Defensive Security Handbook

Best Practices for Securing Infrastructure

Author: Lee Brotherston,Amanda Berlin

Publisher: "O'Reilly Media, Inc."

ISBN: 1491960353

Category: Computers

Page: 284

View: 7338

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

Computer Security Handbook, Set

Author: Seymour Bosworth,M. E. Kabay,Eric Whyne

Publisher: John Wiley & Sons

ISBN: 0470413743

Category: Computers

Page: 1856

View: 2630

The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including: 1. Hardware Elements of Security 2. Fundamentals of Cryptography and Steganography 3. Mathematical models of information security 4. Insider threats 5. Social engineering and low-tech attacks 6. Spam, phishing, and Trojans: attacks meant to fool 7. Biometric authentication 8. VPNs and secure remote access 9. Securing Peer2Peer, IM, SMS, and collaboration tools 10. U.S. legal and regulatory security issues, such as GLBA and SOX Whether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.

The Hacker's Handbook

The Strategy Behind Breaking into and Defending Networks

Author: Susan Young,Dave Aitel

Publisher: CRC Press

ISBN: 9780203490044

Category: Computers

Page: 896

View: 1244

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Hacking mit Security Onion

Sicherheit im Netzwerk überwachen: Daten erfassen und sammeln, analysieren und Angriffe rechtzeitig erkennen

Author: Chris Sanders,Jason Smith

Publisher: Franzis Verlag

ISBN: 3645204962

Category: Computers

Page: 560

View: 9122

Sie können noch so viel in Hardware, Software und Abwehrmechanismen investieren, absolute Sicherheit für Ihre IT-Infrastruktur wird es nicht geben. Wenn Hacker sich wirklich anstrengen, werden sie auch in Ihr System gelangen. Sollte das geschehen, müssen Sie sowohl technisch als auch organisatorisch so aufgestellt sein, dass Sie die Gegenwart eines Hackers erkennen und darauf reagieren können. Sie müssen in der Lage sein, einen Zwischenfall zu deklarieren und die Angreifer aus Ihrem Netzwerk zu vertreiben, bevor sie erheblichen Schaden anrichten. Das ist Network Security Monitoring (NSM). Lernen Sie von dem leitenden Sicherheitsanalytiker Sanders die Feinheiten des Network Security Monitoring kennen. Konzepte verstehen und Network Security Monitoring mit Open-Source-Tools durchführen: Lernen Sie die drei NSM-Phasen kennen, um diese in der Praxis anzuwenden. Die praktische Umsetzung der NSM erfolgt mit vielen Open-Source-Werkzeugen wie z. B. Bro, Daemonlogger, Dumpcap, Justniffer, Honeyd, Httpry, Netsniff-NG, Sguil, SiLK, Snorby Snort, Squert, Suricata, TShark und Wireshark. Anhand von ausführlichen Beispielen lernen Sie, die Tools effizient in Ihrem Netzwerk einzusetzen.

The Web Application Hacker's Handbook

Finding and Exploiting Security Flaws

Author: Dafydd Stuttard,Marcus Pinto

Publisher: John Wiley & Sons

ISBN: 1118175247

Category: Computers

Page: 912

View: 2966

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Wie Navy SEALS dem Tod entrinnen

Die 100 wichtigsten Strategien der Eliteeinheit

Author: Clint Emerson

Publisher: Riva Verlag

ISBN: 3959712480

Category: House & Home

Page: 300

View: 732

In einer Welt, die zunehmend von Krieg, Terrorismus und Kriminalität beherrscht wird, wird es immer wichtiger, sich selbst schützen und verteidigen zu können. Clint Emerson hat in seinem Bestseller die 100 wichtigsten Techniken zusammengestellt, die bei allen nur denkbaren Bedrohungsszenarien sicherstellen, dass man ungeschoren davonkommt, z.B.: ·Wie Sie einen Amoklauf überleben ·Wie Sie einen Messerkampf gewinnen ·Wie Sie Handschellen öffnen ·Wie Sie Gesichtserkennungssoftware überlisten ·Wie Sie einen Kugelschreiber in eine Waffe verwandeln ·Wie Sie ein Abseilgeschirr herstellen ·Wie Sie sich aus einem Kofferraum befreien Anhand leicht verständlicher Anleitungen und einer Vielzahl von Illustrationen, die das genaue Vorgehen illustrieren, bietet Clint Emerson effektive Taktiken zur Selbstverteidigung, Fluchtstrategien und Techniken, wie man seine Gegner außer Gefecht setzt. Ein Buch, das das überlebenswichtige Wissen der Navy SEALs alltagstauglich und leicht umsetzbar macht.

Hacken für Dummies

Author: Kevin Beaver

Publisher: John Wiley & Sons

ISBN: 3527819045

Category: Computers

Page: 408

View: 840

Kuckucksei

Die Jagd auf die deutschen Hacker, die das Pentagon knackten

Author: Clifford Stoll

Publisher: S. Fischer Verlag

ISBN: 3105607242

Category: Fiction

Page: 454

View: 6333

›Kuckucksei‹ schildert bis ins Detail die hochdramatische Jagd nach deutschen Hackern, die in amerikanische Computernetze eingedrungen waren. Es ist der autobiografische Report eines amerikanischen Computercracks, der leidenschaftlich für die Sicherheit der Datennetze kämpft. (Dieser Text bezieht sich auf eine frühere Ausgabe.)

Linux-Sicherheits-Kochbuch

Author: Daniel J. Barrett,Richard E. Silverman,Robert G. Byrnes

Publisher: O'Reilly Verlag DE

ISBN: 9783897213647

Category:

Page: 343

View: 5121

Mehr Hacking mit Python

Eigene Tools entwickeln für Hacker und Pentester

Author: Justin Seitz

Publisher: dpunkt.verlag

ISBN: 3864917530

Category: Computers

Page: 182

View: 1233

Wenn es um die Entwicklung leistungsfähiger und effizienter Hacking-Tools geht, ist Python für die meisten Sicherheitsanalytiker die Sprache der Wahl. Doch wie genau funktioniert das? In dem neuesten Buch von Justin Seitz - dem Autor des Bestsellers »Hacking mit Python« - entdecken Sie Pythons dunkle Seite. Sie entwickeln Netzwerk-Sniffer, manipulieren Pakete, infizieren virtuelle Maschinen, schaffen unsichtbare Trojaner und vieles mehr. Sie lernen praktisch, wie man • einen »Command-and-Control«-Trojaner mittels GitHub schafft • Sandboxing erkennt und gängige Malware-Aufgaben wie Keylogging und Screenshotting automatisiert • Windows-Rechte mittels kreativer Prozesskontrolle ausweitet • offensive Speicherforensik-Tricks nutzt, um Passwort-Hashes abzugreifen und Shellcode in virtuelle Maschinen einzuspeisen • das beliebte Web-Hacking-Tool Burp erweitert • die Windows COM-Automatisierung nutzt, um einen Man-in-the-Middle-Angriff durchzuführen • möglichst unbemerkt Daten aus einem Netzwerk abgreift Eine Reihe von Insider-Techniken und kreativen Aufgaben zeigen Ihnen, wie Sie die Hacks erweitern und eigene Exploits entwickeln können.

The Mobile Application Hacker's Handbook

Author: Dominic Chell,Tyrone Erasmus,Shaun Colley,Ollie Whitehouse

Publisher: John Wiley & Sons

ISBN: 1118958519

Category: Computers

Page: 816

View: 1758

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Netzwerksicherheit für Dummies

Author: Chey Cobb

Publisher: Wiley-VCH

ISBN: 9783527700585

Category: Computers

Page: 384

View: 3523

Alles spricht von Sicherheit, doch was muss man vor wem schützen? Welches Wissen sollte man als Administrator haben, um wirklich sicher zu gehen, dass das System nicht geknackt werden kann? Der Sicherheitsexperte Chey Cobb liefert Ihnen nicht nur das nötige Hintergrundwissen, um über Ihr Netzwerk und mögliche Lücken den Überblick zu behalten, sondern zeigt Ihnen in diesem ... für Dummies-Buch auch die nötigen Kniffe, wie Sie Hackattacken mit konkreten Werkzeugen abwehren.

Security Handbook

Author: N.A

Publisher: N.A

ISBN: N.A

Category: National security

Page: N.A

View: 8770

Bodyguard - Die Geisel

Author: Chris Bradford

Publisher: cbj Verlag

ISBN: 3641150876

Category: Young Adult Fiction

Page: 480

View: 9931

Ein 14-jähriger Junge als Bodyguard? Das glaubt doch kein Mensch! Eben deshalb ist Connor Reeves bei seinen Inkognito-Einsätzen so erfolgreich. Sein erster Auftrag führt ihn direkt ins Zentrum der Macht: Er soll die Tochter des amerikanischen Präsidenten beschützen. Allerdings darf Alicia nicht merken, dass er in Wahrheit Personenschützer ist. Denn die Präsidententochter hat die Nase voll von dem goldenen Käfig, in dem sie sitzt, und entwischt den Beamten des Secret Service immer wieder. Eines Tages jedoch gerät sie ins Visier einer terroristischen Schläferzelle. Und plötzlich ist sie doch froh, dass ein Bodyguard an ihrer Seite ist: Denn Connor entpuppt sich als stahlharte Kämpfernatur.

Hacking

Die Kunst des Exploits

Author: Jon Erickson

Publisher: N.A

ISBN: 9783898645362

Category: Computer networks

Page: 505

View: 6106

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

Author: Daniel Regalado,Shon Harris,Allen Harper,Chris Eagle,Jonathan Ness,Branko Spasojevic,Ryan Linn,Stephen Sims

Publisher: McGraw Hill Professional

ISBN: 1260108422

Category: Computers

Page: N.A

View: 7547

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks •Understand ransomware and how it takes control of your desktop •Dissect Android malware with JEB and DAD decompilers •Find one-day vulnerabilities with binary diffing •Exploit wireless systems with Software Defined Radios (SDR) •Exploit Internet of things devices •Dissect and exploit embedded devices •Understand bug bounty programs •Deploy next-generation honeypots •Dissect ATM malware and analyze common ATM attacks •Learn the business side of ethical hacking