Atnaujinkite slapukų nuostatas

Its Your Digital Life [Kietas viršelis]

  • Formatas: Hardback, 230 pages, aukštis x plotis: 234x156 mm, weight: 467 g, 5 Tables, black and white; 28 Line drawings, black and white; 99 Halftones, black and white; 127 Illustrations, black and white
  • Išleidimo metai: 08-Sep-2021
  • Leidėjas: CRC Press
  • ISBN-10: 0367700034
  • ISBN-13: 9780367700034
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 230 pages, aukštis x plotis: 234x156 mm, weight: 467 g, 5 Tables, black and white; 28 Line drawings, black and white; 99 Halftones, black and white; 127 Illustrations, black and white
  • Išleidimo metai: 08-Sep-2021
  • Leidėjas: CRC Press
  • ISBN-10: 0367700034
  • ISBN-13: 9780367700034
Kitos knygos pagal šią temą:
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information.

Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran.

Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity.

Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.
Foreword xiii
Authors xv
1 Digital world 1(16)
1.1 Change is inevitable
1(3)
1.1.1 Problem solvers
1(2)
1.1.2 Pace of innovation
3(1)
1.2 Evolving technology
4(5)
1.2.1 Data/information
4(1)
1.2.2 Experience
5(2)
1.2.3 Access
7(2)
1.2.4 Device
9(1)
1.3 Challenges of digital life
9(4)
1.3.1 Information usage
10(1)
1.3.1.1 Personal identifiable indicators
10(1)
1.3.1.2 Social life
10(1)
1.3.2 Security gaps
11(1)
1.3.3 Industry gap
12(1)
1.3.4 Threat landscape
13(1)
1.4 Digital mindset approach
13(2)
Bibliography
15(2)
2 It is your money 17(20)
2.1 Digital banking
17(1)
2.2 Online banking
17(1)
2.3 Digital payment
18(2)
2.4 Fraud detection
20(1)
2.5 Data-driven investments
20(1)
2.6 Customer engagement and support
20(1)
2.7 Challenges with banking digitisation
21(1)
2.8 Case study: Social engineering attacks
22(2)
2.9 Case study: Scams
24(5)
2.9.1 Using redirection
24(2)
2.9.2 Using standard features
26(1)
2.9.3 Using technical hacks
26(1)
2.9.4 Using yourself
27(2)
2.10 Case study: data breach
29(3)
2.11 Case study: system vulnerabilities
32(3)
Bibliography
35(2)
3 Your socially, social media 37(20)
3.1 The beginning of viral worlds
37(1)
3.2 The rise of campaigns
37(1)
3.2.1 The scenario
38(1)
3.3 URL shorteners lengthen the problem
38(1)
3.4 What if we had the power to verify URLs?
39(1)
3.5 Online buying and selling
40(9)
3.5.1 Online selling via social media
41(1)
3.5.2 Digital payments
42(1)
3.5.3 Abusing online forums and digital payments
43(2)
3.5.4 Say hello to fraudsters
45(1)
3.5.5 Dumpster diving and the tale of your ID
46(1)
3.5.6 Transaction trick begins
47(14)
3.5.6.1 Method 1
48(1)
3.5.6.2 Method 2
49(1)
3.5.6.3 Method 3
49(1)
3.5.6.4 Method 4
49(1)
3.6 Importance of privacy settings in social media profiles
49(2)
3.7 Forwards take you backwards
51(1)
3.8 Messages and campaigns: The one with more gains
52(2)
3.9 Tring, tring: The phone scam
54(2)
Bibliography
56(1)
4 Knock, knock, anybody there? 57(20)
4.1 Email, malware, and phishing: The deadly trio
57(1)
4.2 Everywhere, malware
57(1)
4.3 Types of malware
58(1)
4.4 A sneak peek into free watching
58(1)
4.5 Delivery of malware and modes of delivery
59(1)
4.6 Email the preferred partner for malware and phishing
60(1)
4.7 Email and phishing a better story than twilight
60(1)
4.8 Know your URL example
61(2)
4.8.1 What is a domain name or a URL?
62(1)
4.8.2 The typosquatting episode
62(1)
4.9 How to identify phishing and tricks: Typosquatting and green lock SSL
63(3)
4.9.1 What is the green lock symbol?
63(1)
4.9.2 Food for brain, let us test!
64(2)
4.10 Email dropping malware: how it tricks one and either steals or drops malware
66(4)
4.10.1 The rise of document and pdf malware
68(1)
4.10.2 What is this macro?
69(1)
4.10.3 Hybrid attacks
69(1)
4.10.4 Campaigns
69(1)
4.11 Real-world scenes: Exercise and case study
70(5)
4.11.1 COVID-19 campaign
71(4)
Bibliography
75(2)
5 Power up and ready to strike 77(28)
5.1 The uninvited guests
77(2)
5.2 What's up, doc?
79(2)
5.3 Macro: The micro-executioner
81(3)
5.4 No strings attached
84(5)
5.5 Payload & parked domains, loading
89(1)
5.6 Who? What? Where?
90(2)
5.7 PDF- graphically malicious
92(2)
S.8 Image EXIF header malware
94(4)
5.9 Steganography
98(1)
5.10 Steghide insertion
99(2)
5.11 Exfiltration of malware data using steganography: Sodinokibi ransomware
101(2)
Bibliography
103(2)
6 The guardians of the Internet 105(24)
6.1 IDS
106(1)
6.2 Multiple personality disorder of IDS
106(1)
6.3 SNORT
107(9)
6.4 Obfuscation: The magic trick that attackers follow to evade
116(8)
6.4.1 Case study: Screen saver that is not a saver!
120(4)
6.5 The DLL injection
124(2)
Bibliography
126(3)
7 Need of the hour: The tech fundamentals 129(26)
7.1 Operating systems: A bigger picture
129(1)
7.2 File systems: Linux/Unix file systems
130(2)
7.3 Processes: How and why is it important?
132(8)
7.3.1 The process control block: PCB in a nutshell
132(3)
7.3.2 File descriptors
135(3)
7.3.3 Process states: An analysis
138(2)
7.3.3.1 State transitions
139(1)
7.4 Shell scripting: A quick visit
140(10)
7.4.1 Syntaxes and variables used in shell scripting
141(2)
7.4.2 Arithmetical operations
143(2)
7.4.3 Conditional statements used in shell
145(4)
7.4.4 Special symbols used in shell
149(1)
7.5 HTTP (HyperText Transfer Protocol)
150(3)
7.5.1 HTTP request message
150(1)
7.5.2 HTTP response format
151(2)
Bibliography
153(2)
8 It is your data 155(22)
8.1 Data is gold
155(1)
8.1.1 Personal data
156(1)
8.1.2 Application data
156(1)
8.1.3 Behavioural data
156(1)
8.2 Why is your data interesting
156(6)
8.2.1 Curiosity
157(1)
8.2.2 Financial interests
157(1)
8.2.3 Identify theft
158(1)
8.2.4 Digital advertising
159(1)
8.2.5 Disruption or to do harm
160(1)
8.2.6 Political gains or dominance
161(1)
8.3 How can you lose your data?
162(2)
8.3.1 Data at rest
162(1)
8.3.2 Data in motion
162(1)
8.3.3 Data in use
163(1)
8.3.4 Data backup
163(1)
8.3.5 Dumpster diving
163(1)
8.3.6 Social engineering
164(1)
8.3.7 Data breaches
164(1)
8.4 What can you do to secure your data?
164(7)
8.4.1 Think twice
165(1)
8.4.2 Identity and access control
166(1)
8.4.3 Encryption
166(1)
8.4.4 Secure infrastructure
167(3)
8.4.4.1 Network
167(1)
8.4.4.2 Devices
168(1)
8.4.4.3 Mobile
168(1)
8.4.4.4 Backup
169(1)
8.4.5 Data disposal
170(1)
8.4.6 Incident management
170(1)
8.5 Future of data
171(4)
8.5.1 More data sources
171(1)
8.5.2 More data volume
172(1)
8.5.3 More data regulations
172(1)
8.5.4 More intelligence
173(1)
8.5.5 More people using data
174(1)
Bibliography
175(2)
9 Sensors, software, and severities 177(22)
9.1 What is IoT?
177(5)
9.1.1 Device capabilities
178(1)
9.1.2 Data collection
178(1)
9.1.3 Connectivity
179(1)
9.1.4 Data processing
180(1)
9.1.5 Newer business models
181(1)
9.2 loT in our life
182(4)
9.2.1 Connected home
183(1)
9.2.2 Connected transportation
183(1)
9.2.3 Connected energy
184(1)
9.2.4 Connected healthcare
185(1)
9.2.5 Connected manufacturing
185(1)
9.2.6 Connected agriculture
185(1)
9.2.7 Connected retail
186(1)
9.3 Challenges of security in IoT
186(3)
9.3.1 Unsophisticated devices
186(1)
9.3.2 Endpoint identity
187(1)
9.3.3 Policy ownership
188(1)
9.3.4 Scale
188(1)
9.3.5 Threat detection
189(1)
9.4 IoT breaches and attacks
189(3)
9.4.1 Mirai attack
189(2)
9.4.2 Remote vehicle access
191(1)
9.5 How to protect yourself
192(2)
9.5.1 IoT security standards
192(2)
9.5.2 Mitigating network-based attacks: MUD
194(1)
9.6 Stay connected and stay safe
194(3)
Bibliography
197(2)
10 The cyber laws 199(8)
10.1 What exactly is cyber LAW?
199(1)
10.2 The inclusions: Cybercrime and cybersecurity
199(1)
10.3 The categories: Cybercrimes
200(2)
10.4 The recent trends
202(1)
10.5 The intellectual property aspect
202(2)
10.6 The personal data protection bill, 2019
204(1)
Bibliography
205(2)
11 How to build a career as a digital detective 207(18)
11.1 Roles in security
207(12)
11.1.1 Security analyst/information security analyst
208(1)
11.1.2 Security engineer
208(1)
11.1.3 Security architect
209(1)
11.1.4 PKI analyst/cryptographer
210(1)
11.1.5 Pen tester
210(1)
11.1.6 Vulnerability assessor
211(1)
11.1.7 Security researcher
211(1)
11.1.8 Forensic analyst
212(1)
11.1.9 SOC analyst/investigator
213(1)
11.1.10 Computer security incident responder
213(1)
11.1.11 Security auditor
214(1)
11.1.12 SOC manager
215(1)
11.1.13 Information security manager
216(1)
11.1.14 Chief privacy officer/data privacy officer
217(1)
11.1.15 Chief information security officer
218(1)
11.2 Industry certifications
219(6)
11.2.1 (ISC)2
219(3)
11.2.1.1 CISSP: Certified information systems security professional
220(1)
11.2.1.2 CCSP: Certified cloud security professional
221(1)
11.2.2 ISACA
222(2)
11.2.2.1 CISA: Certified information systems auditor
222(1)
11.2.2.2 CRISC: Certified in risk and information systems control
222(1)
11.2.2.3 CISM: Certified information security manager
223(1)
11.2.3 SANS
224(1)
11.2.4 EC-council
224(1)
Bibliography 225(2)
Index 227
Giri Govindarajulu: Technology Evangelist and Chief Information Security Officer for Cisco Asiapac. He helps transform business by securely connecting people and processes with technology and the Internet of Things.

Along with his role in security, he specializes in collaboration, supply chain, financial, and employee service applications making these available anytime, anywhere on any device. Giri also led the convergence of building systems and enterprise solutions to create higher sustainability in enabling a world-class digital workplace and influencing the product roadmap for Smart+Connected communities.

As a leader, Giri is passionate about finding the right balance between innovation and operational excellence. His team and peers recognize him for success in driving innovation and highlighting the importance of technologys role in enabling business solutions. He has been championing an innovative ecosystem in Academia with the Thinqubator program and startup ecosystem thru the sponsorship of Cisco Launchpad.

He has two patents filed and has been recognized with many industry awards like CSO100, Defender100, BOLD CISO 50, and Infosec Maestro. He has been a speaker in many events globally and judges in many events, including Unicorn Pitches.

Shyam Sundar Ramaswami: a tech geek inspired by superheroes! He wanted the internet to get rid of crime and hate. With ample work experience in CISCO, he not only gained recognition from his peers for his heroic acts on the internet but also a larger audience across the world. Shyam Sundar Ramaswami is a Senior Research Scientist with Ciscos Research and Efficacy Team. Shyam Sundar Ramaswami is a two-time TEDx speaker who focuses on malware and memory forensics. He has delivered talks in several conferences and universities like Black Hat (Las Vegas), Stanford University (Cyber Security Program), Qubit Forensics (Serbia), Nullcon 2020 (Goa), Cisco Live (Barcelona) and in several IEEE forums in India.

Shyams interviews have been published in ZDNET and CISO magazines. He has also taught classes and mentored students/working professionals on "Advanced Malware Attack and Defences" in Stanford Universitys cybersecurity program powered by Great Lakes Institute. He runs a mentoring program called "Being Robin," where he mentors students from all over the globe on cybersecurity.

Shriram K. Vasudevan: Academician with a blend of industrial and teaching experience for 15 years. Strongly passionate to take up challenging tasks. Authored/co- authored 42 books for reputed publishers across globe. Authored 122 research papers in revered international journals and 30 papers in international/national conferences. Currently working as Dean of K. Ramakrishnan college of Technology. He is a Fellow IETE, ACM Distinguished Speaker, CSI Distinguished Speaker and Intel Software Innovator.

Recognized/awarded by Datastax, ACM, IETE, Proctor and Gamble Innovation Centre (India), Dinamalar, AWS (Amazon Web Services), Sabre Technologies, IEEE Compute, Syndicate Bank, MHRD, Elsevier, Bounce, IncubateInd, Smart India Hackathon, Stop the bleed, Hackharvard (Harvard University), Accenture Digital (India), NEC (Nippon Electric Company, Japan), Thought Factory (Axis Bank Innovation Lab), Rakuten (Japan), Titan, Future Group, Institution of Engineers of India (IEI), Ministry of Food Processing Industries (MoFPI Govt. of India), Intel, Microsoft, Wipro, Infosys, IBM India, SoS Ventures (USA), VIT University, Amrita University, Computer Society of India, TBI TIDE, ICTACT, Times of India, Nehru Group of Institutions, Texas Instruments, IBC Cambridge, Cisco, CII (Confederation of Indian Industries), Indian Air Force, DPSRU Innovation & Incubation foundation, ELGi Equipments (Coimbatore) etc. for his technical expertise. Listed in many famous biographical databases.

The notable honors are mentioned below:

Winner of the HARVARD University Hack Harvard Global 2019 World Hack 2019. Winner of 50 plus hackathons. Mentor for the Start-ups GetVU, Loopus Weartech Pvt. Ltd and BGB industries pvt. Limited.

Selected as "Intel IoT Innovator" and inducted into "Intel Software Innovator" group. Awarded "Top Innovator" award 2018, "Top Innovator Innovator Summit 2019".

World Record Holder With Sister Subashri Vasudevan (Only Sibling in the Globe to have authored nine books together, Unique World Record Books).

Entry in Limca Book of Records for National Record 2015.

Entry in India Book of Records National Record and Appreciation 2017.