万本电子书0元读

万本电子书0元读

顶部广告

Hands-On Cybersecurity for Finance电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Dr. Erdal Ozkaya

出  版  社:Packt Publishing

出版时间:2019-01-31

字       数:37.3万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features * Protect your financial environment with cybersecurity practices and methodologies * Identify vulnerabilities such as data manipulation and fraudulent transactions * Provide end-to-end protection within organizations Book Description Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn * Understand the cyber threats faced by organizations * Discover how to identify attackers * Perform vulnerability assessment, software testing, and pentesting * Defend your financial cyberspace using mitigation techniques and remediation plans * Implement encryption and decryption * Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is for Hands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.
目录展开

Title Page

Copyright and Credits

Hands-On Cybersecurity for Finance

Dedication

About Packt

Why subscribe?

Packt.com

Foreword

Contributors

About the authors

About the reviewers

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Get in touch

Reviews

Disclaimer

Introduction to Cybersecurity and the Economy

What is cybersecurity – a brief technical description?

People

Processes

Technology

The scope of cybersecurity

Critical infrastructure security

Network security

Cloud security

Application/system security

User security

Internet of Things security

Terminologies

General description of hacking groups and cyber espionage

Hacking groups

Cyber espionage

Cybersecurity objectives

Importance of cybersecurity and its impacts on the global economy

The number of cyber attacks is growing

Cyber attacks are getting worse

Impacts on the global economy

Estimation of financial losses related to cybercrime

Finance and cybersecurity

Critical dependency of business, processes, and IT infrastructure

Economic loss

Banking and financial systems – changes from a risk and security perspective

Data breach means money

Financial repercussion of reputational damage caused by cyber attacks

Digital economy and related threats

Smart threats

Ransomware

Critical infrastructure attacks

Summary

Further reading

Cyber Crime - Who the Attackers Are

Introduction to cyber crime

Threat actors

Hacktivism

Case study – Dakota Access Pipeline

Case study – Panama Papers

Cyber terrorists

Case study – Operation Ababil

Cyber criminals

Case study – FIN7

Case study – Carbanak APT Attack

Case study – OurMine operation

Summary

Counting the Costs

The cost of a cybersecurity attack

The cost of different cyber attacks

Breakdown of the costs of a cyber attack

Production loss

Economic losses

Damaged brand and reputation

Loss of data

Fines, penalties, and litigations

Losses due to recovery techniques

Breakdown of the cost of securing an organization

Every financial institute should know Carbanak

Antivirus systems

Endpoint Detection and Response solutions

Firewall systems

Intrusion-prevention systems

Encryption

Bonus

What is Microsoft offering?

Windows 10 Defender Security Center

Windows Defender

Windows Defender Exploit Guard

Controlled folder access

Network protection

Attack surface reduction

Windows Defender Credential Guard

Windows Defender Application Guard

Windows Event Forwarding

Windows Defender Advanced Threat Protection

Protecting privileged identities

How do privileged identities get compromised?

How to prevent attackers from gaining access to privileged identities

Summary

Further reading

The Threat Landscape

Threats against end customers

Credit card fraud

Application fraud

Card-not-present fraud

Compromised account fraud

Credit card testing

Financial Trojans

Case study – BackSwap Trojan

Case study – Ramnit

Case study – Bebloh

Phishing

Case study – immediate action required

Pretexting

Dumpster diving

Mobile fraud

Threats against financial institutes

ATM attacks

POS attacks

Denial of service

Ransomware

Blackmailing

Summary

Phishing, Spamming, and Scamming to Steal Data and Money

Phishing scams

Evolution of phishing

Social engineering emails

Spear phishing

Business email compromise or whaling

Credential theft using malicious software

Ardamax

LokiBot

Characteristics of phishing emails

Spamming

How spammers get email addresses

How spammers make money

Advertising

Malware

Storm

Triout

Botnets

Characteristics of spam emails

Summary

Further reading

The Malware Plague

Malware categories

Computer virus

Computer worm

SQL Slammer worm

Crypto worm

WannaCry

Trojan

Bebloh

Zeus

Rootkit

Torpig

Spyware

Adware

Malware trends

Malware infection vectors

Injected by remote attacker

Email

Auto-executed web infection

User-executed web infection

Installed by other malware

Network propagation

Portable media

Coded into existing software

Summary

Vulnerabilities and Exploits

Detecting vulnerabilities

Exploitation techniques

Buffer overflow

Integer overflow

Memory corruption

Format string attacks

Race condition

Cross-site scripting

One-click attack

SQL injections

Exploitation delivery

Summary

Further reading

Attacking Online Banking Systems

Online banking benefits for financial services

The online banking process

Attack techniques

Summary

Further reading

Vulnerable Networks and Services - a Gateway for Intrusion

Vulnerable network protocols and network intrusions

Simple Mail Transfer Protocol

Secure Sockets Layer

Domain Name System

Packet sniffing

Distributed denial of service

Attacking web servers and web-based systems

SQL injection

Buffer overflow

Advanced Google search operators

Brute-force attacks

Medusa

Brutus

Bypassing web protection

Bypassing captcha

Bypassing two-factor authentication

Bypassing firewalls

Hacking wireless networks

Hacking wireless networks

Aircrack-ng

Kismet

Wireshark

Hacking Bluetooth

Vulnerable network devices

Summary

Further reading

Responding to Service Disruption

Cybersecurity incidents

Fundamentals

Data knowledge

Monitoring

Attack surface analysis

Vendor management

Incident response and management

Phase 1 – preparation

Phase 2 – detection and analysis

Phase 3 – containment

Phase 4 – eradication and recovery

Phase 5 – post-incident activity

Summary

Further reading

The Human Problem - Governance Fail

Business versus security

Failing security management

Lack of adoption of cybersecurity initiatives

Lack of organization and planning

Poor leadership

Careless online behavior

Insider threats

Technological transformation of financial services

Failure in implementing security policies

Summary

Further reading

Securing the Perimeter and Protecting the Assets

Network models

Single trust network model

Dual trust network model

Zero trust network model

Microsoft 365 zero trust network models

Endpoint security

Endpoint security threats

Physical access

Malicious code execution

Device-based attack

Communication interception

Insider threats

Decreased productivity

Modern endpoint security

Device protection

Threat resistance

Identity protection

Information protection

Breach detection investigation and response

Summary

Further reading

Threat and Vulnerability Management

Vulnerability management strategy

Asset inventory

Information management

Risk assessment

Vulnerability analysis

Threat analysis

Risk acceptance

Vulnerability assessment

Reporting and remediation

Defining vulnerabilities in a few steps

From vulnerability to threat

Multiplying threats

Multiplying risk

The root cause of security issues

Vulnerability management tools

Implementation of vulnerability management

Best practices for vulnerability management

Assess yourself

Tying vulnerability assessments into business impact

Take an active role

Identify and understand the business processes

Pinpoint the applications and data

Try to find hidden data sources

Determine the hardware structure

Map the network infrastructure to hardware

Identify the controls

Run the vulnerability scans

Read the results of the scans

Conduct penetration testing by third parties as well

Understanding risk management

Defense in depth approach

Best practices for protecting your environment​

Summary

Further reading

Audit, Risk Management, and Incident Handling

IT auditing

Evaluating the systems, policies, and processes that secure the organization

Determining the risks to the company's assets

Ensuring that the organization is compliant with the relevant regulations

Determining inefficiencies in the IT infrastructure and management

Risk management

Identification

Risk analysis

Risk assessment

Risk mitigation

Risk monitoring

Incident handling

Preparation

Identification

Containment

Recovery and analysis

Summary

Further reading

Encryption and Cryptography for Protecting Data and Services

Encryption

Early encryption methods

Encryption today

Symmetric encryption

Asymmetric encryption

Protecting data and services with cryptography

Data at rest

Full disk encryption

File encryption

Data in transit

End-to-end encryption

Encrypted web connection (SSL and TLS)

Encrypted email servers

Examples of encryption algorithms

Advanced Encryption Standard (AES)

Triple DES

RSA

Blowfish

Encryption challenges

Summary

Further reading

The Rise of the Blockchain

Introduction to Blockchain technology

Consensus mechanisms in a Blockchain

Proof of work

Proof of stake

Applications of Blockchain technology

Recording purposes

Digital identity

Government purposes

Financial applications

Cryptocurrencies

Cryptocurrency wallets

Desktop wallets

Web wallets

Mobile wallets

Hardware wallets

Paper wallets

Challenges to cryptocurrencies

Unstable value

Theft

Exchange risks

Blockchain challenges and future

Summary

Further reading

Artificial Intelligence and Cybersecurity

Threat landscape evolution

Artificial Intelligence

Narrow Artificial Intelligence

True Artificial Intelligence

Technologies powering Artificial Intelligence

Artificial Intelligence-powered cybersecurity

Use cases

Summary

Further reading

The Quantum Future

Evolution of the quantum technology

1965

1980

1985

1994

1995

1996–present

The quantum technology race

Quantum communication

Quantum computation

Quantum simulation

Quantum sensing

Quantum software

Quantum technology breakthroughs

Impacts of the quantum technology

Communication

Mining

Finance

Defense

Health

Energy

Big data

Artificial Intelligence

Summary

Further reading

Other Books You May Enjoy

Leave a review - let other readers know what you think

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部