1 - 20
Next
- Wang, Jie, 1961-
- Second edition. - Hoboken, NJ : Wiley ; Singapore : HEP, 2015.
- Description
- Book — 1 online resource.
- Summary
-
- Front Matter
- Network Security Overview
- Data Encryption Algorithms
- Public-Key Cryptography and Key Management
- Data Authentication
- Network Security Protocols in Practice
- Wireless Network Security
- Cloud Security
- Network Perimeter Security
- Intrusion Detections
- The Art of Anti-Malicious Software
- 7-bit ASCII code
- SHA-512 Constants (in Hexadecimal)
- Data Compression Using ZIP
- Base64 Encoding
- Cracking WEP Keys Using WEPCrack
- Acronyms
- Further Readings
- Index
(source: Nielsen Book Data)
2. Network Security [electronic resource] [2014]
- Perez, Andre.
- London : ISTE ; Hoboken, NJ : Wiley, 2014.
- Description
- Book — 1 online resource
- Summary
-
- PREFACE xi ABBREVIATIONS xxxiii
- CHAPTER 1. INTRODUCTION TO CRYPTOGRAPHY 1
- 1.1. The encryption function 1
- 1.1.1. 3DES algorithm 3
- 1.1.2. AES algorithm 6
- 1.1.3. RSA algorithm 10
- 1.1.4. ECC algorithm 12
- 1.2. Hash function 13
- 1.2.1. MD5 algorithm 13
- 1.2.2. SHA algorithm 16
- 1.2.3. HMAC mechanism 20
- 1.3. Key exchange 22
- 1.3.1. Secret-key generation 22
- 1.3.2. Public key distribution 24
- CHAPTER 2. 802.1X MECHANISM 27
- 2.1. General introduction 27
- 2.2. EAPOL protocol 28
- 2.2.1. EAPOL-Start message 30
- 2.2.2. EAPOL-Logoff message 30
- 2.2.3. EAPOL-Key message 30
- 2.2.4. EAPOL-Encapsulated-ASF-Alert message 31
- 2.2.5. EAPOL-MKA message 31
- 2.2.6. EAPOL-Announcement message 31
- 2.2.7. EAPOL-Announcement-Req message 32
- 2.3. EAP protocol 32
- 2.3.1. EAP-Method Identity 35
- 2.3.2. EAP-Method Notification 35
- 2.3.3. EAP-Method NAK 36
- 2.4. RADIUS protocol 36
- 2.4.1. RADIUS messages 38
- 2.4.2. RADIUS attributes 39
- 2.5. Authentication procedures 42
- 2.5.1. EAP-MD5 procedure 44
- 2.5.2. EAP-TLS procedure 45
- 2.5.3. EAP-TTLS procedure 48
- CHAPTER 3. WPA MECHANISMS 51
- 3.1. Introduction to Wi-Fi technology 51
- 3.2. Security mechanisms 54
- 3.3. Security policies 55
- 3.4. Key management 59
- 3.4.1. Key hierarchy 59
- 3.4.2. EAPOL-key messages 61
- 3.4.3. Four-way handshake procedure 63
- 3.4.4. Group key handshake procedure 67
- 3.5. WEP protocol 68
- 3.6. TKIP protocol 70
- 3.7. CCMP protocol 73
- CHAPTER 4. IPSEC MECHANISM 77
- 4.1. Review of IP protocols 77
- 4.1.1. IPv4 protocol 77
- 4.1.2. IPv6 protocol 80
- 4.2. IPSec architecture 83
- 4.2.1. Security headers 85
- 4.2.2. Security association 89
- 4.2.3. PMTU processing 92
- 4.3. IKEv2 protocol 93
- 4.3.1. Message header 93
- 4.3.2. Blocks 96
- 4.3.3. Procedure 102
- CHAPTER 5. SSL, TLS AND DTLS PROTOCOLS 109
- 5.1. Introduction 109
- 5.2. SSL/TLS protocols 111
- 5.2.1. Record header 111
- 5.2.2. Change-cipher-spec message 112
- 5.2.3. Alert message 112
- 5.2.4. Handshake messages 114
- 5.2.5. Cryptographic information 124
- 5.3. DTLS protocol 126
- 5.3.1. Adaptation to UDP transport 126
- 5.3.2. Adaptation to DCCP transport 129
- 5.3.3. Adaption to SCTP transport 130
- 5.3.4. Adaption to SRTP transport 131
- CHAPTER 6. NETWORK MANAGEMENT 133
- 6.1. SNMPv3 management 133
- 6.1.1. Introduction 133
- 6.1.2. SNMPv3 architecture 135
- 6.1.3. SNMPv3 message structure 143
- 6.2. SSH protocol 146
- 6.2.1. SSH-TRANS protocol 146
- 6.2.2. SSH-USERAUTH protocol 151
- 6.2.3. SSH-CONNECT protocol 152
- CHAPTER 7. MPLS TECHNOLOGY 155
- 7.1. MPLS overview 155
- 7.1.1. Network architecture 155
- 7.1.2. LSR router tables 157
- 7.1.3. PHP function 158
- 7.1.4. MPLS header format 159
- 7.1.5. DiffServ support 160
- 7.2. LDP protocol 162
- 7.2.1. Principles of functioning 162
- 7.2.2. LDP PDU format 165
- 7.2.3. LDP messages 167
- 7.3. VPN construction 170
- 7.3.1. Network architecture 170
- 7.3.2. Differentiation of routes 174
- 7.3.3. Route target 175
- 7.3.4. Principles of operation 177
- 7.4. Network interconnection 180
- 7.4.1. Hierarchical mode 181
- 7.4.2. Recursive mode 182
- CHAPTER 8. ETHERNET VPN 185
- 8.1. Ethernet technology 185
- 8.1.1. Physical layer 186
- 8.1.2. MAC layer 188
- 8.1.3. VLAN isolation 191
- 8.2. PBT technology 194
- 8.3. VPLS technology 196
- 8.3.1. Network architecture 196
- 8.3.2. EoMPLS header 199
- 8.3.3. LDP 201
- 8.4. L2TPv3 technology 203
- 8.4.1. Data message 203
- 8.4.2. Control messages 205
- 8.4.3. Procedures 208
- CHAPTER 9. FIREWALLS 215
- 9.1. Technologies 215
- 9.1.1. Packet filter 216
- 9.1.2. Applicative gateway 218
- 9.1.3. NAT/NAPT device 219
- 9.2. NAT/NAPT device crossing 222
- 9.2.1. ICMP protocol 223
- 9.2.2. IPSec mechanism 224
- 9.2.3. SIP, SDP and RTP protocols 227
- 9.2.4. FTP protocol 233
- 9.2.5. Fragmentation 235
- CHAPTER 10. INTRUSION DETECTION 237
- 10.1. Typology of attacks 237
- 10.2. Methods of detection 239
- 10.2.1. Signature-based detection 240
- 10.2.2. Anomaly-based detection 240
- 10.2.3. Protocol analysis 241
- 10.3. Technologies 242
- 10.3.1. N-IDPS device 243
- 10.3.2. WIDPS device 246
- 10.3.3. H-IDPS device 248
- 10.3.4. NBA device 249
- BIBLIOGRAPHY 253
- INDEX 259.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Gregg, Michael (Michael C.), author.
- Indianapolis, IN : Wiley, [2015]
- Description
- Book — 1 online resource : color illustrations
- Summary
-
- Building a Hardware and Software Test Platform
- Passive Information Gathering
- Analyzing Network Traffic
- Detecting Live Systems and Analyzing Results
- Enumerating Systems
- Automating Encryption and Tunneling Techniques
- Automated Attack and Penetration Tools
- Securing Wireless Systems
- An Introduction to Malware
- Detecting Intrusions and Analyzing Malware
- Forensic Detection.
(source: Nielsen Book Data)
- Chuvakin, Anton A.
- Waltham, Mass. : Syngress, 2013.
- Description
- Book — 1 online resource (xxx, 431 p. :) ill.
- Summary
-
- Chapter 1 Logs, Trees, Forest: the Big Picture Chapter 2 What is a Log? Chapter 3 Generating Logs
- Chapter 4 Log Storage Technologies Chapter 5 Case study: syslog-ng
- Chapter 6 Covert logging
- Chapter 7 Analysis Goals, Planning and Preparation: What Are We Looking for?
- Chapter 8 Simple Analysis Techniques Chapter 9 Filtering, Matching and Correlation Chapter 10 Statistical Analysis Chapter 11 Log Data Mining Chapter 12 Reporting and Summarization Chapter 13 Visualizing Log Data Chapter 14 Logging Laws and Logging Mistakes Chapter 15 Tools for Log Analysis and Collection Chapter 16 Log Management Procedures: Escalation, Response Chapter 17 Attacks against logging systems Chapter 18 Logging for Programmers
- Chapter 19 Logs and Compliance Chapter 20 Planning Your Own Log Analysis System Chapter 21 Cloud Logging
- Chapter 22 Log Standard and Future Trends.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Williams, Branden R., author.
- Fifth edition. - Boca Raton, FL : CRC Press, 2022.
- Description
- Book — 1 online resource
- Summary
-
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources. If you accept, process, transmit, or store payment card data branded by Visa, MasterCard, American Express, Discover, or JCB (or their affiliates and partners), you must comply with this lengthy standard. Personal data theft is at the top of the list of likely cybercrimes that modern-day corporations must defend against. In particular, credit or debit card data is preferred by cybercriminals as they can find ways to monetize it quickly from anywhere in the world. Is your payment processing secure and compliant? The new Fifth Edition of PCI Compliance has been revised to follow the new PCI DSS version 4.0, which is a complete overhaul to the standard. Also new to the Fifth Edition are: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as Kubernetes, cloud, near-field communication, point-to-point encryption, Mobile, Europay, MasterCard, and Visa. This is the first book to address the recent updates to PCI DSS and the only book you will need during your PCI DSS journey. The real-world scenarios and hands-on guidance will be extremely valuable, as well as the community of professionals you will join after buying this book. Each chapter has how-to guidance to walk you through implementing concepts and real-world scenarios to help you grasp how PCI DSS will affect your daily operations. This book provides the information that you need in order to understand the current PCI Data Security Standards and the ecosystem that surrounds them, how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally identifiable information. Our book puts security first as a way to enable compliance. Completely updated to follow the current PCI DSS version 4.0 Packed with tips to develop and implement an effective PCI DSS and cybersecurity strategy Includes coverage of new and emerging technologies such as Kubernetes, mobility, and 3D Secure 2.0 Both authors have broad information security backgrounds, including extensive PCI DSS experience
- Oriyano, Sean-Philip.
- [Waltham, MA] : Syngress, 2012.
- Description
- Book — 1 online resource.
- Summary
-
- Introduction
- Chapter 1: Background on Attacks
- Chapter 2: A Closer Look at Client-Side Attacks
- Chapter 3: A History of Web Browsers
- Chapter 4: The Problem with Browsers
- Chapter 5: Exploring and Exploiting Active Content
- Chapter 6: Browser Defenses
- Chapter 7: E-mail Client Attacks
- Chapter 8: E-mail Client Defenses
- Chapter 9: Web Applications
- Chapter 10: Web Applications and Client Defenses
- Chapter 11: Other Client-Side Attack Targets
- Chapter 12: Malware
- Chapter 13: Client-Side Countermeasures
- Chapter 14: The Road Ahead.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Assing, Dominique.
- London : ISTE ; Hoboken, NJ : John Wiley & Sons, c2013.
- Description
- Book — 1 online resource (xi, 234 p.)
- Summary
-
- Preface Introduction Chapter 1
- An ordinary in the life of M. Rowley, or the dangers of virtualization and mobility. Chapter 2
- Threats and attacks Chapter 3
- Technological countermeasures Chapter 4
- Technological countermeasures for remote access Chapter 5
- What should have been done for M. Rowley's day to be ordinary Conclusion Appendix 1
- Recap of security solutions Appendix 2
- Glossary.
- (source: Nielsen Book Data)
- Introduction ix
- Chapter 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility 1 1.1. A busy day 1 1.2. The ups and downs of the day 3 1.3. What actually happened? 3
- Chapter 2. Threats and Attacks 7 2.1. Reconnaissance phase 9 2.1.1. Passive mode information gathering techniques 10 2.1.2. Active mode information gathering techniques 14 2.2. Identity/authentication attack 22 2.2.1. ARP spoofing 22 2.2.2. IP spoofing 22 2.2.3. Connection hijacking 29 2.2.4. Man in the middle 29 2.2.5. DNS spoofing 30 2.2.6. Replay attack 31 2.2.7. Rebound intrusion 31 2.2.8. Password hacking 32 2.2.9. The insecurity of SSL/TLS 34 2.3. Confidentiality attack 38 2.3.1. Espionage software 39 2.3.2. Trojans 41 2.3.3. Sniffing 43 2.3.4. Cracking encrypted data 44 2.4. Availability attack 49 2.4.1. ICMP Flood 50 2.4.2. SYN Flood 50 2.4.3. Smurfing 52 2.4.4. Log Flood 52 2.4.5. Worms 53 2.5. Attack on software integrity 55 2.6. BYOD: mixed-genre threats and attacks 57 2.7. Interception of GSM/GPRS/EDGE communications 61
- Chapter 3. Technological Countermeasures 65 3.1. Prevention 66 3.1.1. Protection of mobile equipment 67 3.1.2. Data protection 71 3.2. Detection 81 3.2.1. Systems of intrusion detection 81 3.2.2. Honeypot 88 3.2.3. Management and supervision tools 91 3.3. Reaction 95 3.3.1. Firewall 95 3.3.2. Reverse proxy 102 3.3.3. Antivirus software 104 3.3.4. Antivirus software: an essential building block but in need of completion 107 3.4. Organizing the information system's security 108 3.4.1. What is security organization? 109 3.4.2. Quality of security, or the attraction of ISMS 110
- Chapter 4. Technological Countermeasures for Remote Access 113 4.1. Remote connection solutions 114 4.1.1. Historic solutions 115 4.1.2. Desktop sharing solutions 115 4.1.3. Publication on the Internet 116 4.1.4. Virtual Private Network (VPN) solutions 118 4.2. Control of remote access 137 4.2.1. Identification and authentication 139 4.2.2. Unique authentication 155 4.3. Architecture of remote access solutions 157 4.3.1. Securing the infrastructure 157 4.3.2. Load balancing/redundancy 161 4.4. Control of conformity of the VPN infrastructure 162 4.5. Control of network admission 166 4.5.1. Control of network access 166 4.5.2. ESCV (Endpoint Security Compliancy Verification) 167 4.5.3. Mobile NAC 170
- Chapter 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary 173 5.1. The attack at Mr Rowley's house 173 5.1.1. Securing Mr Rowley's PC 173 5.1.2. Securing the organizational level 174 5.1.3. Detection at the organizational level 175 5.1.4. A little bit of prevention 175 5.2. The attack at the airport VIP lounge while on the move 176 5.3. The attack at the cafe 176 5.4. The attack in the airport VIP lounge during Mr Rowley's return journey 178 5.5. The loss of a smartphone and access to confidential data 180 5.6. Summary of the different security solutions that should have been implemented 181 Conclusion 187 APPENDICES 189
- Appendix 1 191
- Appendix 2 197 Bibliography 223 Index 233.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents: 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary.
(source: Nielsen Book Data)
- Dhanjani, Nitesh, author.
- First edition. - Sebastopol, CA : O'Reilly, [2015]
- Description
- Book — 1 online resource.
- Summary
-
- Copyright
- Table of Contents
- Foreword
- Preface
- Who This Book Is For
- How to Use This Book
- Conventions Used in This Book
- Using Code Examples
- Safari® Books Online
- How to Contact Us
- Acknowledgments
- Chapter 1. Lights Out-Hacking Wireless Lightbulbs to Cause Sustained Blackouts
- Why hue?
- Controlling Lights via the Website Interface
- Information Leakage
- Drive-by Blackouts
- Weak Password Complexity and Password Leaks
- Controlling Lights Using the iOS App
- Stealing the Token from a Mobile Device
- Malware Can Cause Perpetual Blackouts.
- Changing Lightbulb State
- If This Then That (IFTTT)
- Conclusion
- Chapter 2. Electronic Lock Picking-Abusing Door Locks to Compromise Physical Security
- Hotel Door Locks and Magnetic Stripes
- The Onity Door Lock
- The Magnetic Stripe
- The Programming Port
- Security Issues
- Vendor Response
- The Case of Z-Wave-Enabled Door Locks
- Z-Wave Protocol and Implementation Analysis
- Exploiting Key-Exchange Vulnerability
- Bluetooth Low Energy and Unlocking via Mobile Apps
- Understanding Weaknesses in BLE and Using Packet-Capture Tools
- Kevo Mobile App Insecurities
- Conclusion.
- Chapter 3. Assaulting the Radio Nurse-Breaching Baby Monitors and One Other Thing
- The Foscam Incident
- Foscam Vulnerabilities Exposed by Researchers
- Using Shodan to Find Baby Monitors Exposed on the Internet
- Exploiting Default Credentials
- Exploiting Dynamic DNS
- The Foscam Saga Continues
- The Belkin WeMo Baby Monitor
- Bad Security by Design
- Malware Gone Wild
- Some Things Never Change: The WeMo Switch
- Conclusion
- Chapter 4. Blurred Lines-When the Physical Space Meets the Virtual Space
- SmartThings
- Hijacking Credentials
- Abusing the Physical Graph.
- SmartThings SSL Certificate Validation Vulnerability
- Interoperability with Insecurity Leads to{u2026}Insecurity
- SmartThings and hue Lighting
- SmartThings and the WeMo Switch
- Conclusion
- Chapter 5. The Idiot Box-Attacking "Smart" Televisions
- The TOCTTOU Attack
- The Samsung LExxB650 Series
- The Exploit
- You Call That Encryption?
- Understanding XOR
- I call it Encraption
- Understanding and Exploiting the App World
- Decrypting Firmware
- Cursory Exploration of the Operating System
- Remotely Exploiting a Samsung Smart TV
- Inspecting Your Own Smart TV (and Other IoT Devices)
- Say Hello to the WiFi Pineapple Mark V
- Capturing credentials and stripping TLS
- Conclusion
- Chapter 6. Connected Car Security Analysis-From Gas to Fully Electric
- The Tire Pressure Monitoring System (TPMS)
- Reversing TPMS Communication
- Eavesdropping and Privacy Implications
- Spoofing Alerts
- Exploiting Wireless Connectivity
- Injecting CAN Data
- Bluetooth Vulnerabilities
- Vulnerabilities in Telematics
- Significant Attack Surface
- The Tesla Model S
- Locate and Steal a Tesla the Old-Fashioned Way
- Social Engineering Tesla Employees and the Quest for Location Privacy.
(source: Nielsen Book Data)
- Mao, Wenji.
- 1st ed. - Amsterdam ; Boston : Elsevier/AP : Zhejiang University Press, c2012.
- Description
- Book — 1 online resource : ill.
- Waltham, MA : Morgan Kaufmann, c2012.
- Description
- Book — 1 online resource.
- Summary
-
- Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security - The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure
- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Boca Raton, FL : CRC Press, 2021
- Description
- Book — 1 online resource
- Summary
-
- Chapter 1 An Overview of the Artificial Intelligence Evolution and its Fundamental Concepts, and their relationship with IoT Security
- Chapter 2 Smart City: Evolution and fundamental concepts
- Chapter 3 Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment
- Chapter 4 A conceptual model for optimal resource sharing of networked microgrids focusing uncertainty - paving path to eco-friendly smart cities
- Chapter 5 A Novel Framework for Cyber Secure Smart City
- Chapter 6 Contemplate Security Challenges & Threats for Smart Cities
- Chapter 7 Self-Monitoring Obfuscated IoT Network
- Chapter 8 Introduction to Side Channel Attacks and Investigation of Power Analysis & Fault Injection Attack Techniques
- Chapter 9 Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study
- Chapter 10 Internet of Things Security and Privacy in Smart Cities: Status and Challenges
- Chapter 11 5G Security and the Internet of Things
- Chapter 12 The Problem of Deepfake Videos and How to Counteract Them in Smart Cities
- Chapter 13 The Rise of Ransomware aided by Vulnerable IoT devices
- Chapter 14 Security Issues in Self-Driving Cars within Smart Cities
- Chapter 15 PhishFree: A Honeybee Inspired System for Smart City Free of Phishing Attacks
- Chapter 16 Trust Aware Crowd Associated Network-based Approach for Optimal Waste Management in Smart Cities.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- 2nd ed. - Amsterdam : Morgan Kaufmann Publishers is an imprint of Elsevier, [2013]
- Description
- Book — 1 online resource.
- Summary
-
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
(source: Nielsen Book Data)
13. Intelligent mobile malware detection [2023]
- Thomas, Tony, author.
- First edition. - Boca Raton, FL : CRC Press, 2023.
- Description
- Book — 1 online resource
- Summary
-
The popularity of Android mobile phones has caused more cybercriminalstocreate malware applications that carry out various malicious activities. The attacks, whichescalatedafter the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, andthe malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.
- Loshin, Peter.
- Waltham, MA : Elsevier Science, 2013.
- Description
- Book — 1 online resource (viii, 130 p.)
- Summary
-
- Chapter 1: Getting Started: Threats
- Chapter 2: Securing the Computer
- Chapter 3: Securing the Network
- Chapter 4: Using an Onion-Routed Network
- Chapter 5: Hidden Services
- Chapter 6: Anonymous Email and other Resources.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Engebretson, Pat (Patrick Henry), 1974-
- 2nd ed. - Amsterdam : Syngress, an imprint of Elsevier, 2013.
- Description
- Book — 1 online resource.
- Summary
-
- Chapter 1. What is Penetration Testing?
- Chapter 2. Reconnaissance
- Chapter 3. Scanning
- Chapter 4. Exploitation
- Chapter 5. Web Based Exploitation
- Chapter 6. Maintaining Access with Backdoors and Rootkits
- Chapter 7. Trapping Up the Penetration Test.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Broad, James.
- Amsterdam : Syngress, an imprint of Elsevier, 2013.
- Description
- Book — 1 online resource.
- Summary
-
- Introduction
- Laws, Regulation and Guidance
- The Joint Task Force Transformation Initiative
- Key Positions and Roles
- Transition from the Four-Phase Certification and Accreditation Cycle
- The RMF
- Integrated Organization-Wide Risk Management
- Lab Organization
- Phase 1: System Categorization
- Phase 2: Control Selection
- Phase 3: Control Implementation
- Phase 4: Control Assessment
- Phase 5: System Authorization
- Phase 6: Continuous Monitoring
- Use of RMF in Other Environments
- Future Planned Changes
- Use with Other Compliance Requirements
- Appendices.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Christy, S. Russell, author.
- Indianapolis, Indiana : Sybex, a Wiley Brand, [2018]
- Description
- Book — 1 online resource.
- Summary
-
- Front Matter
- Threats, Attacks, and Vulnerabilities
- Technologies and Tools
- Architecture and Design
- Identity and Access Management
- Risk Management
- Cryptography and PKI
- Practice Test
- Comprehensive Online Learning Environment
- Pauli, Joshua J.
- Amsterdam : Syngress, an imprint of Elsevier, 2013.
- Description
- Book — 1 online resource.
- Summary
-
- Introduction Basics of Web Hacking Web Server Hacking Web App Recon and Scanning Web App Exploitation with Code Injection Web App Exploitation with Broken Authentication and Path Traversal Web User Hacking Fixes Next Steps.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Hoboken : John Wiley & Sons, c2012.
- Description
- Book — 1 online resource (387 p.)
- Summary
-
- Foreword xv Preface xvii Is the Title of this Book a Joke? xix Acknowledgments xxi Contributors xxiii Part I The Problem 1 What Could Kill the Internet? And so What? 3 2 It is About People 7 2.1 Human and Social Issues 7 Markus Jakobsson 2.1.1 Nigerian Scams 8 2.1.2 Password Reuse 9 2.1.3 Phishing 11 2.2 Who are the Criminals? 13 Igor Bulavko 2.2.1 Who are they? 13 2.2.2 Where are they? 14 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers 14 2.2.4 Let's try to Find Parallels in the World we Live in 16 2.2.5 Crime and Punishment? 16 3 How Criminals Profit 19 3.1 Online Advertising Fraud 20 Nevena Vratonjic, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux 3.1.1 Advertising on the Internet 20 3.1.2 Exploits of Online Advertising Systems 23 3.1.3 Click Fraud 25 3.1.4 Malvertising: Spreading Malware via Ads 31 3.1.5 Inflight Modification of Ad Traffic 32 3.1.6 Adware: Unsolicited Software Ads 34 3.1.7 Conclusion 35 3.2 Toeing the Line: Legal but Deceptive Service Offers 35 Markus Jakobsson and Ruilin Zhu 3.2.1 How Does it Work? 36 3.2.2 What do they Earn? 36 3.3 Phishing and Some Related Attacks 38 Markus Jakobsson and William Leddy 3.3.1 The Problem is the User 38 3.3.2 Phishing 38 3.3.3 Man-in-the-Middle 39 3.3.4 Man-in-the-Browser 40 3.3.5 New Attack: Man-in-the-Screen 41 3.4 Malware: Current Outlook 42 Members of the BITS Security Working Group and staff leads Greg Rattray and Andrew Kennedy 3.4.1 Malware Evolution 42 3.4.2 Malware Supply and Demand 48 3.5 Monetization 53 Markus Jakobsson 3.5.1 There is Money Everywhere 53 4 How ThingsWork and Fail 57 4.1 Online Advertising: With Secret Security 58 Markus Jakobsson 4.1.1 What is a Click? 58 4.1.2 How Secret Filters are Evaluated 60 4.1.3 What do Fraudsters Know? 62 4.2 Web Security Remediation Efforts 63 Jeff Hodges and Andy Steingruebl 4.2.1 Introduction 63 4.2.2 The Multitude of Web Browser Security Mechanisms 64 4.2.3 Where do we go from Here? 75 4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content 75 Juan Caballero, Adam Barth, and Dawn Song 4.3.1 Introduction 75 4.3.2 Content-Sniffing XSS Attacks 77 4.3.3 Defenses 84 4.3.4 Conclusion 89 4.4 Our Internet Infrastructure at Risk 89 Garth Bruen 4.4.1 Introduction 89 4.4.2 The Political Structure 90 4.4.3 The Domain 92 4.4.4 WHOIS: Ownership and Technical Records 94 4.4.5 Registrars: Sponsors of Domain Names 96 4.4.6 Registries: Sponsors of Domain Extensions 97 4.4.7 CCTLDs: The Sovereign Domain Extensions 99 4.4.8 ICANN: The Main Internet Policy Body 100 4.4.9 Conclusion 102 4.5 Social Spam 103 Dimitar Nikolov and Filippo Menczer 4.5.1 Introduction 103 4.5.2 Motivations for Spammers 105 4.5.3 Case Study: Spam in the GiveALink Bookmarking System 108 4.5.4 Web Pollution 114 4.5.5 The Changing Nature of Social Spam: Content Farms 116 4.5.6 Conclusion 117 4.6 Understanding CAPTCHAs and Their Weaknesses 117 Elie Bursztein 4.6.1 What is a Captcha? 117 4.6.2 Types of Captchas 118 4.6.3 Evaluating Captcha Attack Effectiveness 118 4.6.4 Design of Captchas 119 4.6.5 Automated Attacks 124 4.6.6 Crowd-Sourcing: Using Humans to Break Captchas 127 4.7 Security Questions 131 Ariel Rabkin 4.7.1 Overview 131 4.7.2 Vulnerabilities 134 4.7.3 Variants and Possible Defenses 138 4.7.4 Conclusion 139 4.8 Folk Models of Home Computer Security 140 Rick Wash and Emilee Rader 4.8.1 The Relationship Between Folk Models and Security 140 4.8.2 Folk Models of Viruses and Other Malware 142 4.8.3 Folk Models of Hackers and Break-Ins 146 4.8.4 Following Security Advice 149 4.8.5 Lessons Learned 153 4.9 Detecting and Defeating Interception Attacks Against SSL 154 Christopher Soghoian and Sid Stamm 4.9.1 Introduction 154 4.9.2 Certificate Authorities and the Browser Vendors 155 4.9.3 Big Brother in the Browser 157 4.9.4 Compelled Assistance 158 4.9.5 Surveillance Appliances 159 4.9.6 Protecting Users 160 4.9.7 Threat Model Analysis 163 4.9.8 Related Work 166 4.9.9 Conclusion 168 5 The Mobile Problem 169 5.1 Phishing on Mobile Devices 169 Adrienne Porter Felt and David Wagner 5.1.1 The Mobile Phishing Threat 170 5.1.2 Common Control Transfers 172 5.1.3 Phishing Attacks 178 5.1.4 Web Sender-->Mobile Target 182 5.1.5 Web Sender-->Web Target 184 5.1.6 Attack Prevention 185 5.2 Why Mobile Malware will Explode 185 Markus Jakobsson and Mark Grandcolas 5.2.1 Nineteen Eighty-Six: When it all Started 186 5.2.2 A Glimpse of Users 186 5.2.3 Why Market Size Matters 186 5.2.4 Financial Trends 187 5.2.5 Mobile Malware Outlook 187 5.3 Tapjacking: Stealing Clicks on Mobile Devices 189 Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh 5.3.1 Framing Attacks 189 5.3.2 Phone Tapjacking 191 5.3.3 Framing Facebook 194 5.3.4 Summary and Recommendations 195 6 The Internet and the PhysicalWorld 197 6.1 Malware-Enabled Wireless Tracking Networks 197 Nathaniel Husted and Steven Myers 6.1.1 Introduction 198 6.1.2 The Anatomy of a Modern Smartphone 199 6.1.3 Mobile Tracking Networks: A Threat to Smartphones 200 6.1.4 Conclusion 219 6.2 Social Networking Leaks 219 Mayank Dhiman and Markus Jakobsson 6.2.1 Introduction 220 6.2.2 Motivations for Using Social Networking Sites 220 6.2.3 Trust and Privacy 221 6.2.4 Known Issues 222 6.2.5 Case Study: Social Networking Leaks in the Physical World 225 6.3 Abuse of Social Media and Political Manipulation 231 Bruno Gon¸--calves, Michael Conover, and Filippo Menczer 6.3.1 The Rise of Online Grassroots Political Movements 231 6.3.2 Spam and Astroturfing 232 6.3.3 Deceptive Tactics 233 6.3.4 The Truthy System for Astroturf Detection 236 6.3.5 Discussion 240 Part II Thinking About Solutions 7 Solutions to the Problem 245 7.1 When and How to Authenticate 245 Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song 7.1.1 Problem Description 246 7.1.2 Use Cases 247 7.1.3 System Architecture 248 7.1.4 User Privacy 250 7.1.5 Machine Learning/Algorithms 250 7.1.6 User Study 252 7.2 Fastwords: Adapting Passwords to Constrained Keyboards 255 Markus Jakobsson and Ruj Akavipat 7.2.1 The Principles Behind Fastwords 256 7.2.2 Basic Feature Set 258 7.2.3 Extended Feature Set 260 7.2.4 Sample Stories and Frequencies 261 7.2.5 Recall Rates 262 7.2.6 Security Analysis 264 7.2.7 The Security of Passwords 264 7.2.8 Entry Speed 268 7.2.9 Implementation of Fastword Entry 270 7.2.10 Conclusion 271 7.3 Deriving PINs from Passwords 271 Markus Jakobsson and Debin Liu 7.3.1 Introduction 272 7.3.2 A Brief Discussion of Passwords 273 7.3.3 How to Derive PINs from Passwords 274 7.3.4 Analysis of Passwords and Derived PINs 275 7.3.5 Security Analysis 278 7.3.6 Usability Experiments 280 7.4 Visual Preference Authentication 282 Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir 7.4.1 Password Resets 282 7.4.2 Security Questions Aren't so Secure 283 7.4.3 What is Visual Preference-Based Authentication 283 7.4.4 Evaluating Visual Preference-Based Authentication 285 7.4.5 Case Study: Visual Blue Moon Authentication 286 7.4.6 Conclusion 290 7.5 The Deadly Sins of Security User Interfaces 290 Nathan Good 7.5.1 Security Applications with Frustrating User Interfaces 291 7.5.2 The Four Sins of Security Application User Interfaces 293 7.5.3 Consumer Choice: A Security Bugbear 293 7.5.4 Security by Verbosity 299 7.5.5 Walls of Checkboxes 300 7.5.6 All or Nothing Switch 302 7.5.7 Conclusion 304 7.6 SpoofKiller--Let's Kiss Spoofing Goodbye! 304 Markus Jakobsson and William Leddy 7.6.1 A Key to the Solution: Interrupts 305 7.6.2 Why can the User Log in to Good Sites, but not Bad Ones? 305 7.6.3 What About Sites that are Good ... but not Certified Good? 308 7.6.4 SpoofKiller: Under the Hood 309 7.6.5 Say we Implement SpoofKiller--then What? 311 7.7 Device Identification and Intelligence 312 Ori Eisen 7.7.1 1995-
- -2001: The Early Years of Device Identification 313 7.7.2 2001--2008 Tagless Device Identification Begins 314 7.7.3 2008--Present: Private Browsing and Beyond 319 7.8 How can we Determine if a Device is Infected or not? 323 Aur'elien Francillon, Markus Jakobsson, and Adrian Perrig 7.8.1 Why Detection is Difficult 323 7.8.2 Setting up an Isolated Environment 324 7.8.3 What Could go Wrong? 326 7.8.4 Brief Comparison with TrustZone 328 7.8.5 Summary 328 8 The Future 331 8.1 Security Needs the Best User Experience 332 Hampus Jakobsson 8.1.1 How the User Won Over Features 332 8.1.2 So How Come the iPhone Became so Successful? 332 8.1.3 A World of Information Anywhere 333 8.1.4 Midas' Touch Screens 334 8.1.5 New Input, New Opportunities 335 8.1.6 Zero-Click and Real-Life User Interfaces 335 8.1.7 Privacy and User Interfaces 336 8.1.8 It all Comes Together 336 8.2 Fraud and the Future 336 Markus Jakobsson References 339 Index 359.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Li, Qing, 1971- author.
- Indianapolis, IN : Wiley, 2015.
- Description
- Book — 1 online resource
- Summary
-
- Foreword xv
- Preface xvii
- Chapter 1 Fundamentals of Secure Proxies 1
- Security Must Protect and Empower Users 2
- The Birth of Shadow IT 2
- Internet of Things and Connected Consumer Appliances 3
- Conventional Security Solutions 5
- Traditional Firewalls: What Are Their Main Deficiencies? 5
- Firewall with DPI: A Better Solution? 9
- IDS/IPS and Firewall 11
- Unified Threat Management and Next ]Generation Firewall 14
- Security Proxy A Necessary Extension of the End Point 15
- Transaction ]Based Processing 18
- The Proxy Architecture 19
- SSL Proxy and Interception 22
- Interception Strategies 24
- Certificates and Keys 28
- Certificate Pinning and OCSP Stapling 32
- SSL Interception and Privacy 33
- Summary 35
- Chapter 2 Proxy Deployment Strategies and Challenges 37
- Definitions of Proxy Types: Transparent Proxy and Explicit Proxy 38
- Inline Deployment of Transparent Proxy: Physical Inline and Virtual Inline 41
- Physical Inline Deployment 41
- Virtual Inline Deployment 43
- Traffic Redirection Methods: WCCP and PBR 44
- LAN Port and WAN Port 46
- Forward Proxy and Reverse Proxy 47
- Challenges of Transparent Interception 48
- Directionality of Connections 53
- Maintaining Traffic Paths 53
- Avoiding Interception 56
- Asymmetric Traffic Flow Detection and Clustering 58
- Proxy Chaining 62
- Summary 64
- Chapter 3 Proxy Policy Engine and Policy Enforcements 67
- Policy System Overview 69
- Conditions and Properties 70
- Policy Transaction 71
- Policy Ticket 73
- Policy Updates and Versioning System 77
- Security Implications 77
- Policy System in the Cloud Security Operation 80
- Policy Evaluation 82
- Policy Checkpoint 82
- Policy Execution Timing 84
- Revisiting the Proxy Interception Steps 86
- Enforcing External Policy Decisions 90
- Summary 91
- Chapter 4 Malware and Malware Delivery Networks 93
- Cyber Warfare and Targeted Attacks 94
- Espionage and Sabotage in Cyberspace 94
- Industrial Espionage 96
- Operation Aurora 96 Watering Hole Attack 98
- Breaching the Trusted Third Party 100
- Casting the Lures 101
- Spear Phishing 102
- Pharming 102
- Cross ]Site Scripting 103
- Search Engine Poisoning 106
- Drive ]by Downloads and the Invisible iframe 109
- Tangled Malvertising Networks 113
- Malware Delivery Networks 114
- Fast ]Flux Networks 117
- Explosion of Domain Names 119
- Abandoned Sites and Domain Names 120
- Antivirus Software and End ]Point Solutions The Losing Battle 121
- Summary 122
- Chapter 5 Malnet Detection Techniques 123
- Automated URL Reputation System 124
- Creating URL Training Sets 125
- Extracting URL Feature Sets 126
- Classifier Training 128
- Dynamic Webpage Content Rating 131
- Keyword Extraction for Category Construction 132
- Keyword Categorization 135
- Detecting Malicious Web Infrastructure 138
- Detecting Exploit Servers through Content Analysis 138
- Topology ]Based Detection of Dedicated Malicious Hosts 142
- Detecting C2 Servers 144
- Detection Based on Download Similarities 147
- Crawlers 148
- Detecting Malicious Servers with a Honeyclient 150
- High Interaction versus Low Interaction 151
- Capture ]HPC: A High ]Interaction Honeyclient 152
- Thug: A Low ]Interaction Honeyclient 154
- Evading Honeyclients 154
- Summary 158
- Chapter 6 Writing Policies 161
- Overview of the ProxySG Policy Language 162
- Scenarios and Policy Implementation 164
- Web Access 164
- Access Logging 167
- User Authentication 170
- Safe Content Retrieval 177
- SSL Proxy 181
- Reverse Proxy Deployment 183
- DNS Proxy 187
- Data Loss Prevention 188
- E ]mail Filtering 190
- A Primer on SMTP 191
- E ]mail Filtering Techniques 200
- Summary 202
- Chapter 7 The Art of Application Classification 203
- A Brief History of Classification Technology 204
- Signature Based Pattern Matching Classification 206
- Extracting Matching Terms Aho ]Corasick Algorithm 208
- Prefix ]Tree Signature Representation 211
- Manual Creation of Application Signatures 214
- Automatic Signature Generation 216
- Flow Set Construction 218
- Extraction of Common Terms 220
- Signature Distiller 222
- Considerations 225
- Machine Learning ]Based Classification Technique 226
- Feature Selection 228
- Supervised Machine Learning Algorithms 232
- Naive Bayes Method 233
- Unsupervised Machine Learning Algorithms 236
- Expectation ]Maximization 237
- K ]Means Clustering 240
- Classifier Performance Evaluation 243
- Proxy versus Classifier 247
- Summary 250
- Chapter 8 Retrospective Analysis 251
- Data Acquisition 252
- Logs and Retrospective Analysis 253
- Log Formats 254
- Log Management and Analysis 255
- Packet Captures 259
- Capture Points 259
- Capture Formats 261
- Capture a Large Volume of Data 263
- Data Indexing and Query 264
- B ]tree Index 265
- B ]tree Search 267
- B ]tree Insertion 268
- Range Search and B+ ]tree 270
- Bitmap Index 272
- Bitmap Index Search 273
- Bitmap Index Compression 276
- Inverted File Index 279
- Inverted File 279
- Inverted File Index Query 281
- Inverted File Compression 282
- Performance of a Retrospective Analysis System 283
- Index Sizes 283
- Index Building Overhead 285
- Query Response Delay 286
- Scalability 288
- Notes on Building a Retrospective Analysis System 289
- MapReduce and Hadoop 289
- MapReduce for Parallel Processing 292
- Hadoop 293
- Open Source Data Storage and Management Solution 295
- Why a Traditional RDBMS Falls Short 295
- NoSQL and Search Engines 296
- NoSQL and Hadoop 297
- Summary 298
- Chapter 9 Mobile Security 299
- Mobile Device Management, or Lack Thereof 300
- Mobile Applications and Their Impact on Security 303
- Security Threats and Hazards in Mobile Computing 304
- Cross ]Origin Vulnerability 305
- Near Field Communication 306
- Application Signing Transparency 307
- Library Integrity and SSL Verification Challenges 307
- Ad Fraud 308
- Research Results and Proposed Solutions 308
- Infrastructure ]Centric Mobile Security Solution 311
- Towards the Seamless Integration of WiFi and Cellular Networks 312
- Security in the Network 313
- Summary 315
- Bibliography 317
- Index 327.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.