Cybersecurity - A Self-Teaching Introduction

This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and...

Full description

Saved in:
Bibliographic Details
Main Authors Goyal, K. K, Garg, Amit
Format eBook
LanguageEnglish
Published Herndon, VA Mercury Learning and Information 2020
Mercury Learning & Information
Mercury Learning
Edition1
Subjects
Online AccessGet full text
ISBN1683924983
9781683924982
DOI10.1515/9781683924968

Cover

Loading…
Abstract This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, Cyberlaw, and more. Features: Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, self-teaching format; Includes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more.
AbstractList Written in an easy to understand, self-teaching format, this book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime. --
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, Cyberlaw, and more. Features: Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, self-teaching format; Includes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more.
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, cloud security, and more. Features:Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, “self-teaching” formatCovers security related to emerging technologies such as cloud security, IoT, AES, and grid challengesIncludes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more.
Author Goyal K. K
Gupta C. P
Author_xml – sequence: 1
  fullname: Goyal, K. K
– sequence: 2
  fullname: Garg, Amit
BookMark eNpVkM1Lw0AQxVf8QK09eu9FRDC637s51lC1UPDQ4jVskkmNidm6m6j5711tQTzNPN6Px7w5RQetbQGhc4JviCDiNlaaSM1iymOp99ApEZQRjjFm-0HsHM2OgiBcUam1Isdo7P1rYCjXQjB6gq6TIQPnIe9d1Q2TaDKdLKEpoxWY_KVq15N52zlb9HlX2fYMHZam8TDezRF6vp-tksdo8fQwT6aLyDDBMY8o4xLCBkIaqYvMAA8G0aIoChWuEUrGoCVVoHIdU0rLkmieG1lipmhp2AhdboN9XTWNt2WXZtbWnvIvlWa1Dw2IwJjHgbzakp-m6cAVsHb9EJb0zbg8_fejv9SNs-89-C6Fn9QcQkXTpLO7RBJOGaOBvNiSdWs_oEk3rgp5w-8Rab1JpsvVPDyRfQOgunAK
ContentType eBook
Copyright 2020
Copyright_xml – notice: 2020
DEWEY 005.8
DOI 10.1515/9781683924968
DatabaseTitleList


DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Business
EISBN 1523140003
9781523140008
1683924967
9781683924968
1683924975
9781683924975
Edition 1
ExternalDocumentID bks000150049
9781683924968
EBC6142332
book_kpCASTI002
Genre Electronic books
GroupedDBID -VQ
-VX
4S.
5O.
AABBV
AALIM
AAZEP
ABARN
ABHWV
ABQPQ
ACLGV
ACNAM
ACXXF
ADVEM
ADVQQ
AEAED
AEDVL
AEIUR
AEQJM
AERYV
AFHFQ
AFOJC
AGLJD
AJFER
ALMA_UNASSIGNED_HOLDINGS
BBABE
BFRBX
BHFIF
BPBUR
CGFFG
CMZ
CZZ
C~C
DUGUG
DYXOI
EBFEC
EBSCA
ECOWB
GEOUK
K-E
KT4
TD3
WZT
XI1
AAHDW
AAKGN
AANYM
AAZGR
ABRSK
ADBND
AEHEP
AFQEX
AHWGJ
APVFW
E2F
QD8
UE6
ID FETCH-LOGICAL-a35404-2346e540e56a68dbae4354185ddd71145769e8627e7c89222ff184ca6f0372fa3
IEDL.DBID CMZ
ISBN 1683924983
9781683924982
IngestDate Tue Oct 22 09:03:43 EDT 2024
Thu Aug 14 18:34:01 EDT 2025
Wed Aug 13 03:14:14 EDT 2025
Sat Nov 23 14:13:02 EST 2024
IsPeerReviewed false
IsScholarly false
Keywords computer science
LCCallNum HF5548.37 .G87 2020
LCCallNum_Ident QA76.9.A25 .G878 2020
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a35404-2346e540e56a68dbae4354185ddd71145769e8627e7c89222ff184ca6f0372fa3
OCLC 1147268871
1428234722
PQID EBC6142332
PageCount 221
ParticipantIDs skillsoft_books24x7_bks000150049
walterdegruyter_marc_9781683924968
proquest_ebookcentral_EBC6142332
knovel_primary_book_kpCASTI002
PublicationCentury 2000
PublicationDate 2020
[2020]
2020.
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 2020
PublicationDecade 2020
PublicationPlace Herndon, VA
PublicationPlace_xml – name: Herndon, VA
– name: Dulles, VA
– name: Place of publication not identified
PublicationYear 2020
Publisher Mercury Learning and Information
Mercury Learning & Information
Mercury Learning
Publisher_xml – name: Mercury Learning and Information
– name: Mercury Learning & Information
– name: Mercury Learning
RestrictionsOnAccess restricted access
SSID ssj0002485532
ssib039956667
ssib040798570
ssib053792415
ssib054458472
ssib055624946
ssib047717898
Score 2.4244537
Snippet This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It...
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It...
Written in an easy to understand, self-teaching format, this book is designed to provide the reader with the fundamental concepts of cybersecurity and...
SourceID skillsoft
walterdegruyter
proquest
knovel
SourceType Aggregation Database
Publisher
SubjectTerms Business enterprises
Computer networks
computer science
Computer security
COMPUTERS / Security / General
Data
General Engineering & Project Administration
General References
IT Management & Security
Security measures
Software Engineering
SubjectTermsDisplay Business enterprises -- Computer networks -- Security measures.
Computer security.
Electronic books.
TableOfContents Title Page Disclaimer Preface Table of Contents 1. Introduction to Information Systems 2. Cybersecurity Application Security 3. Developing Secure Information Systems 4. Information Security Policies, Standards, and Cyber Law 5. Security of Emerging Technology Index
Cover -- Half-Title -- Title -- Copyright -- Contents -- Preface -- Chapter 1: Introduction to Information Systems -- 1.1 Introduction to Information Systems -- 1.1.1 What Is Information? -- 1.1.2 What Is a System? -- 1.1.3 What Is an Information System (IS)? -- 1.2 Types of Information Systems -- 1.3 Development of Information Systems -- 1.3.1 Prototyping -- 1.4 Changing the Nature of Information Systems -- 1.4.1 Globalization of Business and Need of Distributed Information Systems -- 1.4.2 Needs in Distributed Information Systems (DIS) -- 1.5 Introduction to Information Security -- 1.5.1 Key Concepts of Information Security -- 1.6 Need for Information Security -- 1.7 Threats to Information Systems -- 1.7.1 Classification of Threats on the Basis of Damages -- 1.7.2 Life Cycle of Threat -- 1.7.3 Threats Related to Information Systems -- 1.8 Information Assurance -- 1.9 Cybersecurity and Security Risk Analysis -- 1.9.1 Security Risk Analysis -- Chapter 2: Cybersecurity Application Security -- 2.1 Application Security -- 2.1.1 Database -- 2.1.2 Email -- 2.1.3 Internet -- 2.2 Data Security Considerations: Backups -- 2.3 Archival -- 2.3.1 Storage and Disposal of Data -- 2.3.2 Secure Data Disposal Methods -- 2.4 Security Technology -- Firewall -- 2.4.2 Virtual Private Networks (VPNs) -- 2.5 Intrusion Detection -- 2.5.1 HIDS and NIDS -- 2.5.2 Statistical Anomaly and Signature-Based IDSEs -- 2.6 Denial-of-Service (DOS) Attack -- 2.7 Security Threats -- 2.7.1 Malicious Software -- 2.7.2 Viruses -- 2.7.3 Email Viruses -- 2.7.4 Macro Viruses -- 2.7.5 Worms -- 2.7.6 Trojan Horse -- 2.7.7 Logic Bombs -- 2.7.8 Trapdoors -- 2.7.9 Spoofs -- 2.8 Security Threats to E-Commerce -- 2.9 Electronic Payment Systems -- 2.9.1 The Concept of Electronic Payment -- 2.9.2 Conventional versus Electronic Payment Systems -- 2.9.3 The Process of Electronic Payment Systems
4.2.3 Corporate Policies -- 4.2.4 Policy Framework, Legislation, and Responsibilities of Information Security -- 4.3 Information Security Standards -- 4.3.1 International Standards Organization (ISO) -- 4.4 Cyber Laws in India -- 4.4.1 Amendment of Act 2008 -- 4.4.2 IT Act of 2000 Provisions -- 4.5 Intellectual Property Law -- 4.5.1 History -- 4.5.2 Industrial Design Rights -- 4.5.3 Objectives of Intellectual Property Law -- 4.5.4 Infringement, Misappropriation, and Enforcement -- 4.6 Semiconductor Law -- 4.6.1 Background -- 4.6.2 Enactment of US and Other National Legislation -- 4.6.3 How the SCPA Operates -- 4.6.4 Acquisition of Protection by Registration -- 4.6.5 Mask Works -- 4.6.6 Enforcement -- 4.6.7 Functionality Unprotected -- 4.6.8 Reverse Engineering Allowed -- 4.7 Software Licenses -- 4.7.1 Software Licenses and Copyright Law -- 4.7.2 Ownership versus Licensing -- 4.7.3 Proprietary Software Licenses -- 4.7.4 Free and Open-Source Software Licenses -- Chapter 5: Security of Emerging Technology -- 5.1 Security of Big Data Analytics -- 5.1.1 Big Data Analysis can Transform Security Analytics in the Following Ways -- 5.1.2 Big Data Analytics for Security Issues and Privacy Challenges -- 5.2 Security of Cloud Computing -- 5.2.1 Cloud Deployment Models -- 5.2.2 The Three Layers of Cloud Computing Services Model (Software, Platform or Infrastructure (SPI) Model) -- 5.2.3 Security Concerns and Challenges of Cloud Computing -- 5.2.4 Cloud Security as Consumers Service -- 5.3 Security of Internet of Things (IoT) -- 5.3.1 Evolution of IoT -- 5.3.2 Building Blocks of the Internet of Things (IoT) -- 5.3.3 Different Between IoT and Machine-to-Machine (M2M) -- 5.3.4 IoT Layers Models -- 5.3.5 Applications of IoT -- 5.3.6 New Challenges Created by the IoT -- 5.3.7 Security Requirements of IoT -- 5.3.8 Three Primary Targets of Attack against IoT
2.9.4 Types of Electronic Payment Systems -- 2.10 Digital Signature -- 2.11 Cryptography -- Chapter 3: Developing Secure Information Systems -- 3.1 Secure Information System Development -- 3.1.1 Initiation -- 3.1.2 Acquisition/Development -- 3.1.3 Implementation -- 3.1.4 Operations and Maintenance -- 3.1.5 Disposition -- 3.2 Application Development Security -- 3.2.1 Initial Review -- 3.2.2 Definition Phase: Threat Modeling -- 3.2.3 Design Phase: Design Review -- 3.2.4 Development Phase: Code Review -- 3.2.5 Deployment Phase: Risk Assessment -- 3.2.6 Risk Mitigation -- 3.2.7 Benchmark -- 3.2.8 Maintenance Phase: Maintain -- 3.3 Information Security Governance and Risk Management -- 3.3.1 Information Security Governance -- 3.3.2 Risk Management -- 3.4 Security Architecture and Design -- 3.4.1 Computer System Architecture -- 3.4.2 Systems Security Architecture -- 3.4.3 Principles of Secure Design -- 3.4.4 Principles of Software Security -- 3.4.5 Security Product Evaluation Methods and Criteria -- 3.5 Security Issues in Hardware, Data Storage, and Downloadable Devices -- 3.5.1 Hardware -- 3.5.2 Security Marking -- 3.5.3 Security Data Backup -- 3.5.4 Power Supply Backup -- 3.5.5 Data Storage -- 3.6 Physical Security of it Assets -- 3.6.1 The Human Factor -- 3.6.2 Natural Disasters -- 3.6.3 Physical Access Control -- 3.6.4 Visual Surveillance System: CCTV (Closed Circuit Television) -- 3.7 Back-Up Security Measures -- 3.7.1 Physical Security -- 3.7.2 Client Security -- 3.7.3 Server Security -- 3.7.4 Network Security -- 3.7.5 Employee Security -- Chapter 4: Information Security Policies, Standards, and Cyber Law -- 4.1 Security Policies -- 4.1.1 Policies -- 4.1.2 Why Policies Should be Developed -- 4.1.3 WWW Policies -- 4.1.4 Email Security Policies -- 4.2 Policy Review Process -- 4.2.1 Technical Review -- 4.2.2 Non-Technical Review
5.3.9 Hybrid Encryption Technique -- 5.3.10 Hybrid Encryption Algorithm Based on DES and -- 5.3.11 Advance Encryption Standard (AES) -- 5.3.12 Requirements for Lightweight Cryptography -- 5.3.13 Lightweight Cryptography in the IoT -- 5.3.14 Prevention of Attacks on IoT -- 5.4 Security of Smart Grid -- 5.4.1 Smart Grid Challenges -- 5.4.2 Smart Grid Layers -- 5.4.3 Information Security Risks and Demands of Smart Grid -- 5.4.4 Smart Grid Security Objectives -- 5.4.5 The Smart Grid System can be Divided in Three Major Systems -- 5.4.6 Types of Security Attacks that can Compromise the Smart Grid Security -- 5.4.7 Cybersecurity Attacks in a Smart Grid -- 5.5 Security of Scada Control Systems -- 5.5.1 Components of SCADA Systems -- 5.5.2 SCADA System Layers -- 5.5.3 Requirements and Features for the Security of Control Systems -- 5.5.4 Categories for Security Threats to Modern SCADA Systems -- 5.6 Security of Wireless Sensor Networks (WSNs) -- 5.6.1 WSN Layers -- 5.6.2 Security Requirements in WSNs -- 5.6.3 The Attacks Categories in WSNs -- 5.6.4 Attacks and Defense in WSNs at Different Layers -- 5.6.5 Security Protocols in WSNs -- Index
Contents --
Chapter 4: Information Security Policies, Standards, and Cyber Law --
Preface --
Chapter 1: Introduction to Information Systems --
Frontmatter --
Index
Chapter 2: Cybersecurity Application Security --
Chapter 3: Developing Secure Information Systems --
Chapter 5: Security of Emerging Technology --
Title Cybersecurity - A Self-Teaching Introduction
URI https://app.knovel.com/hotlink/toc/id:kpCASTI002/cybersecurity-self-teaching/cybersecurity-self-teaching?kpromoter=Summon
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6142332
https://www.degruyter.com/isbn/9781683924968
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwxV1Lb9QwEB5VBQl6KG-xBaoIccTdre21N1xQibZqQeXSBVVcItuxS5XV7qrJAstP4dcy4yRl2wMcuUR5WsnM2Pnm4c8Ar6QZDW0QhmmbOiZTkTJb2H2miRR3yI12sTbn5KM6-iTfnw3PNmDVzYWhxa3K2fybn8Zh-uu8pkRmv567_kXxplxkB6eTY-zFfbeyiI_aNd5Y5aeB1W394d-uvS0XscwNzaQJM9HoPdDUH7KTL1fRmUj0JciN21cEIWQ6Ei1BVHfMW8ZOBAT9tfPE2Xq7-YJroPVOVV5MpxWOrVuw_T2mwgt_frlc1V3qNf7RDu_Br04WTSFLubes7Z77eYMm8r8I6z7c8jQH4wFs-NlD2FrjTHwEr7P1lhKWHCSn1NqkbS05ptr7oiHFfQyfD8eT7Ii1Sz4wQwEoybiQyuOeHyqjRoU1HvEcEewURaHRd0P3KPXohWmPVpQiuAkBfVRnVBgIzYMRT2BzNp_5p5CENAy4QfWMtJcOxxnpudIKQYtzIijdg91GePmiIfbIya_J_4itB0mnvzymrtt62Xz8LkNUw4WgW670Gh-vuPyhc1tWcZI6-V89eHlD3TmxlOTXbGbnX-_yDO5y8vRj8Oc5bNaXS_8C4VBtd6Pl4vYDG9N2In8DJeAP3g
linkProvider Knovel
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cybersecurity&rft.au=Gupta%2C+C.+P&rft.au=Goyal%2C+K.+K&rft.date=2020-01-01&rft.pub=Mercury+Learning&rft.isbn=9781683924982&rft_id=info:doi/10.1515%2F9781683924968&rft.externalDocID=bks000150049
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.degruyter.com%2Fdocument%2Fcover%2Fisbn%2F9781683924968%2Foriginal
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fcontent.knovel.com%2Fcontent%2FThumbs%2Fthumb13630.gif