Название: It’s Your Digital Life Автор: Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan Издательство: CRC Press Год: 2022 Страниц: 247 Язык: английский Формат: pdf (true) Размер: 11.6 MB
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information.
Every attack in today’s cyber world needs a plan, a path, a target, and a mode of delivery. A plan refers to the intention of an attack; a path refers to the route taken by the actor to compromise a target; a target refers to the audience targeted, which can be hospitals or other organisations; and finally, the mode of delivery which is uber critical.
The use of email as a primary mode for marketing, communication, and delivery of proof of purchase has increased at a staggering pace. An email has become more of a convincing act rather than a delivery mechanism. Well, that is why phishing and malware prefer this as their primary mode of delivery. Let us see how this unfolds in the Chapter 4.
Foreword. Authors. 1 Digital world. Security gaps Industry gap 2 It is your money. Digital banking 17 Online banking 17 Digital payment 18 Fraud detection 20... 3 Your socially, social media. URL shorteners lengthen the problem 38 What if we had the power to verify URLs? 39 Say hello to fraudsters 45 Dumpster diving and the tale of your ID 46 Importance of privacy settings in social media profiles 49 4 Knock, knock, anybody there? Email, malware, and phishing: The deadly trio 57 Everywhere, malware 57 Types of malware 58 A sneak peek into free watching 58 Delivery of malware and modes of delivery 59 Email the preferred partner for malware and phishing 60 How to identify phishing and tricks: Typosquatting and green lock SSL 63 Email dropping malware: how it tricks one and either steals or drops malware 66 The rise of document and pdf malware 68 Real-world scenes: Exercise and case study 70 5 Power up and ready to strike. 5.1 The uninvited guests 77 5.2 What’s up, doc? 79 5.3 Macro: The micro-executioner 81 5.4 No strings attached 84 5.5 Payload & parked domains, loading... 89 5.6 Who? What? Where? 90 5.7 PDF- graphically malicious 92 5.8 Image EXIF header malware 94... 6 The guardians of the Internet. 6.1 IDS 106 6.2 Multiple personality disorder of IDS 106 6.3 SNORT 107 6.4 Obfuscation: The magic trick that attackers follow to evade 116 6.4.1 Case study: Screen saver that is not a saver! 120 6.5 The DLL injection 124 7 Need of the hour: The tech fundamentals. 7.1 Operating systems: A bigger picture 129 7.2 File systems: Linux/Unix file systems 130 7.3 Processes: How and why is it important? 132 7.4 Shell scripting: A quick visit 140 7.5 HTTP (HyperText Transfer Protocol) 150 8 It is your data. 8.1 Data is gold 155 8.2 Why is your data interesting 156 8.3 How can you lose your data? 162 9 Sensors, software, and severities. 9.1 What is IoT? 177 10 The cyber laws. 11 How to build a career as a digital detective. 11.1 Roles in security 207 11.1.1 Security analyst/ information security analyst 208 11.1.2 Security engineer 208 11.1.3 Security architect 209 11.1.4 PKI analyst/ cryptographer 210 11.1.5 Pen tester 210 11.1.6 Vulnerability assessor 211... Index.