode
Integer Overflow Vulnerabilities
Stack-Based Buffer Overflows
Stacks upon Stacks
Crossing the Line
Protecting against Stack-Based Buffer Overflows
Addendum: Stack-Based Buffer Overflow Mitigation
Format String Vulnerabilities
SQL Injection
Protecting against SQL Injection
Conclusion
Malicious PDF Files
PDF File Format
Creating Malicious PDF Files
Reducing the Risks of Malicious PDF Files
Concluding Comments
Race Conditions
Examples of Race Conditions
Detecting and Preventing Race Conditions
Conclusion
Web Exploit Tools
Features for Hiding
Commercial Web Exploit Tools and Services
Updates, Statistics, and Administration
Proliferation of Web Exploit Tools Despite Protections
DoS Conditions
Brute Force and Dictionary Attacks
Attack
Misdirection, Reconnaissance, and Disruption Methods
Cross-Site Scripting (XSS)
Social Engineering
WarXing
DNS Amplification Attacks
Defeating Amplification
References
Malicious Code
Self-Replicating Malicious Code
Worms
Viruses
Evading Detection and Elevating Privileges
Obfuscation
Virtual Machine Obfuscation
Persistent Software Techniques
Basic Input-Output System (BIOS)/Complementary Metal-Oxide Semiconductor (CMOS) and Master Boot Record (MBR) Malicious Code
Hypervisors
Legacy Text Files
Autostart Registry Entries
Start Menu "Startup" Folder
Detecting Autostart Entries
Rootkits
User Mode Rootkits
Kernel Mode Rootkits
Conclusion
Spyware
Attacks against Privileged User Accounts and Escalation of Privileges
Many Users Already Have Administrator Permissions
Getting Administrator Permissions
Conclusion
Token Kidnapping
Virtual Machine Detection
Fingerprints Everywhere!
Understanding the Rules of the Neighborhood
Detecting Communication with the Outside World
Putting It All Together
The New Hope
Conclusion
Stealing Information and Exploitation
Form Grabbing
Man-in-the-Middle Attacks
Detecting and Preventing MITM Attacks
Conclusion
DLL Injection
Windows Registry DLL Injection
Injecting Applications
Reflective DLL Injections
Conclusion
Browser Helper Objects
Security Implications
References
Defense and Analysis Techniques
Memory Forensics
Why Memory Forensics Is Important
Capabilities of Memory Forensics
Memory Analysis Frameworks
Dumping Physical Memory
Installing and Using Volatility
Finding Hidden Processes
Volatility Analyst Pack
Conclusion
Honeypots
Malicious Code Naming
Concluding Comments
Automated Malicious Code Analysis Systems
Passive Analysis
Active Analysis
Physical or Virtual Machines
Intrusion Detection Systems
References
iDefense Special File Investigation Tools
Index