Network and Data Security for Non-Engineers

  • 4h 56m
  • Frank M. Groom, Kevin Groom, Stephan S. Jones
  • CRC Press
  • 2017

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

About the Author

Stephan S. Jones, PhD, is the director of the Center for Information and Communication Sciences, where he is also a professor delivering core technology courses in the graduate-only program. His industry experience is as a field engineer and owner of a telecommunications company providing voice and data solutions for business/commercial systems in the Midwest. In academe, he has published or edited numerous books and texts associated with simplifying complex communication technologies for nonengineering students to comprehend. He is actively engaged in supporting broadband technology deployments to underserved and unserved regions of the country and providing technical support for non-profit organizations with student participation.

Frank Groom, PhD, is a professor in the Graduate Center for Information and Communication Science at Ball State University. His research is concentrated in the areas of high-bandwidth networking, distributed systems, and the storage of multimedia objects. Dr. Groom is the author of seven books, most recently having finished The Basics of Voice over IP Networking and The Basics of 802.11 Wireless LANs. Among his best known books are The Future of ATM and The ATM Handbook. Dr. Groom earned his PhD from the University of Wisconsin– Milwaukee in information systems. He is the former senior director of information systems for Ameritech.

In this Book

  • Network and Data Security for Non-Engineers
  • Preface
  • Introduction to Security Threats
  • The 2014–2015 Anthem Blue Cross and Blue Shield Break-In Case Study
  • Anonymous Persistent Threats
  • Creating Secure Code
  • Providing a Secure Architecture
  • The Hacker Strategy: Expanded
  • Malware, Viruses, Worms, Bugs, and Botnets
  • Cryptography and the RSA Algorithm
  • Browser Security and Cross-Site Scripting
  • Banking Security, Zeus, and SpyEye
  • Web Application Security
  • Session Management, User Authentication, and Web Application Security
  • Web Security, DNS Security, and the Internet
  • Network Security and Defenses
  • Network Security Protocols and Defensive Mechanisms
  • Denial-of-Service Attacks
  • Mobile Platform Security
  • Cellular Access Security—4G LTE, Mobile WiMAX, 5G, and MIMOs
  • Wireless LAN Security
  • The Stuxnet Worm and the Vulnerability of the U.S. Electric Power Grid
  • Cyber Warfare
  • Conclusion
  • Bibliography
  • End of Chapter Question Answers
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)