Introduction to cybersecurity : concepts, principles, technologies and practices Ajay Singh
Material type:
TextLanguage: English Publication details: Kolkata University press c2023Description: 312p. P.BISBN: - 9789393330314
- R 005.8 SIN(INT)
| Item type | Current library | Collection | Call number | Vol info | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|---|---|
REFERENCE STATISTICS
|
St. Xavier's University, Kolkata Reference Section | Reference | R 005.8 SIN(INT) (Browse shelf(Opens below)) | S.X.U.K | 13910 | Not For Loan | US13910 | |
STATISTICS
|
St. Xavier's University, Kolkata Lending Section | 005.8 SIN(INT) (Browse shelf(Opens below)) | S.X.U.K | 13911 | Available | S13911 | ||
STATISTICS
|
St. Xavier's University, Kolkata Lending Section | 005.8 SIN(INT)C1 (Browse shelf(Opens below)) | S.X.U.K | 13912 | Available | S13912 |
Browsing St. Xavier's University, Kolkata shelves, Shelving location: Reference Section, Collection: Reference Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| R 005.8 GOD(CYB) Cyber Security : understanding Cyber Crimes Computer Forensics & Legal Perspectives | R 005.8 KAU(NET)Ed2 Network security : private communication in a public world | R 005.8 MEN(CRY) Cryptography, network security and cyber laws | R 005.8 SIN(INT) Introduction to cybersecurity : concepts, principles, technologies and practices | R 005.8 STA(CRY)Ed7 Cryptography and network security : principles and practice | R 005.8 STA(CRY)Ed7.C1 Cryptography and network security : principles and practice | R 005.8 STA(CRY)Ed8 Cryptography and network security principles and practice |
Preface
Acknowledgements
List of Tables
List of Info Boxes
Chapter 1: Security in an Interconnected World
Introduction to Information Systems | What is an Information System? | Evolution and Types of Information Systems | Evolution and Growth of the Internet | Information System Development and Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and Governance of the Internet and Cybersecurity | Information Security Models
Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders
Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National Cybersecurity Policy | Online Code of Conduct and Computer Ethics
Chapter 3: Cybersecurity Vulnerabilities
Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP | Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms
Chapter 4: Cybersecurity Management Practices
Overview of Cybersecurity Management | Information Classification Process | Security Policies | Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response | Business Continuity and Disaster Recovery
Chapter 5: Developing Secure Information Systems
Introduction | Securing Information Assets | Data Security and Protection | Application Security | Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of Things | Network Security | Operating System Security | Database Security | User Management | Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related to Digital File Sharing
Chapter 6: Cybersecurity Strategies and Approaches
Introduction | Information Security Governance and Risk Management | Cyber Risk Management | Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks | The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity
Chapter 7: Cybersecurity Technologies
Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus Technologies and Solutions | Identity and Access Management | Authentication | Cryptography | How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced Technologies and Approaches in Cybersecurity | Internet Protocols and Ports
Chapter 8: Cyber Laws and Forensics
Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics | Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation | Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace
Chapter 9: Personal Cybersecurity, Privacy and Data Protection
Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches | Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in Cybersecurity
Chapter 10: Cybersecurity in Evolving Technology and Practice
Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity | Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other Evolving Aspects of Cybersecurity
Chapter 11: Cybersecurity in E-commerce and Digital Payments
Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on Privacy and Data Protection for E-commerce Companies
Chapter 12: Overview of Social Media and Security
Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing | Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media
Annexure A: Cybercrime and Cyberattack Reporting in India
Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021
Annexure C: Self-Assessment Questions
Annexure D: List of Abbreviations and Acronyms
Index
There are no comments on this title.
