Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Milton
Taylor & Francis Group
2021
|
Schriftenreihe: | The Human Element in Smart and Intelligent Systems Ser
|
Online-Zugang: | FHD01 FHI01 Volltext |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xxii, 202 Seiten) |
ISBN: | 9781000506174 9781003038429 |
DOI: | 10.1201/9781003038429 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048221076 | ||
003 | DE-604 | ||
005 | 20221109 | ||
007 | cr|uuu---uuuuu | ||
008 | 220516s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781000506174 |9 978-1-00-050617-4 | ||
020 | |a 9781003038429 |9 9781003038429 | ||
024 | 7 | |a 10.1201/9781003038429 |2 doi | |
035 | |a (ZDB-30-PQE)EBC6796716 | ||
035 | |a (ZDB-30-PAD)EBC6796716 | ||
035 | |a (ZDB-89-EBL)EBL6796716 | ||
035 | |a (OCoLC)1283859672 | ||
035 | |a (DE-599)BVBBV048221076 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-573 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Moallem, Abbas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Understanding Cybersecurity Technologies |b A Guide to Selecting the Right Cybersecurity Tools |
264 | 1 | |a Milton |b Taylor & Francis Group |c 2021 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (xxii, 202 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a The Human Element in Smart and Intelligent Systems Ser | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Author -- List of Figures -- Chapter 1: Cybersecurity Technologies Classification -- 1.1. Introduction -- 1.2. Different Categories of Cyber Technologies -- 1.3. Technology Classification -- Chapter 2: Encryption -- 2.1. Introduction -- 2.2. Brief Historical Background -- 2.3. How Encryption Technologies Work -- 2.4. Encryption Technologies -- 2.4.1. RSA (Rivest-Shamir-Adleman) -- 2.4.2. Blowfish Cipher -- 2.4.3. Data Encryption Standard (Des) -- 2.4.4. Triple Des (3Des or Tdes) -- 2.4.5. Twofish -- 2.5. Advantages and Disadvantages of Blowfish and RSA Encryption -- 2.5.1. Advantages -- 2.5.1.1. RSA -- 2.5.1.2. Blowfish -- 2.5.2. Disadvantages -- 2.5.2.1. RSA -- 2.5.2.2. Blowfish -- 2.6. Which Products Use Encryptions -- 2.6.1. Products Using Blowfish -- 2.6.2. Products Using RSA -- 2.7. Conclusion -- Chapter 3: Authentication -- 3.1. Introduction -- 3.2. Brief Historical Background -- 3.3. How Authentication Technologies Work -- 3.3.1. Secret Knowledge-Based Authentication -- 3.3.1.1. Personal Identification Number (PIN) and Password -- 3.3.1.2. Cognitive Knowledge Question -- 3.3.1.3. Pattern and Graphical Password -- 3.3.2. Token-Based Approach -- 3.3.3. Biometrics -- 3.3.4. Compound Authentication -- 3.3.5. Storing Passwords and Usernames -- 3.4. Authentication Technologies -- 3.5. Advantages and Disadvantages of Authentication Technoglogies -- 3.5.1. Advantages -- 3.5.1.1. Personal Identification Number (PIN) and Password Approach -- 3.5.1.2. Cognitive Knowledge Question (CKQ) -- 3.5.1.3. Pattern and Graphical Password -- 3.5.1.4. Token-Based Passwords -- 3.5.1.5. Biometric Authentication -- 3.5.1.6. Compound Authentication -- 3.5.2. Disadvantages -- 3.5.2.1. Personal Identification Number (PIN) and Password Approach | |
505 | 8 | |a 3.5.2.2. Cognitive Knowledge Question -- 3.5.2.3. Pattern and Graphical Passwords -- 3.5.2.4. Token-Based One-Time Passwords (OTP) -- 3.5.2.5. Biometric Authentication -- 3.5.2.6. Compound Authentication -- 3.6. What Products Use Authentications -- 3.7. Conclusion -- Chapter 4: Biometrics -- 4.1. Introduction -- 4.2. Brief Historical Background -- 4.3. How Biometric Technologies Work -- 4.3.1. Palm -- 4.3.2. Fingerprints -- 4.3.2.1. Optical Scanners -- 4.3.2.2. Capacitive Scanners -- 4.3.2.3. Ultrasonic Scanners -- 4.3.3. Face -- 4.3.4. IRIS -- 4.3.5. Voice -- 4.4. Biometric Technologies -- 4.5. Biometric Traits Comparison -- 4.6. Advantages and Disadvantages of Biometric Technologies -- 4.6.1. Advantages of Using Biometrics -- 4.6.2. Disadvantages of Using Biometrics -- 4.7. What Products Use Biometrics -- 4.7.1. Cars -- 4.7.2. Banking -- 4.7.3. Health Care -- 4.7.4. Food and Beverages -- 4.7.5. Border Control -- 4.7.6. Education -- 4.8. Conclusion -- Chapter 5: Firewall Technologies -- 5.1. Introduction -- 5.2. Brief Historical Background -- 5.3. How Firewall Technologies Work -- 5.4. Firewall Technologies -- 5.4.1. Stateless Firewalls or Packet-Filtering -- 5.4.2. Stateful Firewalls or Dynamic Packet Inspection -- 5.4.3. Application Proxy/Proxy Server Firewalls -- 5.4.4. Cloud Firewalls -- 5.5. Advantages and Disadvantages of Firewall Technologies -- 5.5.1. Advantages -- 5.5.2. Disadvantages -- 5.6. Conclusion -- Chapter 6: Virus Detection -- 6.1. Introduction -- 6.2. Brief Historical Background -- 6.3. How Virus Detection Technologies Work -- 6.3.1. Virus Scanning and Detection Process -- 6.4. Virus Detection Technologies -- 6.4.1. Sandbox Detection -- 6.4.2. Data Mining Techniques -- 6.4.3. Signature-Based Detection -- 6.4.4. Heuristic Detection -- 6.4.5. Real-Time Protection -- 6.5. Advantages and Disadvantages of Virus Detection Technologies | |
505 | 8 | |a 6.5.1. Advantages -- 6.5.2. Disadvantages -- 6.6. Approaches Used in Virus Detection -- 6.7. Conclusion -- Chapter 7: Phishing Detection -- 7.1. Introduction -- 7.2. Brief Historical Background -- 7.3. How Phishing Detection Technologies Work -- 7.4. Phishing Detection Technologies -- 7.4.1. Visual Similarity-Based Phishing Detection -- 7.4.2. Blacklist-Based Phishing Detection -- 7.4.3. Web Crawling-Based Phishing Attack Detection -- 7.5. Advantages and Disadvantages of Phishing Detection Technologies -- 7.5.1. Advantages -- 7.5.1.1. Visual Similarity-Based Phishing Detection -- 7.5.1.2. Blacklist-Based Phishing Detection -- 7.5.1.3. Web Crawling-Based Phishing Attack Detection -- 7.5.2. Disadvantages -- 7.5.2.1. Visual Similarity-Based Phishing Detection -- 7.5.2.2. Blacklist-Based Phishing Detection -- 7.5.2.3. Web Crawling-Based Phishing Attack Detection -- 7.6. What Products Use Phishing Detection -- 7.6.1. Blacklist-Based Phishing Detection -- 7.7. Conclusion -- Chapter 8: Endpoint Protection -- 8.1. Introduction -- 8.2. Brief Historical Background -- 8.2.1. Traditional Antivirus -- 8.2.2. Endpoint Detection and Response (Edr) -- 8.2.3. Next-Generation Antivirus Software (NGAV) -- 8.2.4. Operating System (OS) Centric Security -- 8.3. How Endpoint Protection Technologies Work -- 8.3.1. Antivirus -- 8.3.1.1. Signature -- 8.3.1.2. Behavioral Detection -- 8.3.1.3. Machine Learning -- 8.3.2. Secure Email Gateways (Segs) -- 8.4. Endpoint Protection Technologies -- 8.4.1. Antivirus Solutions -- 8.4.2. Endpoint Detection and Response -- 8.4.3. Secure Email Gateways -- 8.5. Advantages and Disadvantages of Endpoint Protection Technologies -- 8.5.1. Antivirus Solutions -- 8.5.1.1. Advantages -- 8.5.1.2. Disadvantages -- 8.5.2. Endpoint Detection and Response -- 8.5.2.1. Advantages -- 8.5.2.2. Disadvantages -- 8.5.3. Secure Email Gateways | |
505 | 8 | |a 8.5.3.1. Advantages -- 8.5.3.2. Disadvantages -- 8.6. What Products Use Endpoint Protection -- 8.6.1. Antivirus Solutions -- 8.6.2. Endpoint Detection and Response -- 8.6.3. Secure Email Gateways -- 8.7. Conclusion -- Chapter 9: Malware Protection Technology -- 9.1. Introduction -- 9.2. Brief Historical Background -- 9.3. How Malware Protection Technologies Work -- 9.3.1. Heuristic Analysis -- 9.3.2. Signature-Based Safety -- 9.3.3. Host-Based Intrusion Prevention Systems -- 9.4. Malware Protection Technologies -- 9.4.1. Main Category of Malware Detection Technology -- 9.4.1.1. Heuristic Analysis -- 9.4.1.2. Signature-Based Security -- 9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS) -- 9.5. Advantages and Disadvantages of Malware Protection -- 9.5.1. Advantages -- 9.5.1.1. Heuristic Analysis -- 9.5.1.2. Signature-Based Protection -- 9.5.1.3. Host-Based Intrusion Prevention Systems -- 9.5.2. Disadvantages -- 9.5.2.1. Heuristic Analysis -- 9.5.2.2. Signature-Based Protection -- 9.5.2.3. Host-Based Intrusion Prevention Systems -- 9.6. What Products Use Malware Protection -- 9.7. Conclusion -- Chapter 10: The Internet of Things (IoT) -- 10.1. Introduction -- 10.2. Brief Historical Background -- 10.3. How IoT Technologies Work -- 10.3.1. End-to-End Platform -- 10.3.2. Connectivity Platform -- 10.3.3. Cloud and Data Platforms -- 10.4. Iot Security Technologies -- 10.4.1. Securing IoT Devices -- 10.4.2. Smart Device Protection Technologies -- 10.4.2.1. Host Identity Protocol (HIP) -- 10.4.2.2. Hip Diet Exchange -- 10.4.2.3. Intrusion Detection and Mitigation Framework -- 10.4.2.4. Intrusion Detection System -- 10.4.2.5. Openflow -- 10.4.2.6. Software-Defined Networking -- 10.5. Advantages and Disadvantages of IoT Security Technologies -- 10.5.1. Advantages -- 10.5.2. Disadvantages -- 10.6. What Products Use IoT Technologies -- 10.7. Conclusion | |
505 | 8 | |a Chapter 11: Network Security -- 11.1. Introduction -- 11.2. Brief Historical Background -- 11.3. How Network Security Technologies Work -- 11.3.1. Firewall -- 11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention -- 11.3.3. Wi-Fi Protected Access 3 (WPA3) -- 11.4. Network Security Technologies -- 11.4.1. Firewalls -- 11.4.2. Email Security -- 11.4.3. Antivirus and Antimalware Software -- 11.4.4. Virtual Private Network (VPN) -- 11.4.5. Intrusion Prevention Systems (IDS) -- 11.5. Advantages and Disadvantages of Network Security -- 11.5.1. Advantages of Network Security -- 11.5.2. Disadvantages of Network Security -- 11.6. Which Products Use Network Security -- 11.6.1. Banks/Financial Institutions -- 11.6.2. Hospitals/Medical Institutions -- 11.6.3. Cloud Computing -- 11.6.4. Use of Network Security Technologies -- 11.6.5. Firewalls -- 11.6.6. Antivirus -- 11.6.7. Security Information and Event Management -- 11.7. Conclusion -- Chapter 12: Location Tracking -- 12.1. Introduction -- 12.2. Brief Historical Background -- 12.3. How Location Tracking Technologies Work -- 12.3.1. Uses of GPS Technology -- 12.4. Location Tracking Technologies -- 12.4.1. GPS Technology -- 12.4.2. Radio Frequency Identification -- 12.4.3. Internet Tracking -- 12.4.4. Advantages and Disadvantages of Location Tracking -- 12.4.4.1. Advantages of Location Tracking -- 12.4.4.2. Disadvantages of Location Tracking -- 12.5. Which Products Use Location Tracking -- 12.6. Conclusion -- Chapter 13: Surveillance -- 13.1. Introduction -- 13.2. Brief Historical Background -- 13.3. How Surveillance Technology Works -- 13.3.1. Video Surveillance and Crime -- 13.4. Surveillance Technologies -- 13.4.1. Computer -- 13.4.2. Telephones -- 13.4.3. Aerial Surveillance -- 13.5. Advantages and Disadvantages of Surveillance Technologies -- 13.5.1. Advantages -- 13.5.2. Disadvantages | |
505 | 8 | |a 13.6. Which Products Use Surveillance | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Moallem, Abbas |t Understanding Cybersecurity Technologies |d Milton : Taylor & Francis Group,c2021 |z 9780367457457 |
856 | 4 | 0 | |u https://doi.org/10.1201/9781003038429 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE |a ZDB-7-TFC | ||
940 | 1 | |q TUM_PDA_PQE | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033601815 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6796716 |l FHD01 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003038429 |l FHI01 |p ZDB-7-TFC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184002057207808 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Moallem, Abbas |
author_facet | Moallem, Abbas |
author_role | aut |
author_sort | Moallem, Abbas |
author_variant | a m am |
building | Verbundindex |
bvnumber | BV048221076 |
collection | ZDB-30-PQE ZDB-7-TFC |
contents | Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Author -- List of Figures -- Chapter 1: Cybersecurity Technologies Classification -- 1.1. Introduction -- 1.2. Different Categories of Cyber Technologies -- 1.3. Technology Classification -- Chapter 2: Encryption -- 2.1. Introduction -- 2.2. Brief Historical Background -- 2.3. How Encryption Technologies Work -- 2.4. Encryption Technologies -- 2.4.1. RSA (Rivest-Shamir-Adleman) -- 2.4.2. Blowfish Cipher -- 2.4.3. Data Encryption Standard (Des) -- 2.4.4. Triple Des (3Des or Tdes) -- 2.4.5. Twofish -- 2.5. Advantages and Disadvantages of Blowfish and RSA Encryption -- 2.5.1. Advantages -- 2.5.1.1. RSA -- 2.5.1.2. Blowfish -- 2.5.2. Disadvantages -- 2.5.2.1. RSA -- 2.5.2.2. Blowfish -- 2.6. Which Products Use Encryptions -- 2.6.1. Products Using Blowfish -- 2.6.2. Products Using RSA -- 2.7. Conclusion -- Chapter 3: Authentication -- 3.1. Introduction -- 3.2. Brief Historical Background -- 3.3. How Authentication Technologies Work -- 3.3.1. Secret Knowledge-Based Authentication -- 3.3.1.1. Personal Identification Number (PIN) and Password -- 3.3.1.2. Cognitive Knowledge Question -- 3.3.1.3. Pattern and Graphical Password -- 3.3.2. Token-Based Approach -- 3.3.3. Biometrics -- 3.3.4. Compound Authentication -- 3.3.5. Storing Passwords and Usernames -- 3.4. Authentication Technologies -- 3.5. Advantages and Disadvantages of Authentication Technoglogies -- 3.5.1. Advantages -- 3.5.1.1. Personal Identification Number (PIN) and Password Approach -- 3.5.1.2. Cognitive Knowledge Question (CKQ) -- 3.5.1.3. Pattern and Graphical Password -- 3.5.1.4. Token-Based Passwords -- 3.5.1.5. Biometric Authentication -- 3.5.1.6. Compound Authentication -- 3.5.2. Disadvantages -- 3.5.2.1. Personal Identification Number (PIN) and Password Approach 3.5.2.2. Cognitive Knowledge Question -- 3.5.2.3. Pattern and Graphical Passwords -- 3.5.2.4. Token-Based One-Time Passwords (OTP) -- 3.5.2.5. Biometric Authentication -- 3.5.2.6. Compound Authentication -- 3.6. What Products Use Authentications -- 3.7. Conclusion -- Chapter 4: Biometrics -- 4.1. Introduction -- 4.2. Brief Historical Background -- 4.3. How Biometric Technologies Work -- 4.3.1. Palm -- 4.3.2. Fingerprints -- 4.3.2.1. Optical Scanners -- 4.3.2.2. Capacitive Scanners -- 4.3.2.3. Ultrasonic Scanners -- 4.3.3. Face -- 4.3.4. IRIS -- 4.3.5. Voice -- 4.4. Biometric Technologies -- 4.5. Biometric Traits Comparison -- 4.6. Advantages and Disadvantages of Biometric Technologies -- 4.6.1. Advantages of Using Biometrics -- 4.6.2. Disadvantages of Using Biometrics -- 4.7. What Products Use Biometrics -- 4.7.1. Cars -- 4.7.2. Banking -- 4.7.3. Health Care -- 4.7.4. Food and Beverages -- 4.7.5. Border Control -- 4.7.6. Education -- 4.8. Conclusion -- Chapter 5: Firewall Technologies -- 5.1. Introduction -- 5.2. Brief Historical Background -- 5.3. How Firewall Technologies Work -- 5.4. Firewall Technologies -- 5.4.1. Stateless Firewalls or Packet-Filtering -- 5.4.2. Stateful Firewalls or Dynamic Packet Inspection -- 5.4.3. Application Proxy/Proxy Server Firewalls -- 5.4.4. Cloud Firewalls -- 5.5. Advantages and Disadvantages of Firewall Technologies -- 5.5.1. Advantages -- 5.5.2. Disadvantages -- 5.6. Conclusion -- Chapter 6: Virus Detection -- 6.1. Introduction -- 6.2. Brief Historical Background -- 6.3. How Virus Detection Technologies Work -- 6.3.1. Virus Scanning and Detection Process -- 6.4. Virus Detection Technologies -- 6.4.1. Sandbox Detection -- 6.4.2. Data Mining Techniques -- 6.4.3. Signature-Based Detection -- 6.4.4. Heuristic Detection -- 6.4.5. Real-Time Protection -- 6.5. Advantages and Disadvantages of Virus Detection Technologies 6.5.1. Advantages -- 6.5.2. Disadvantages -- 6.6. Approaches Used in Virus Detection -- 6.7. Conclusion -- Chapter 7: Phishing Detection -- 7.1. Introduction -- 7.2. Brief Historical Background -- 7.3. How Phishing Detection Technologies Work -- 7.4. Phishing Detection Technologies -- 7.4.1. Visual Similarity-Based Phishing Detection -- 7.4.2. Blacklist-Based Phishing Detection -- 7.4.3. Web Crawling-Based Phishing Attack Detection -- 7.5. Advantages and Disadvantages of Phishing Detection Technologies -- 7.5.1. Advantages -- 7.5.1.1. Visual Similarity-Based Phishing Detection -- 7.5.1.2. Blacklist-Based Phishing Detection -- 7.5.1.3. Web Crawling-Based Phishing Attack Detection -- 7.5.2. Disadvantages -- 7.5.2.1. Visual Similarity-Based Phishing Detection -- 7.5.2.2. Blacklist-Based Phishing Detection -- 7.5.2.3. Web Crawling-Based Phishing Attack Detection -- 7.6. What Products Use Phishing Detection -- 7.6.1. Blacklist-Based Phishing Detection -- 7.7. Conclusion -- Chapter 8: Endpoint Protection -- 8.1. Introduction -- 8.2. Brief Historical Background -- 8.2.1. Traditional Antivirus -- 8.2.2. Endpoint Detection and Response (Edr) -- 8.2.3. Next-Generation Antivirus Software (NGAV) -- 8.2.4. Operating System (OS) Centric Security -- 8.3. How Endpoint Protection Technologies Work -- 8.3.1. Antivirus -- 8.3.1.1. Signature -- 8.3.1.2. Behavioral Detection -- 8.3.1.3. Machine Learning -- 8.3.2. Secure Email Gateways (Segs) -- 8.4. Endpoint Protection Technologies -- 8.4.1. Antivirus Solutions -- 8.4.2. Endpoint Detection and Response -- 8.4.3. Secure Email Gateways -- 8.5. Advantages and Disadvantages of Endpoint Protection Technologies -- 8.5.1. Antivirus Solutions -- 8.5.1.1. Advantages -- 8.5.1.2. Disadvantages -- 8.5.2. Endpoint Detection and Response -- 8.5.2.1. Advantages -- 8.5.2.2. Disadvantages -- 8.5.3. Secure Email Gateways 8.5.3.1. Advantages -- 8.5.3.2. Disadvantages -- 8.6. What Products Use Endpoint Protection -- 8.6.1. Antivirus Solutions -- 8.6.2. Endpoint Detection and Response -- 8.6.3. Secure Email Gateways -- 8.7. Conclusion -- Chapter 9: Malware Protection Technology -- 9.1. Introduction -- 9.2. Brief Historical Background -- 9.3. How Malware Protection Technologies Work -- 9.3.1. Heuristic Analysis -- 9.3.2. Signature-Based Safety -- 9.3.3. Host-Based Intrusion Prevention Systems -- 9.4. Malware Protection Technologies -- 9.4.1. Main Category of Malware Detection Technology -- 9.4.1.1. Heuristic Analysis -- 9.4.1.2. Signature-Based Security -- 9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS) -- 9.5. Advantages and Disadvantages of Malware Protection -- 9.5.1. Advantages -- 9.5.1.1. Heuristic Analysis -- 9.5.1.2. Signature-Based Protection -- 9.5.1.3. Host-Based Intrusion Prevention Systems -- 9.5.2. Disadvantages -- 9.5.2.1. Heuristic Analysis -- 9.5.2.2. Signature-Based Protection -- 9.5.2.3. Host-Based Intrusion Prevention Systems -- 9.6. What Products Use Malware Protection -- 9.7. Conclusion -- Chapter 10: The Internet of Things (IoT) -- 10.1. Introduction -- 10.2. Brief Historical Background -- 10.3. How IoT Technologies Work -- 10.3.1. End-to-End Platform -- 10.3.2. Connectivity Platform -- 10.3.3. Cloud and Data Platforms -- 10.4. Iot Security Technologies -- 10.4.1. Securing IoT Devices -- 10.4.2. Smart Device Protection Technologies -- 10.4.2.1. Host Identity Protocol (HIP) -- 10.4.2.2. Hip Diet Exchange -- 10.4.2.3. Intrusion Detection and Mitigation Framework -- 10.4.2.4. Intrusion Detection System -- 10.4.2.5. Openflow -- 10.4.2.6. Software-Defined Networking -- 10.5. Advantages and Disadvantages of IoT Security Technologies -- 10.5.1. Advantages -- 10.5.2. Disadvantages -- 10.6. What Products Use IoT Technologies -- 10.7. Conclusion Chapter 11: Network Security -- 11.1. Introduction -- 11.2. Brief Historical Background -- 11.3. How Network Security Technologies Work -- 11.3.1. Firewall -- 11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention -- 11.3.3. Wi-Fi Protected Access 3 (WPA3) -- 11.4. Network Security Technologies -- 11.4.1. Firewalls -- 11.4.2. Email Security -- 11.4.3. Antivirus and Antimalware Software -- 11.4.4. Virtual Private Network (VPN) -- 11.4.5. Intrusion Prevention Systems (IDS) -- 11.5. Advantages and Disadvantages of Network Security -- 11.5.1. Advantages of Network Security -- 11.5.2. Disadvantages of Network Security -- 11.6. Which Products Use Network Security -- 11.6.1. Banks/Financial Institutions -- 11.6.2. Hospitals/Medical Institutions -- 11.6.3. Cloud Computing -- 11.6.4. Use of Network Security Technologies -- 11.6.5. Firewalls -- 11.6.6. Antivirus -- 11.6.7. Security Information and Event Management -- 11.7. Conclusion -- Chapter 12: Location Tracking -- 12.1. Introduction -- 12.2. Brief Historical Background -- 12.3. How Location Tracking Technologies Work -- 12.3.1. Uses of GPS Technology -- 12.4. Location Tracking Technologies -- 12.4.1. GPS Technology -- 12.4.2. Radio Frequency Identification -- 12.4.3. Internet Tracking -- 12.4.4. Advantages and Disadvantages of Location Tracking -- 12.4.4.1. Advantages of Location Tracking -- 12.4.4.2. Disadvantages of Location Tracking -- 12.5. Which Products Use Location Tracking -- 12.6. Conclusion -- Chapter 13: Surveillance -- 13.1. Introduction -- 13.2. Brief Historical Background -- 13.3. How Surveillance Technology Works -- 13.3.1. Video Surveillance and Crime -- 13.4. Surveillance Technologies -- 13.4.1. Computer -- 13.4.2. Telephones -- 13.4.3. Aerial Surveillance -- 13.5. Advantages and Disadvantages of Surveillance Technologies -- 13.5.1. Advantages -- 13.5.2. Disadvantages 13.6. Which Products Use Surveillance |
ctrlnum | (ZDB-30-PQE)EBC6796716 (ZDB-30-PAD)EBC6796716 (ZDB-89-EBL)EBL6796716 (OCoLC)1283859672 (DE-599)BVBBV048221076 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1201/9781003038429 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11269nmm a2200505zc 4500</leader><controlfield tag="001">BV048221076</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221109 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220516s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000506174</subfield><subfield code="9">978-1-00-050617-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003038429</subfield><subfield code="9">9781003038429</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003038429</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6796716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6796716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6796716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1283859672</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048221076</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Moallem, Abbas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding Cybersecurity Technologies</subfield><subfield code="b">A Guide to Selecting the Right Cybersecurity Tools</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Milton</subfield><subfield code="b">Taylor & Francis Group</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 202 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Human Element in Smart and Intelligent Systems Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Author -- List of Figures -- Chapter 1: Cybersecurity Technologies Classification -- 1.1. Introduction -- 1.2. Different Categories of Cyber Technologies -- 1.3. Technology Classification -- Chapter 2: Encryption -- 2.1. Introduction -- 2.2. Brief Historical Background -- 2.3. How Encryption Technologies Work -- 2.4. Encryption Technologies -- 2.4.1. RSA (Rivest-Shamir-Adleman) -- 2.4.2. Blowfish Cipher -- 2.4.3. Data Encryption Standard (Des) -- 2.4.4. Triple Des (3Des or Tdes) -- 2.4.5. Twofish -- 2.5. Advantages and Disadvantages of Blowfish and RSA Encryption -- 2.5.1. Advantages -- 2.5.1.1. RSA -- 2.5.1.2. Blowfish -- 2.5.2. Disadvantages -- 2.5.2.1. RSA -- 2.5.2.2. Blowfish -- 2.6. Which Products Use Encryptions -- 2.6.1. Products Using Blowfish -- 2.6.2. Products Using RSA -- 2.7. Conclusion -- Chapter 3: Authentication -- 3.1. Introduction -- 3.2. Brief Historical Background -- 3.3. How Authentication Technologies Work -- 3.3.1. Secret Knowledge-Based Authentication -- 3.3.1.1. Personal Identification Number (PIN) and Password -- 3.3.1.2. Cognitive Knowledge Question -- 3.3.1.3. Pattern and Graphical Password -- 3.3.2. Token-Based Approach -- 3.3.3. Biometrics -- 3.3.4. Compound Authentication -- 3.3.5. Storing Passwords and Usernames -- 3.4. Authentication Technologies -- 3.5. Advantages and Disadvantages of Authentication Technoglogies -- 3.5.1. Advantages -- 3.5.1.1. Personal Identification Number (PIN) and Password Approach -- 3.5.1.2. Cognitive Knowledge Question (CKQ) -- 3.5.1.3. Pattern and Graphical Password -- 3.5.1.4. Token-Based Passwords -- 3.5.1.5. Biometric Authentication -- 3.5.1.6. Compound Authentication -- 3.5.2. Disadvantages -- 3.5.2.1. Personal Identification Number (PIN) and Password Approach</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.5.2.2. Cognitive Knowledge Question -- 3.5.2.3. Pattern and Graphical Passwords -- 3.5.2.4. Token-Based One-Time Passwords (OTP) -- 3.5.2.5. Biometric Authentication -- 3.5.2.6. Compound Authentication -- 3.6. What Products Use Authentications -- 3.7. Conclusion -- Chapter 4: Biometrics -- 4.1. Introduction -- 4.2. Brief Historical Background -- 4.3. How Biometric Technologies Work -- 4.3.1. Palm -- 4.3.2. Fingerprints -- 4.3.2.1. Optical Scanners -- 4.3.2.2. Capacitive Scanners -- 4.3.2.3. Ultrasonic Scanners -- 4.3.3. Face -- 4.3.4. IRIS -- 4.3.5. Voice -- 4.4. Biometric Technologies -- 4.5. Biometric Traits Comparison -- 4.6. Advantages and Disadvantages of Biometric Technologies -- 4.6.1. Advantages of Using Biometrics -- 4.6.2. Disadvantages of Using Biometrics -- 4.7. What Products Use Biometrics -- 4.7.1. Cars -- 4.7.2. Banking -- 4.7.3. Health Care -- 4.7.4. Food and Beverages -- 4.7.5. Border Control -- 4.7.6. Education -- 4.8. Conclusion -- Chapter 5: Firewall Technologies -- 5.1. Introduction -- 5.2. Brief Historical Background -- 5.3. How Firewall Technologies Work -- 5.4. Firewall Technologies -- 5.4.1. Stateless Firewalls or Packet-Filtering -- 5.4.2. Stateful Firewalls or Dynamic Packet Inspection -- 5.4.3. Application Proxy/Proxy Server Firewalls -- 5.4.4. Cloud Firewalls -- 5.5. Advantages and Disadvantages of Firewall Technologies -- 5.5.1. Advantages -- 5.5.2. Disadvantages -- 5.6. Conclusion -- Chapter 6: Virus Detection -- 6.1. Introduction -- 6.2. Brief Historical Background -- 6.3. How Virus Detection Technologies Work -- 6.3.1. Virus Scanning and Detection Process -- 6.4. Virus Detection Technologies -- 6.4.1. Sandbox Detection -- 6.4.2. Data Mining Techniques -- 6.4.3. Signature-Based Detection -- 6.4.4. Heuristic Detection -- 6.4.5. Real-Time Protection -- 6.5. Advantages and Disadvantages of Virus Detection Technologies</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6.5.1. Advantages -- 6.5.2. Disadvantages -- 6.6. Approaches Used in Virus Detection -- 6.7. Conclusion -- Chapter 7: Phishing Detection -- 7.1. Introduction -- 7.2. Brief Historical Background -- 7.3. How Phishing Detection Technologies Work -- 7.4. Phishing Detection Technologies -- 7.4.1. Visual Similarity-Based Phishing Detection -- 7.4.2. Blacklist-Based Phishing Detection -- 7.4.3. Web Crawling-Based Phishing Attack Detection -- 7.5. Advantages and Disadvantages of Phishing Detection Technologies -- 7.5.1. Advantages -- 7.5.1.1. Visual Similarity-Based Phishing Detection -- 7.5.1.2. Blacklist-Based Phishing Detection -- 7.5.1.3. Web Crawling-Based Phishing Attack Detection -- 7.5.2. Disadvantages -- 7.5.2.1. Visual Similarity-Based Phishing Detection -- 7.5.2.2. Blacklist-Based Phishing Detection -- 7.5.2.3. Web Crawling-Based Phishing Attack Detection -- 7.6. What Products Use Phishing Detection -- 7.6.1. Blacklist-Based Phishing Detection -- 7.7. Conclusion -- Chapter 8: Endpoint Protection -- 8.1. Introduction -- 8.2. Brief Historical Background -- 8.2.1. Traditional Antivirus -- 8.2.2. Endpoint Detection and Response (Edr) -- 8.2.3. Next-Generation Antivirus Software (NGAV) -- 8.2.4. Operating System (OS) Centric Security -- 8.3. How Endpoint Protection Technologies Work -- 8.3.1. Antivirus -- 8.3.1.1. Signature -- 8.3.1.2. Behavioral Detection -- 8.3.1.3. Machine Learning -- 8.3.2. Secure Email Gateways (Segs) -- 8.4. Endpoint Protection Technologies -- 8.4.1. Antivirus Solutions -- 8.4.2. Endpoint Detection and Response -- 8.4.3. Secure Email Gateways -- 8.5. Advantages and Disadvantages of Endpoint Protection Technologies -- 8.5.1. Antivirus Solutions -- 8.5.1.1. Advantages -- 8.5.1.2. Disadvantages -- 8.5.2. Endpoint Detection and Response -- 8.5.2.1. Advantages -- 8.5.2.2. Disadvantages -- 8.5.3. Secure Email Gateways</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8.5.3.1. Advantages -- 8.5.3.2. Disadvantages -- 8.6. What Products Use Endpoint Protection -- 8.6.1. Antivirus Solutions -- 8.6.2. Endpoint Detection and Response -- 8.6.3. Secure Email Gateways -- 8.7. Conclusion -- Chapter 9: Malware Protection Technology -- 9.1. Introduction -- 9.2. Brief Historical Background -- 9.3. How Malware Protection Technologies Work -- 9.3.1. Heuristic Analysis -- 9.3.2. Signature-Based Safety -- 9.3.3. Host-Based Intrusion Prevention Systems -- 9.4. Malware Protection Technologies -- 9.4.1. Main Category of Malware Detection Technology -- 9.4.1.1. Heuristic Analysis -- 9.4.1.2. Signature-Based Security -- 9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS) -- 9.5. Advantages and Disadvantages of Malware Protection -- 9.5.1. Advantages -- 9.5.1.1. Heuristic Analysis -- 9.5.1.2. Signature-Based Protection -- 9.5.1.3. Host-Based Intrusion Prevention Systems -- 9.5.2. Disadvantages -- 9.5.2.1. Heuristic Analysis -- 9.5.2.2. Signature-Based Protection -- 9.5.2.3. Host-Based Intrusion Prevention Systems -- 9.6. What Products Use Malware Protection -- 9.7. Conclusion -- Chapter 10: The Internet of Things (IoT) -- 10.1. Introduction -- 10.2. Brief Historical Background -- 10.3. How IoT Technologies Work -- 10.3.1. End-to-End Platform -- 10.3.2. Connectivity Platform -- 10.3.3. Cloud and Data Platforms -- 10.4. Iot Security Technologies -- 10.4.1. Securing IoT Devices -- 10.4.2. Smart Device Protection Technologies -- 10.4.2.1. Host Identity Protocol (HIP) -- 10.4.2.2. Hip Diet Exchange -- 10.4.2.3. Intrusion Detection and Mitigation Framework -- 10.4.2.4. Intrusion Detection System -- 10.4.2.5. Openflow -- 10.4.2.6. Software-Defined Networking -- 10.5. Advantages and Disadvantages of IoT Security Technologies -- 10.5.1. Advantages -- 10.5.2. Disadvantages -- 10.6. What Products Use IoT Technologies -- 10.7. Conclusion</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 11: Network Security -- 11.1. Introduction -- 11.2. Brief Historical Background -- 11.3. How Network Security Technologies Work -- 11.3.1. Firewall -- 11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention -- 11.3.3. Wi-Fi Protected Access 3 (WPA3) -- 11.4. Network Security Technologies -- 11.4.1. Firewalls -- 11.4.2. Email Security -- 11.4.3. Antivirus and Antimalware Software -- 11.4.4. Virtual Private Network (VPN) -- 11.4.5. Intrusion Prevention Systems (IDS) -- 11.5. Advantages and Disadvantages of Network Security -- 11.5.1. Advantages of Network Security -- 11.5.2. Disadvantages of Network Security -- 11.6. Which Products Use Network Security -- 11.6.1. Banks/Financial Institutions -- 11.6.2. Hospitals/Medical Institutions -- 11.6.3. Cloud Computing -- 11.6.4. Use of Network Security Technologies -- 11.6.5. Firewalls -- 11.6.6. Antivirus -- 11.6.7. Security Information and Event Management -- 11.7. Conclusion -- Chapter 12: Location Tracking -- 12.1. Introduction -- 12.2. Brief Historical Background -- 12.3. How Location Tracking Technologies Work -- 12.3.1. Uses of GPS Technology -- 12.4. Location Tracking Technologies -- 12.4.1. GPS Technology -- 12.4.2. Radio Frequency Identification -- 12.4.3. Internet Tracking -- 12.4.4. Advantages and Disadvantages of Location Tracking -- 12.4.4.1. Advantages of Location Tracking -- 12.4.4.2. Disadvantages of Location Tracking -- 12.5. Which Products Use Location Tracking -- 12.6. Conclusion -- Chapter 13: Surveillance -- 13.1. Introduction -- 13.2. Brief Historical Background -- 13.3. How Surveillance Technology Works -- 13.3.1. Video Surveillance and Crime -- 13.4. Surveillance Technologies -- 13.4.1. Computer -- 13.4.2. Telephones -- 13.4.3. Aerial Surveillance -- 13.5. Advantages and Disadvantages of Surveillance Technologies -- 13.5.1. Advantages -- 13.5.2. Disadvantages</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13.6. Which Products Use Surveillance</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Moallem, Abbas</subfield><subfield code="t">Understanding Cybersecurity Technologies</subfield><subfield code="d">Milton : Taylor & Francis Group,c2021</subfield><subfield code="z">9780367457457</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/9781003038429</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">TUM_PDA_PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033601815</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6796716</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003038429</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048221076 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:32Z |
indexdate | 2024-07-10T09:32:24Z |
institution | BVB |
isbn | 9781000506174 9781003038429 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033601815 |
oclc_num | 1283859672 |
open_access_boolean | |
owner | DE-1050 DE-573 |
owner_facet | DE-1050 DE-573 |
physical | 1 Online-Ressource (xxii, 202 Seiten) |
psigel | ZDB-30-PQE ZDB-7-TFC TUM_PDA_PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Taylor & Francis Group |
record_format | marc |
series2 | The Human Element in Smart and Intelligent Systems Ser |
spelling | Moallem, Abbas Verfasser aut Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools Milton Taylor & Francis Group 2021 ©2022 1 Online-Ressource (xxii, 202 Seiten) txt rdacontent c rdamedia cr rdacarrier The Human Element in Smart and Intelligent Systems Ser Description based on publisher supplied metadata and other sources Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Author -- List of Figures -- Chapter 1: Cybersecurity Technologies Classification -- 1.1. Introduction -- 1.2. Different Categories of Cyber Technologies -- 1.3. Technology Classification -- Chapter 2: Encryption -- 2.1. Introduction -- 2.2. Brief Historical Background -- 2.3. How Encryption Technologies Work -- 2.4. Encryption Technologies -- 2.4.1. RSA (Rivest-Shamir-Adleman) -- 2.4.2. Blowfish Cipher -- 2.4.3. Data Encryption Standard (Des) -- 2.4.4. Triple Des (3Des or Tdes) -- 2.4.5. Twofish -- 2.5. Advantages and Disadvantages of Blowfish and RSA Encryption -- 2.5.1. Advantages -- 2.5.1.1. RSA -- 2.5.1.2. Blowfish -- 2.5.2. Disadvantages -- 2.5.2.1. RSA -- 2.5.2.2. Blowfish -- 2.6. Which Products Use Encryptions -- 2.6.1. Products Using Blowfish -- 2.6.2. Products Using RSA -- 2.7. Conclusion -- Chapter 3: Authentication -- 3.1. Introduction -- 3.2. Brief Historical Background -- 3.3. How Authentication Technologies Work -- 3.3.1. Secret Knowledge-Based Authentication -- 3.3.1.1. Personal Identification Number (PIN) and Password -- 3.3.1.2. Cognitive Knowledge Question -- 3.3.1.3. Pattern and Graphical Password -- 3.3.2. Token-Based Approach -- 3.3.3. Biometrics -- 3.3.4. Compound Authentication -- 3.3.5. Storing Passwords and Usernames -- 3.4. Authentication Technologies -- 3.5. Advantages and Disadvantages of Authentication Technoglogies -- 3.5.1. Advantages -- 3.5.1.1. Personal Identification Number (PIN) and Password Approach -- 3.5.1.2. Cognitive Knowledge Question (CKQ) -- 3.5.1.3. Pattern and Graphical Password -- 3.5.1.4. Token-Based Passwords -- 3.5.1.5. Biometric Authentication -- 3.5.1.6. Compound Authentication -- 3.5.2. Disadvantages -- 3.5.2.1. Personal Identification Number (PIN) and Password Approach 3.5.2.2. Cognitive Knowledge Question -- 3.5.2.3. Pattern and Graphical Passwords -- 3.5.2.4. Token-Based One-Time Passwords (OTP) -- 3.5.2.5. Biometric Authentication -- 3.5.2.6. Compound Authentication -- 3.6. What Products Use Authentications -- 3.7. Conclusion -- Chapter 4: Biometrics -- 4.1. Introduction -- 4.2. Brief Historical Background -- 4.3. How Biometric Technologies Work -- 4.3.1. Palm -- 4.3.2. Fingerprints -- 4.3.2.1. Optical Scanners -- 4.3.2.2. Capacitive Scanners -- 4.3.2.3. Ultrasonic Scanners -- 4.3.3. Face -- 4.3.4. IRIS -- 4.3.5. Voice -- 4.4. Biometric Technologies -- 4.5. Biometric Traits Comparison -- 4.6. Advantages and Disadvantages of Biometric Technologies -- 4.6.1. Advantages of Using Biometrics -- 4.6.2. Disadvantages of Using Biometrics -- 4.7. What Products Use Biometrics -- 4.7.1. Cars -- 4.7.2. Banking -- 4.7.3. Health Care -- 4.7.4. Food and Beverages -- 4.7.5. Border Control -- 4.7.6. Education -- 4.8. Conclusion -- Chapter 5: Firewall Technologies -- 5.1. Introduction -- 5.2. Brief Historical Background -- 5.3. How Firewall Technologies Work -- 5.4. Firewall Technologies -- 5.4.1. Stateless Firewalls or Packet-Filtering -- 5.4.2. Stateful Firewalls or Dynamic Packet Inspection -- 5.4.3. Application Proxy/Proxy Server Firewalls -- 5.4.4. Cloud Firewalls -- 5.5. Advantages and Disadvantages of Firewall Technologies -- 5.5.1. Advantages -- 5.5.2. Disadvantages -- 5.6. Conclusion -- Chapter 6: Virus Detection -- 6.1. Introduction -- 6.2. Brief Historical Background -- 6.3. How Virus Detection Technologies Work -- 6.3.1. Virus Scanning and Detection Process -- 6.4. Virus Detection Technologies -- 6.4.1. Sandbox Detection -- 6.4.2. Data Mining Techniques -- 6.4.3. Signature-Based Detection -- 6.4.4. Heuristic Detection -- 6.4.5. Real-Time Protection -- 6.5. Advantages and Disadvantages of Virus Detection Technologies 6.5.1. Advantages -- 6.5.2. Disadvantages -- 6.6. Approaches Used in Virus Detection -- 6.7. Conclusion -- Chapter 7: Phishing Detection -- 7.1. Introduction -- 7.2. Brief Historical Background -- 7.3. How Phishing Detection Technologies Work -- 7.4. Phishing Detection Technologies -- 7.4.1. Visual Similarity-Based Phishing Detection -- 7.4.2. Blacklist-Based Phishing Detection -- 7.4.3. Web Crawling-Based Phishing Attack Detection -- 7.5. Advantages and Disadvantages of Phishing Detection Technologies -- 7.5.1. Advantages -- 7.5.1.1. Visual Similarity-Based Phishing Detection -- 7.5.1.2. Blacklist-Based Phishing Detection -- 7.5.1.3. Web Crawling-Based Phishing Attack Detection -- 7.5.2. Disadvantages -- 7.5.2.1. Visual Similarity-Based Phishing Detection -- 7.5.2.2. Blacklist-Based Phishing Detection -- 7.5.2.3. Web Crawling-Based Phishing Attack Detection -- 7.6. What Products Use Phishing Detection -- 7.6.1. Blacklist-Based Phishing Detection -- 7.7. Conclusion -- Chapter 8: Endpoint Protection -- 8.1. Introduction -- 8.2. Brief Historical Background -- 8.2.1. Traditional Antivirus -- 8.2.2. Endpoint Detection and Response (Edr) -- 8.2.3. Next-Generation Antivirus Software (NGAV) -- 8.2.4. Operating System (OS) Centric Security -- 8.3. How Endpoint Protection Technologies Work -- 8.3.1. Antivirus -- 8.3.1.1. Signature -- 8.3.1.2. Behavioral Detection -- 8.3.1.3. Machine Learning -- 8.3.2. Secure Email Gateways (Segs) -- 8.4. Endpoint Protection Technologies -- 8.4.1. Antivirus Solutions -- 8.4.2. Endpoint Detection and Response -- 8.4.3. Secure Email Gateways -- 8.5. Advantages and Disadvantages of Endpoint Protection Technologies -- 8.5.1. Antivirus Solutions -- 8.5.1.1. Advantages -- 8.5.1.2. Disadvantages -- 8.5.2. Endpoint Detection and Response -- 8.5.2.1. Advantages -- 8.5.2.2. Disadvantages -- 8.5.3. Secure Email Gateways 8.5.3.1. Advantages -- 8.5.3.2. Disadvantages -- 8.6. What Products Use Endpoint Protection -- 8.6.1. Antivirus Solutions -- 8.6.2. Endpoint Detection and Response -- 8.6.3. Secure Email Gateways -- 8.7. Conclusion -- Chapter 9: Malware Protection Technology -- 9.1. Introduction -- 9.2. Brief Historical Background -- 9.3. How Malware Protection Technologies Work -- 9.3.1. Heuristic Analysis -- 9.3.2. Signature-Based Safety -- 9.3.3. Host-Based Intrusion Prevention Systems -- 9.4. Malware Protection Technologies -- 9.4.1. Main Category of Malware Detection Technology -- 9.4.1.1. Heuristic Analysis -- 9.4.1.2. Signature-Based Security -- 9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS) -- 9.5. Advantages and Disadvantages of Malware Protection -- 9.5.1. Advantages -- 9.5.1.1. Heuristic Analysis -- 9.5.1.2. Signature-Based Protection -- 9.5.1.3. Host-Based Intrusion Prevention Systems -- 9.5.2. Disadvantages -- 9.5.2.1. Heuristic Analysis -- 9.5.2.2. Signature-Based Protection -- 9.5.2.3. Host-Based Intrusion Prevention Systems -- 9.6. What Products Use Malware Protection -- 9.7. Conclusion -- Chapter 10: The Internet of Things (IoT) -- 10.1. Introduction -- 10.2. Brief Historical Background -- 10.3. How IoT Technologies Work -- 10.3.1. End-to-End Platform -- 10.3.2. Connectivity Platform -- 10.3.3. Cloud and Data Platforms -- 10.4. Iot Security Technologies -- 10.4.1. Securing IoT Devices -- 10.4.2. Smart Device Protection Technologies -- 10.4.2.1. Host Identity Protocol (HIP) -- 10.4.2.2. Hip Diet Exchange -- 10.4.2.3. Intrusion Detection and Mitigation Framework -- 10.4.2.4. Intrusion Detection System -- 10.4.2.5. Openflow -- 10.4.2.6. Software-Defined Networking -- 10.5. Advantages and Disadvantages of IoT Security Technologies -- 10.5.1. Advantages -- 10.5.2. Disadvantages -- 10.6. What Products Use IoT Technologies -- 10.7. Conclusion Chapter 11: Network Security -- 11.1. Introduction -- 11.2. Brief Historical Background -- 11.3. How Network Security Technologies Work -- 11.3.1. Firewall -- 11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention -- 11.3.3. Wi-Fi Protected Access 3 (WPA3) -- 11.4. Network Security Technologies -- 11.4.1. Firewalls -- 11.4.2. Email Security -- 11.4.3. Antivirus and Antimalware Software -- 11.4.4. Virtual Private Network (VPN) -- 11.4.5. Intrusion Prevention Systems (IDS) -- 11.5. Advantages and Disadvantages of Network Security -- 11.5.1. Advantages of Network Security -- 11.5.2. Disadvantages of Network Security -- 11.6. Which Products Use Network Security -- 11.6.1. Banks/Financial Institutions -- 11.6.2. Hospitals/Medical Institutions -- 11.6.3. Cloud Computing -- 11.6.4. Use of Network Security Technologies -- 11.6.5. Firewalls -- 11.6.6. Antivirus -- 11.6.7. Security Information and Event Management -- 11.7. Conclusion -- Chapter 12: Location Tracking -- 12.1. Introduction -- 12.2. Brief Historical Background -- 12.3. How Location Tracking Technologies Work -- 12.3.1. Uses of GPS Technology -- 12.4. Location Tracking Technologies -- 12.4.1. GPS Technology -- 12.4.2. Radio Frequency Identification -- 12.4.3. Internet Tracking -- 12.4.4. Advantages and Disadvantages of Location Tracking -- 12.4.4.1. Advantages of Location Tracking -- 12.4.4.2. Disadvantages of Location Tracking -- 12.5. Which Products Use Location Tracking -- 12.6. Conclusion -- Chapter 13: Surveillance -- 13.1. Introduction -- 13.2. Brief Historical Background -- 13.3. How Surveillance Technology Works -- 13.3.1. Video Surveillance and Crime -- 13.4. Surveillance Technologies -- 13.4.1. Computer -- 13.4.2. Telephones -- 13.4.3. Aerial Surveillance -- 13.5. Advantages and Disadvantages of Surveillance Technologies -- 13.5.1. Advantages -- 13.5.2. Disadvantages 13.6. Which Products Use Surveillance Erscheint auch als Druck-Ausgabe Moallem, Abbas Understanding Cybersecurity Technologies Milton : Taylor & Francis Group,c2021 9780367457457 https://doi.org/10.1201/9781003038429 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Moallem, Abbas Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Author -- List of Figures -- Chapter 1: Cybersecurity Technologies Classification -- 1.1. Introduction -- 1.2. Different Categories of Cyber Technologies -- 1.3. Technology Classification -- Chapter 2: Encryption -- 2.1. Introduction -- 2.2. Brief Historical Background -- 2.3. How Encryption Technologies Work -- 2.4. Encryption Technologies -- 2.4.1. RSA (Rivest-Shamir-Adleman) -- 2.4.2. Blowfish Cipher -- 2.4.3. Data Encryption Standard (Des) -- 2.4.4. Triple Des (3Des or Tdes) -- 2.4.5. Twofish -- 2.5. Advantages and Disadvantages of Blowfish and RSA Encryption -- 2.5.1. Advantages -- 2.5.1.1. RSA -- 2.5.1.2. Blowfish -- 2.5.2. Disadvantages -- 2.5.2.1. RSA -- 2.5.2.2. Blowfish -- 2.6. Which Products Use Encryptions -- 2.6.1. Products Using Blowfish -- 2.6.2. Products Using RSA -- 2.7. Conclusion -- Chapter 3: Authentication -- 3.1. Introduction -- 3.2. Brief Historical Background -- 3.3. How Authentication Technologies Work -- 3.3.1. Secret Knowledge-Based Authentication -- 3.3.1.1. Personal Identification Number (PIN) and Password -- 3.3.1.2. Cognitive Knowledge Question -- 3.3.1.3. Pattern and Graphical Password -- 3.3.2. Token-Based Approach -- 3.3.3. Biometrics -- 3.3.4. Compound Authentication -- 3.3.5. Storing Passwords and Usernames -- 3.4. Authentication Technologies -- 3.5. Advantages and Disadvantages of Authentication Technoglogies -- 3.5.1. Advantages -- 3.5.1.1. Personal Identification Number (PIN) and Password Approach -- 3.5.1.2. Cognitive Knowledge Question (CKQ) -- 3.5.1.3. Pattern and Graphical Password -- 3.5.1.4. Token-Based Passwords -- 3.5.1.5. Biometric Authentication -- 3.5.1.6. Compound Authentication -- 3.5.2. Disadvantages -- 3.5.2.1. Personal Identification Number (PIN) and Password Approach 3.5.2.2. Cognitive Knowledge Question -- 3.5.2.3. Pattern and Graphical Passwords -- 3.5.2.4. Token-Based One-Time Passwords (OTP) -- 3.5.2.5. Biometric Authentication -- 3.5.2.6. Compound Authentication -- 3.6. What Products Use Authentications -- 3.7. Conclusion -- Chapter 4: Biometrics -- 4.1. Introduction -- 4.2. Brief Historical Background -- 4.3. How Biometric Technologies Work -- 4.3.1. Palm -- 4.3.2. Fingerprints -- 4.3.2.1. Optical Scanners -- 4.3.2.2. Capacitive Scanners -- 4.3.2.3. Ultrasonic Scanners -- 4.3.3. Face -- 4.3.4. IRIS -- 4.3.5. Voice -- 4.4. Biometric Technologies -- 4.5. Biometric Traits Comparison -- 4.6. Advantages and Disadvantages of Biometric Technologies -- 4.6.1. Advantages of Using Biometrics -- 4.6.2. Disadvantages of Using Biometrics -- 4.7. What Products Use Biometrics -- 4.7.1. Cars -- 4.7.2. Banking -- 4.7.3. Health Care -- 4.7.4. Food and Beverages -- 4.7.5. Border Control -- 4.7.6. Education -- 4.8. Conclusion -- Chapter 5: Firewall Technologies -- 5.1. Introduction -- 5.2. Brief Historical Background -- 5.3. How Firewall Technologies Work -- 5.4. Firewall Technologies -- 5.4.1. Stateless Firewalls or Packet-Filtering -- 5.4.2. Stateful Firewalls or Dynamic Packet Inspection -- 5.4.3. Application Proxy/Proxy Server Firewalls -- 5.4.4. Cloud Firewalls -- 5.5. Advantages and Disadvantages of Firewall Technologies -- 5.5.1. Advantages -- 5.5.2. Disadvantages -- 5.6. Conclusion -- Chapter 6: Virus Detection -- 6.1. Introduction -- 6.2. Brief Historical Background -- 6.3. How Virus Detection Technologies Work -- 6.3.1. Virus Scanning and Detection Process -- 6.4. Virus Detection Technologies -- 6.4.1. Sandbox Detection -- 6.4.2. Data Mining Techniques -- 6.4.3. Signature-Based Detection -- 6.4.4. Heuristic Detection -- 6.4.5. Real-Time Protection -- 6.5. Advantages and Disadvantages of Virus Detection Technologies 6.5.1. Advantages -- 6.5.2. Disadvantages -- 6.6. Approaches Used in Virus Detection -- 6.7. Conclusion -- Chapter 7: Phishing Detection -- 7.1. Introduction -- 7.2. Brief Historical Background -- 7.3. How Phishing Detection Technologies Work -- 7.4. Phishing Detection Technologies -- 7.4.1. Visual Similarity-Based Phishing Detection -- 7.4.2. Blacklist-Based Phishing Detection -- 7.4.3. Web Crawling-Based Phishing Attack Detection -- 7.5. Advantages and Disadvantages of Phishing Detection Technologies -- 7.5.1. Advantages -- 7.5.1.1. Visual Similarity-Based Phishing Detection -- 7.5.1.2. Blacklist-Based Phishing Detection -- 7.5.1.3. Web Crawling-Based Phishing Attack Detection -- 7.5.2. Disadvantages -- 7.5.2.1. Visual Similarity-Based Phishing Detection -- 7.5.2.2. Blacklist-Based Phishing Detection -- 7.5.2.3. Web Crawling-Based Phishing Attack Detection -- 7.6. What Products Use Phishing Detection -- 7.6.1. Blacklist-Based Phishing Detection -- 7.7. Conclusion -- Chapter 8: Endpoint Protection -- 8.1. Introduction -- 8.2. Brief Historical Background -- 8.2.1. Traditional Antivirus -- 8.2.2. Endpoint Detection and Response (Edr) -- 8.2.3. Next-Generation Antivirus Software (NGAV) -- 8.2.4. Operating System (OS) Centric Security -- 8.3. How Endpoint Protection Technologies Work -- 8.3.1. Antivirus -- 8.3.1.1. Signature -- 8.3.1.2. Behavioral Detection -- 8.3.1.3. Machine Learning -- 8.3.2. Secure Email Gateways (Segs) -- 8.4. Endpoint Protection Technologies -- 8.4.1. Antivirus Solutions -- 8.4.2. Endpoint Detection and Response -- 8.4.3. Secure Email Gateways -- 8.5. Advantages and Disadvantages of Endpoint Protection Technologies -- 8.5.1. Antivirus Solutions -- 8.5.1.1. Advantages -- 8.5.1.2. Disadvantages -- 8.5.2. Endpoint Detection and Response -- 8.5.2.1. Advantages -- 8.5.2.2. Disadvantages -- 8.5.3. Secure Email Gateways 8.5.3.1. Advantages -- 8.5.3.2. Disadvantages -- 8.6. What Products Use Endpoint Protection -- 8.6.1. Antivirus Solutions -- 8.6.2. Endpoint Detection and Response -- 8.6.3. Secure Email Gateways -- 8.7. Conclusion -- Chapter 9: Malware Protection Technology -- 9.1. Introduction -- 9.2. Brief Historical Background -- 9.3. How Malware Protection Technologies Work -- 9.3.1. Heuristic Analysis -- 9.3.2. Signature-Based Safety -- 9.3.3. Host-Based Intrusion Prevention Systems -- 9.4. Malware Protection Technologies -- 9.4.1. Main Category of Malware Detection Technology -- 9.4.1.1. Heuristic Analysis -- 9.4.1.2. Signature-Based Security -- 9.4.1.3. Host-Based Intrusion-Prevention Systems (HIPS) -- 9.5. Advantages and Disadvantages of Malware Protection -- 9.5.1. Advantages -- 9.5.1.1. Heuristic Analysis -- 9.5.1.2. Signature-Based Protection -- 9.5.1.3. Host-Based Intrusion Prevention Systems -- 9.5.2. Disadvantages -- 9.5.2.1. Heuristic Analysis -- 9.5.2.2. Signature-Based Protection -- 9.5.2.3. Host-Based Intrusion Prevention Systems -- 9.6. What Products Use Malware Protection -- 9.7. Conclusion -- Chapter 10: The Internet of Things (IoT) -- 10.1. Introduction -- 10.2. Brief Historical Background -- 10.3. How IoT Technologies Work -- 10.3.1. End-to-End Platform -- 10.3.2. Connectivity Platform -- 10.3.3. Cloud and Data Platforms -- 10.4. Iot Security Technologies -- 10.4.1. Securing IoT Devices -- 10.4.2. Smart Device Protection Technologies -- 10.4.2.1. Host Identity Protocol (HIP) -- 10.4.2.2. Hip Diet Exchange -- 10.4.2.3. Intrusion Detection and Mitigation Framework -- 10.4.2.4. Intrusion Detection System -- 10.4.2.5. Openflow -- 10.4.2.6. Software-Defined Networking -- 10.5. Advantages and Disadvantages of IoT Security Technologies -- 10.5.1. Advantages -- 10.5.2. Disadvantages -- 10.6. What Products Use IoT Technologies -- 10.7. Conclusion Chapter 11: Network Security -- 11.1. Introduction -- 11.2. Brief Historical Background -- 11.3. How Network Security Technologies Work -- 11.3.1. Firewall -- 11.3.2. Intrusion Detection System (IDS) and Intrusion Prevention -- 11.3.3. Wi-Fi Protected Access 3 (WPA3) -- 11.4. Network Security Technologies -- 11.4.1. Firewalls -- 11.4.2. Email Security -- 11.4.3. Antivirus and Antimalware Software -- 11.4.4. Virtual Private Network (VPN) -- 11.4.5. Intrusion Prevention Systems (IDS) -- 11.5. Advantages and Disadvantages of Network Security -- 11.5.1. Advantages of Network Security -- 11.5.2. Disadvantages of Network Security -- 11.6. Which Products Use Network Security -- 11.6.1. Banks/Financial Institutions -- 11.6.2. Hospitals/Medical Institutions -- 11.6.3. Cloud Computing -- 11.6.4. Use of Network Security Technologies -- 11.6.5. Firewalls -- 11.6.6. Antivirus -- 11.6.7. Security Information and Event Management -- 11.7. Conclusion -- Chapter 12: Location Tracking -- 12.1. Introduction -- 12.2. Brief Historical Background -- 12.3. How Location Tracking Technologies Work -- 12.3.1. Uses of GPS Technology -- 12.4. Location Tracking Technologies -- 12.4.1. GPS Technology -- 12.4.2. Radio Frequency Identification -- 12.4.3. Internet Tracking -- 12.4.4. Advantages and Disadvantages of Location Tracking -- 12.4.4.1. Advantages of Location Tracking -- 12.4.4.2. Disadvantages of Location Tracking -- 12.5. Which Products Use Location Tracking -- 12.6. Conclusion -- Chapter 13: Surveillance -- 13.1. Introduction -- 13.2. Brief Historical Background -- 13.3. How Surveillance Technology Works -- 13.3.1. Video Surveillance and Crime -- 13.4. Surveillance Technologies -- 13.4.1. Computer -- 13.4.2. Telephones -- 13.4.3. Aerial Surveillance -- 13.5. Advantages and Disadvantages of Surveillance Technologies -- 13.5.1. Advantages -- 13.5.2. Disadvantages 13.6. Which Products Use Surveillance |
title | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_auth | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_exact_search | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_exact_search_txtP | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_full | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_fullStr | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_full_unstemmed | Understanding Cybersecurity Technologies A Guide to Selecting the Right Cybersecurity Tools |
title_short | Understanding Cybersecurity Technologies |
title_sort | understanding cybersecurity technologies a guide to selecting the right cybersecurity tools |
title_sub | A Guide to Selecting the Right Cybersecurity Tools |
url | https://doi.org/10.1201/9781003038429 |
work_keys_str_mv | AT moallemabbas understandingcybersecuritytechnologiesaguidetoselectingtherightcybersecuritytools |