Perspectives on ethical hacking and penetration testing:
Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges,...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2023]
|
Schriftenreihe: | Advances in computational intelligence and robotics (ACIR) book series
Premier reference source |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xx, 445 Seiten Illustrationen |
ISBN: | 9781668482186 9781668482193 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049505331 | ||
003 | DE-604 | ||
005 | 20240325 | ||
007 | t | ||
008 | 240117s2023 a||| |||| 00||| eng d | ||
010 | |a 2022062311 | ||
020 | |a 9781668482186 |c h/c |9 978-1-66848-218-6 | ||
020 | |a 9781668482193 |c s/c |9 978-1-66848-219-3 | ||
024 | 3 | |a 9781668482186 | |
035 | |a (ELiSA)ELiSA-9781668482186 | ||
035 | |a (OCoLC)1429559846 | ||
035 | |a (DE-599)KXP1847512135 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Perspectives on ethical hacking and penetration testing |c Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
264 | 1 | |a Hershey, PA |b IGI Global |c [2023] | |
300 | |a xx, 445 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Advances in computational intelligence and robotics (ACIR) book series | |
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references and index | ||
520 | |a Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. | ||
650 | 7 | |a Penetration testing (Computer security) |2 DLC | |
650 | 7 | |a Computer crimes |x Prevention |2 DLC | |
650 | 0 | 7 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Computerkriminalität & Hacking | ||
653 | |a Bioethik, Tierethik | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kaushik, Keshav |0 (DE-588)1310505136 |4 edt | |
700 | 1 | |a Bhardwaj, Akashdeep |d 1971- |0 (DE-588)1284516636 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Perspectives on ethical hacking and penetration testing |d Hershey, Pennsylvania : IGI Global, publishers of timely knowledge, 2023 |h 1 Online-Ressource (xx, 445 Seiten) |z 9781668482209 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805071287690723328 |
---|---|
adam_text |
Table of Contents Preface. xvi Chapter 1 A Guide to Digital Forensic “Theoretical to Software-Based Investigations”. 1 Preeti Sharma, University of Petroleum and Energy Studies, India Manoj Kumar, University of Wollongong, Dubai, UAE Hitesh Kumar Sharma, University of Petroleum and Energy Studies, India Chapter 2 Attacks on Web Applications. 31 Ayushi Malik, University of Petroleum and Energy Studies, India Shagun Gehlot, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India Chapter 3 Demystifying Cyber Crimes. 63 Kritika, Government of India, India Chapter 4 Early Detection of Security Holes in the Network. 95 N. Ambika, St. Francis College, India Chapter 5 Introduction to Dark Web. 114 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Rahmeh Ibrahim, Princess Sumaya University for Technology, Jordan
Chapter 6 Introduction to Ransomware. 139 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Noor A. Jebril, Princess Sumaya University, Jordan Chapter 7 Demystifying Ransomware: Classification, Mechanism and Anatomy. 171 Aaeen Naushadahmad Aichi, Gujarat University, India Kiranbhai R. Dodiya, Gujarat University, India Chapter 8 loT in Real-Life: Applications, Security, and Hacking. 193 Pawan Whig, Vivekananda Institute of Professional Studies, India Kritika Puruhit, Jodhpur Institute of Engineering and Technology, India Piyush Kumar Gupta, Jamia Hamdard, India Pavika Sharma, Bhagwan Parshuram Institute of Technology, India Rahul Reddy Nadikattu, University of Cumbersome, USA Ashima Bhatnagar Bhatia, Vivekananda Institute of Professional Studies, India Chapter 9 Maintaining Cybersecurity Awareness in Large-Scale Organizations: A Pilot Study in a Public Institution. 212 Muhammed Aslan, Cankaya University, Turkey Tolga Pusatli, Cankaya University, Turkey Chapter 10 Network Security Breaches: Comprehension and Its Implications. 239 Yash Bansal, The NorthCap University, India Shilpa Mahajan, The NorthCap University, India Chapter 11 Penetration Testing Building Blocks. 255 Abhijeet Kumar, Independent Researcher, India Chapter 12 Penetration Testing Tools and
Techniques. 280 Abhijeet Kumar, Independent Researcher, India
Chapter 13 Social Engineering Attacks and Countermeasures. 307 Kshyamasagar Mahanta, Maharaja Sriram Chandra Bhanja Deo University, India Hima Bindu Maringanti, Maharaja Sriram Chandra Bhanja Deo University, India Chapter 14 Technological Trends and Recent Statistics of Dark Web. 338 Kamna Solanki, Maharshi Dayanand University, Rohtak, India Sandeep Dalal, Maharshi Dayanand University, Rohtak, India Chapter 15 Unraveling the Server: Mastering Server-Side Attacks for Ethical Hacking. 360 Aviral Srivastava, Amity University, Rajasthan, India Chapter 16 Wireless Hacking. 382 Shubh Gupta, University of Petroleum and Energy Studies, India Oroos Arshi, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India Compilation of References. 413 About the Contributors.437 Index.442
Detailed Table of Contents Preface. xvi Chapter 1 A Guide to Digital Forensic “Theoretical to Software-Based Investigations”. 1 Preeti Sharma, University of Petroleum and Energy Studies, India Manoj Kumar, University of Wollongong, Dubai, UAE Hitesh Kumar Sharma, University of Petroleum and Energy Studies, India A branch of forensic science called “digital forensics” deals with the utilization of digital data received, maintained, and conveyed by electronic devices as evidence in inquiries and legal proceedings. It is a growing field in computing that frequently necessitates the intelligent analysis of large amounts of complex data. Rapid advancements in computer science and information technology enable the development of novel techniques and software for digital investigations. Initially, much of the analysis software was unique and proprietary, but overtime, specialised analysis software for both the private and governmental sectors became available. The aim of this chapter is to deliver a comprehensive overview of digital forensics phases, applications, merits, and demerits and widely used software of the domain. The chapter also discusses legitimate and legal considerations, followed by the scope and role of artificial intelligence for solving complex problems of digital forensics. Chapter 2 Attacks on Web Applications. 31 Ayushi Malik, University of Petroleum
and Energy Studies, India Shagun Gehlot, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India Online applications hold sensitive data that is valuable, and hackers strive to identify weaknesses and exploit them in order to steal data, pose as users, or disrupt the application. Web applications are increasingly exposed to dangers and attack vectors that are more advanced. Additionally, theft of private information—such as user
credentials or billing information for credit cards—occurs frequently. Attackers initially concentrated on obtaining personal information that was accidentally exposed through poorly built or poorly protected web apps. Insecure design, security misconfiguration, vulnerable and outdated components, identification and authentication failures, etc. are some of the most prominent web application vulnerabilities that will be covered in this chapter. The authors are using countermeasures including fuzz testing, source code review, and encoding approaches to get around these vulnerabilities. As a result, this chapter offers information on the various attacks that website visitors who use web applications encounter. Chapter 3 Demystifying Cyber Crimes. 63 Kritika, Government of India, India With the National Cybercrime Reporting portal witnessing an increase of 15.3% increase in the cyber cases in second quarter of 2022, the post pandemic world has seen a tremendous rise in the number of cybercrime cases. The cases have increased many folds, 125% from 2021, and still continues beyond. The targets of crime are not limited to any age group and innocent children have not been spared. The exposure to online classes, conferences, meetings, etc. has opened the door to criminal activities in a humongous way. Thus, there comes the need for each and every one of us to be well aware of the recent practices that these criminals use and not fall into the clutches of these nefarious cyber criminals. Chapter 4
Early Detection of Security Holes in the Network. 95 N. Ambika, St. Francis College, India The previous method that has been suggested is to increase the automatic closing of security holes in networks that are vulnerable. This process is the amalgamation of various phases, which begin with collecting information and end with mitigating vulnerabilities. The network’s internal domain name is considered input in the proposed method for internal audit purposes. The operational services collect live IPs. Exploits are typically created to gain access to a system, enable the acquisition of administrative privileges, or launch denial-of-service attacks. Each exploit is configured and executed after the list of exploits for each service has been obtained. Whether the endeavor can effectively approach the framework, the moderation step is conjured, checking the sort of access got. The suggestion evaluates the incoming data using the knowledge set stored in its memory. It maintains a table detailing the IP address incomings. The guilty detection is increased by 27.6%, and the security is increased by 36.8% compared to previous work.
Chapter 5 Introduction to Dark Web. 114 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Rahmeh Ibrahim, Princess Sumaya University for Technology, Jordan Darknet is an overlay portion of the Internet network that can only be accessed using specific authorization using distinctively tailored communication protocols. Attackers usually exploit the darknet to threaten several world-wile users with different types of attack/intrusion vectors. In this chapter, we shed the light on the darknet network, concepts, elements, structure, and other aspects of darknet utilization. Specifically, this chapter will extend the elaboration on the darknet, the dark web components, the dark web access methods, the anonymity and confidentiality of the dark web, the dark web crimes, the cyber-attacks on the dark web, the malware on the dark web, the internet governance of dark web, the payment on the dark web, and the impacts of the dark web. This chapter will profound the knowledge of the dark web and provides more insights to readers about darknet attacks, malware, and their counter-measures. Chapter 6 Introduction to Ransomware. 139 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Noor A. Jebril, Princess Sumaya University, Jordan Ransomware can lock users’ information or resources (such as screens); hence, authorized users are blocked from retrieving their private data/assets.
Ransomware enciphers the victim’s plaintext data into ciphertext data; subsequently, the victim host can no longer decipher the ciphertext data to original plaintext data. To get back the plaintext data, the user will need the proper decryption key; therefore, the user needs to pay the ransom. In this chapter, the authors shed light on ransomware malware, concepts, elements, structure, and other aspects of ransomware utilization. Specifically, this chapter will extend the elaboration on the ransomware, the state-ofart ransomware, the ransomware lifecycle, the ransomware activation and encryption processes, the ransom request process, the payment and recovery, the ransomware types, recommendation for ransomware detection and prevention, and strategies for ransomware mitigation. Chapter 7 Demystifying Ransomware: Classification, Mechanism and Anatomy. 171 Aaeen Naushadahmad Aichi, Gujarat University, India Kiranbhai R. Dodiya, Gujarat University, India
Malware, classified as ransomware, encrypts data on a computer, preventing individuals from accessing it. The intruder then demands a ransom from the user for the password that unlocks the files. Recent cyberattacks against prominent corporate targets have increased the extensive media attention on ransomware. The primary reason for computer intrusions is financial gain. Ransomware targets individual owners of information, keeping their file systems captive until a ransom is paid, compared to malware, which permits criminals to steal valuable data and then use it throughout the digital marketplace. Ransomware’s terrifying complexity level heralds a paradigm shift in the cybercrime ecosystem. Ransomware has become more mysterious, with some latest forms working without ever connecting to the Internet. In this chapter, the authors will discuss the overview of ransomware, the history and development of ransomware, some of the famous cases, the anatomy of ransomware attacks, types of ransomware attack vectors, and the prevention of such kinds of attacks in cyberspace. Chapter 8 loT in Real-Life: Applications, Security, and Hacking. 193 Pawan Whig, Vivekananda Institute of Professional Studies, India Kritika Puruhit, Jodhpur Institute of Engineering and Technology, India Piyush Kumar Gupta, Jamia Hamdard, India Pavika Sharma, Bhagwan Parshuram Institute of Technology, India Rahul Reddy Nadikattu, University of Cumbersome, USA Ashima Bhatnagar Bhatia, Vivekananda Institute of Professional Studies, India Now, computers and smartphones have
become more powerful than internet connectivity. Every ‘smart’ device in our environment now aspires to use digital interventions to solve real-world problems. The buzz around loT is, of course, huge. This disturbing technology penetrates various industries, develops new loT applications, and connects all internet-enabled devices around us. One survey shows that 61 billion connected devices are expected to be available by 2025. But some of them shine more than others, in the mad rush of “newer” and “better” loT applications. The chapter aims to present a summary of the challenges in the applications that the internet of things must face in their research and development, which are to be explored in this book chapter. Chapter 9 Maintaining Cybersecurity Awareness in Large-Scale Organizations: A Pilot Study in a Public Institution. 212 Muhammed Aslan, Cankaya University, Turkey Tolga Pusatli, Cankaya University, Turkey
Research was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users’ cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. Chapter 10 Network Security Breaches: Comprehension and Its Implications. 239 Yash Bansal, The NorthCap University, India Shilpa Mahajan, The NorthCap University, India Threats on communication networks are proliferating. It is surprising that more than half of Indian organizations have experienced a breach in 2022. These breaches can occur due to various reasons, such as human error, software vulnerabilities, or malicious attacks. Tech executives frequently commit the sin of being unready for
network data breaches despite the early indications. The consequences of a network security breach can be severe, including financial losses, damage to reputation, and loss of sensitive data. The punitive damages are severe, and it is easier to lose and much harder to restore the faith of customers. This chapter gives an overview on the evolution of network architecture, the grounds behind data leaks and violations. It also discusses the best approaches to counter the threats, governance structure and emerging developments in network security. This chapter also gives you the analysis on the methodologies adopted for network forensics and explores the viewpoint on where network forensics could be applied. Chapter 11 Penetration Testing Building Blocks. 255 Abhijeet Kumar, Independent Researcher, India Penetration testing is an art, and the path of its mastery starts from having a good grasp on fundamental knowledge. Throughout this chapter, readers will be made familiar with the building blocks in an easy-to-interpret manner. During the course of this chapter, readers will learn about topics such as penetration testing types, phases, dos don’ts, and types of OSINT (open source intelligence) methods including image OSINT, email OSINT, Google dorking and social media intelligence
(SOCMINT). Please note that this chapter will not be very comprehensive. Readers are recommended to do their own research on such topics in order to gain more in depth knowledge. Links to additional reading materials will be added in reference section at the end of the chapter. Readers are advised to go through them at least once to learn more comprehensive information about some chapter topics. Chapter 12 Penetration Testing Tools and Techniques. 280 Abhijeet Kumar, Independent Researcher, India Penetration testing is an ever-growing field that deals with a lot of products and services. This chapter will begin introduction of networking, Linux, and Bash. Furthermore, the common tools of the trade (Nmap, Nessus, Metasploit, Burp suite, etc.) for specific type of penetration testing assessments. Readers are recommended to do their own research on such topics in order to gain more in-depth knowledge. Links to additional reading materials will be added in the reference section at the end of the chapter. Readers are advised to go through them at least once to learn more comprehensive information about some chapter topics. Chapter 13 Social Engineering Attacks and Countermeasures.307 Kshyamasagar Mahanta, Maharaja Sriram Chandra Bhanja Deo University, India Hima Bindu Maringanti, Maharaja Sriram Chandra Bhanja Deo University, India This book chapter examines the increasing danger of social engineering attacks in cybersecurity. These attacks focus on exploiting human
vulnerabilities instead of technical weaknesses and target the human element of organizations. The chapter outlines the various types of social engineering attacks such as phishing, pretexting, baiting, and quid pro quo, and explores the strategies employed by social engineers including the creation of urgency, trust, and fear. It also covers countermeasures that can be employed to guard against social engineering attacks, such as education and awareness programs for employees and technical solutions like spam filters and multi-factor authentication. By understanding the threat of social engineering attacks and taking proactive steps to mitigate this risk, individuals and organizations can protect themselves against this growing cybersecurity menace. Chapter 14 Technological Trends and Recent Statistics of Dark Web. 338 Kamna Solanki, Maharshi Dayanand University, Rohtak, India Sandeep Dalal, Maharshi Dayanand University, Rohtak, India
The depth of the Internet extends well beyond the surface information that many people may quickly access in their routine searches. Some people may think of the web as only being made up of webpages that can be found using conventional search engines like Google. This information, referred to as the “Surface web,” represents a very small percentage of the entire internet. The part of the internet that search engines and web crawlers do not index is known as the deep web. On the other hand, a subset of the deep web known as the “dark web” is only accessible using specialized software like Tor (The Onion Router). The surface web is primarily used for acceptable daily online activity, while the dark web is purely anonymous and is known for carrying out illicit transactions. The dark web is a small part of the deep web which can be accessed through the Tor browser. This chapter aims to examine current technology developments and some intriguing recent dark web statistics to evaluate the dark web’s present state, technologies, usage, and current trends and data breaches. Chapter 15 Unraveling the Server: Mastering Server-Side Attacks for Ethical Hacking. 360 Aviral Srivastava, Amity University, Rajasthan, India This chapter, per the authors, delves into the realm of server-side attacks within the context of ethical hacking and penetration testing. It aims to provide a comprehensive understanding of server-side vulnerabilities, focusing on web, database, and application servers. Additionally, the chapter explores prevalent server-side attack techniques, guiding readers
through the process of identifying, exploiting, and mitigating server-side vulnerabilities in a responsible and ethical manner. Legal and ethical considerations surrounding server-side attacks are also discussed, emphasizing the importance of responsible disclosure and collaboration with vendors. Lastly, the chapter concludes by examining the role of server-side attacks in ethical hacking and highlighting future trends and challenges that ethical hackers may encounter in the ever-evolving digital landscape. Chapter 16 Wireless Hacking.382 Shubh Gupta, University of Petroleum and Energy Studies, India Oroos Arshi, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India The network has become portable as a result of digital modulation, adaptive modulation, information compression, wireless access, and multiplexing. Wireless devices connected to the internet can possess a serious risk to the information security. These devices communicate among themselves in a public domain which is very easily susceptible to attacks. These devices only depend upon the encryption and their shared keys to help them mitigate the risk when data is in transit. Also WEP/WPA
(wired equivalent privacy/ wireless protected access) cracking tools are taken care to avoid break into attacks. Several wireless networks, their security features, threats, and countermeasures to keep the network secure are all covered in this chapter. It analyses various wireless encryption techniques, highlighting their advantages and disadvantages. The chapter also explores wireless network attack techniques and provides countermeasures to safeguard the information systems and also provide a wireless penetration testing framework for safeguarding the wireless network. Compilation of References. 413 About the Contributors. 437 Index. 442 |
adam_txt |
Table of Contents Preface. xvi Chapter 1 A Guide to Digital Forensic “Theoretical to Software-Based Investigations”. 1 Preeti Sharma, University of Petroleum and Energy Studies, India Manoj Kumar, University of Wollongong, Dubai, UAE Hitesh Kumar Sharma, University of Petroleum and Energy Studies, India Chapter 2 Attacks on Web Applications. 31 Ayushi Malik, University of Petroleum and Energy Studies, India Shagun Gehlot, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India Chapter 3 Demystifying Cyber Crimes. 63 Kritika, Government of India, India Chapter 4 Early Detection of Security Holes in the Network. 95 N. Ambika, St. Francis College, India Chapter 5 Introduction to Dark Web. 114 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Rahmeh Ibrahim, Princess Sumaya University for Technology, Jordan
Chapter 6 Introduction to Ransomware. 139 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Noor A. Jebril, Princess Sumaya University, Jordan Chapter 7 Demystifying Ransomware: Classification, Mechanism and Anatomy. 171 Aaeen Naushadahmad Aichi, Gujarat University, India Kiranbhai R. Dodiya, Gujarat University, India Chapter 8 loT in Real-Life: Applications, Security, and Hacking. 193 Pawan Whig, Vivekananda Institute of Professional Studies, India Kritika Puruhit, Jodhpur Institute of Engineering and Technology, India Piyush Kumar Gupta, Jamia Hamdard, India Pavika Sharma, Bhagwan Parshuram Institute of Technology, India Rahul Reddy Nadikattu, University of Cumbersome, USA Ashima Bhatnagar Bhatia, Vivekananda Institute of Professional Studies, India Chapter 9 Maintaining Cybersecurity Awareness in Large-Scale Organizations: A Pilot Study in a Public Institution. 212 Muhammed Aslan, Cankaya University, Turkey Tolga Pusatli, Cankaya University, Turkey Chapter 10 Network Security Breaches: Comprehension and Its Implications. 239 Yash Bansal, The NorthCap University, India Shilpa Mahajan, The NorthCap University, India Chapter 11 Penetration Testing Building Blocks. 255 Abhijeet Kumar, Independent Researcher, India Chapter 12 Penetration Testing Tools and
Techniques. 280 Abhijeet Kumar, Independent Researcher, India
Chapter 13 Social Engineering Attacks and Countermeasures. 307 Kshyamasagar Mahanta, Maharaja Sriram Chandra Bhanja Deo University, India Hima Bindu Maringanti, Maharaja Sriram Chandra Bhanja Deo University, India Chapter 14 Technological Trends and Recent Statistics of Dark Web. 338 Kamna Solanki, Maharshi Dayanand University, Rohtak, India Sandeep Dalal, Maharshi Dayanand University, Rohtak, India Chapter 15 Unraveling the Server: Mastering Server-Side Attacks for Ethical Hacking. 360 Aviral Srivastava, Amity University, Rajasthan, India Chapter 16 Wireless Hacking. 382 Shubh Gupta, University of Petroleum and Energy Studies, India Oroos Arshi, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India Compilation of References. 413 About the Contributors.437 Index.442
Detailed Table of Contents Preface. xvi Chapter 1 A Guide to Digital Forensic “Theoretical to Software-Based Investigations”. 1 Preeti Sharma, University of Petroleum and Energy Studies, India Manoj Kumar, University of Wollongong, Dubai, UAE Hitesh Kumar Sharma, University of Petroleum and Energy Studies, India A branch of forensic science called “digital forensics” deals with the utilization of digital data received, maintained, and conveyed by electronic devices as evidence in inquiries and legal proceedings. It is a growing field in computing that frequently necessitates the intelligent analysis of large amounts of complex data. Rapid advancements in computer science and information technology enable the development of novel techniques and software for digital investigations. Initially, much of the analysis software was unique and proprietary, but overtime, specialised analysis software for both the private and governmental sectors became available. The aim of this chapter is to deliver a comprehensive overview of digital forensics phases, applications, merits, and demerits and widely used software of the domain. The chapter also discusses legitimate and legal considerations, followed by the scope and role of artificial intelligence for solving complex problems of digital forensics. Chapter 2 Attacks on Web Applications. 31 Ayushi Malik, University of Petroleum
and Energy Studies, India Shagun Gehlot, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India Online applications hold sensitive data that is valuable, and hackers strive to identify weaknesses and exploit them in order to steal data, pose as users, or disrupt the application. Web applications are increasingly exposed to dangers and attack vectors that are more advanced. Additionally, theft of private information—such as user
credentials or billing information for credit cards—occurs frequently. Attackers initially concentrated on obtaining personal information that was accidentally exposed through poorly built or poorly protected web apps. Insecure design, security misconfiguration, vulnerable and outdated components, identification and authentication failures, etc. are some of the most prominent web application vulnerabilities that will be covered in this chapter. The authors are using countermeasures including fuzz testing, source code review, and encoding approaches to get around these vulnerabilities. As a result, this chapter offers information on the various attacks that website visitors who use web applications encounter. Chapter 3 Demystifying Cyber Crimes. 63 Kritika, Government of India, India With the National Cybercrime Reporting portal witnessing an increase of 15.3% increase in the cyber cases in second quarter of 2022, the post pandemic world has seen a tremendous rise in the number of cybercrime cases. The cases have increased many folds, 125% from 2021, and still continues beyond. The targets of crime are not limited to any age group and innocent children have not been spared. The exposure to online classes, conferences, meetings, etc. has opened the door to criminal activities in a humongous way. Thus, there comes the need for each and every one of us to be well aware of the recent practices that these criminals use and not fall into the clutches of these nefarious cyber criminals. Chapter 4
Early Detection of Security Holes in the Network. 95 N. Ambika, St. Francis College, India The previous method that has been suggested is to increase the automatic closing of security holes in networks that are vulnerable. This process is the amalgamation of various phases, which begin with collecting information and end with mitigating vulnerabilities. The network’s internal domain name is considered input in the proposed method for internal audit purposes. The operational services collect live IPs. Exploits are typically created to gain access to a system, enable the acquisition of administrative privileges, or launch denial-of-service attacks. Each exploit is configured and executed after the list of exploits for each service has been obtained. Whether the endeavor can effectively approach the framework, the moderation step is conjured, checking the sort of access got. The suggestion evaluates the incoming data using the knowledge set stored in its memory. It maintains a table detailing the IP address incomings. The guilty detection is increased by 27.6%, and the security is increased by 36.8% compared to previous work.
Chapter 5 Introduction to Dark Web. 114 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Rahmeh Ibrahim, Princess Sumaya University for Technology, Jordan Darknet is an overlay portion of the Internet network that can only be accessed using specific authorization using distinctively tailored communication protocols. Attackers usually exploit the darknet to threaten several world-wile users with different types of attack/intrusion vectors. In this chapter, we shed the light on the darknet network, concepts, elements, structure, and other aspects of darknet utilization. Specifically, this chapter will extend the elaboration on the darknet, the dark web components, the dark web access methods, the anonymity and confidentiality of the dark web, the dark web crimes, the cyber-attacks on the dark web, the malware on the dark web, the internet governance of dark web, the payment on the dark web, and the impacts of the dark web. This chapter will profound the knowledge of the dark web and provides more insights to readers about darknet attacks, malware, and their counter-measures. Chapter 6 Introduction to Ransomware. 139 Qasem Abu Al-Haija, Princess Sumaya University for Technology, Jordan Noor A. Jebril, Princess Sumaya University, Jordan Ransomware can lock users’ information or resources (such as screens); hence, authorized users are blocked from retrieving their private data/assets.
Ransomware enciphers the victim’s plaintext data into ciphertext data; subsequently, the victim host can no longer decipher the ciphertext data to original plaintext data. To get back the plaintext data, the user will need the proper decryption key; therefore, the user needs to pay the ransom. In this chapter, the authors shed light on ransomware malware, concepts, elements, structure, and other aspects of ransomware utilization. Specifically, this chapter will extend the elaboration on the ransomware, the state-ofart ransomware, the ransomware lifecycle, the ransomware activation and encryption processes, the ransom request process, the payment and recovery, the ransomware types, recommendation for ransomware detection and prevention, and strategies for ransomware mitigation. Chapter 7 Demystifying Ransomware: Classification, Mechanism and Anatomy. 171 Aaeen Naushadahmad Aichi, Gujarat University, India Kiranbhai R. Dodiya, Gujarat University, India
Malware, classified as ransomware, encrypts data on a computer, preventing individuals from accessing it. The intruder then demands a ransom from the user for the password that unlocks the files. Recent cyberattacks against prominent corporate targets have increased the extensive media attention on ransomware. The primary reason for computer intrusions is financial gain. Ransomware targets individual owners of information, keeping their file systems captive until a ransom is paid, compared to malware, which permits criminals to steal valuable data and then use it throughout the digital marketplace. Ransomware’s terrifying complexity level heralds a paradigm shift in the cybercrime ecosystem. Ransomware has become more mysterious, with some latest forms working without ever connecting to the Internet. In this chapter, the authors will discuss the overview of ransomware, the history and development of ransomware, some of the famous cases, the anatomy of ransomware attacks, types of ransomware attack vectors, and the prevention of such kinds of attacks in cyberspace. Chapter 8 loT in Real-Life: Applications, Security, and Hacking. 193 Pawan Whig, Vivekananda Institute of Professional Studies, India Kritika Puruhit, Jodhpur Institute of Engineering and Technology, India Piyush Kumar Gupta, Jamia Hamdard, India Pavika Sharma, Bhagwan Parshuram Institute of Technology, India Rahul Reddy Nadikattu, University of Cumbersome, USA Ashima Bhatnagar Bhatia, Vivekananda Institute of Professional Studies, India Now, computers and smartphones have
become more powerful than internet connectivity. Every ‘smart’ device in our environment now aspires to use digital interventions to solve real-world problems. The buzz around loT is, of course, huge. This disturbing technology penetrates various industries, develops new loT applications, and connects all internet-enabled devices around us. One survey shows that 61 billion connected devices are expected to be available by 2025. But some of them shine more than others, in the mad rush of “newer” and “better” loT applications. The chapter aims to present a summary of the challenges in the applications that the internet of things must face in their research and development, which are to be explored in this book chapter. Chapter 9 Maintaining Cybersecurity Awareness in Large-Scale Organizations: A Pilot Study in a Public Institution. 212 Muhammed Aslan, Cankaya University, Turkey Tolga Pusatli, Cankaya University, Turkey
Research was conducted to increase the awareness of employees with regard to cyber security to fill the gap in the literature where few studies on how effective the measures implemented in organizations were reported. This research uses the outcome of the phishing drills that a public institution applied to its personnel, participation of said personnel in awareness training, and the reading statistics of regularly published information security bulletins. This has been beneficial in determining the methods to increase the cyber security awareness of personnel in organizations with 1,000 or more personnel; users were considered as a whole, and not individually evaluated. Findings report that organizations can increase users’ cybersecurity awareness by systematically conducting phishing exercises, providing awareness training, and regularly publishing information security bulletins. The awareness of reading bulletins rapidly increased after phishing exercises and training and decreased in the following months; however, an increase was observed in the long term. Chapter 10 Network Security Breaches: Comprehension and Its Implications. 239 Yash Bansal, The NorthCap University, India Shilpa Mahajan, The NorthCap University, India Threats on communication networks are proliferating. It is surprising that more than half of Indian organizations have experienced a breach in 2022. These breaches can occur due to various reasons, such as human error, software vulnerabilities, or malicious attacks. Tech executives frequently commit the sin of being unready for
network data breaches despite the early indications. The consequences of a network security breach can be severe, including financial losses, damage to reputation, and loss of sensitive data. The punitive damages are severe, and it is easier to lose and much harder to restore the faith of customers. This chapter gives an overview on the evolution of network architecture, the grounds behind data leaks and violations. It also discusses the best approaches to counter the threats, governance structure and emerging developments in network security. This chapter also gives you the analysis on the methodologies adopted for network forensics and explores the viewpoint on where network forensics could be applied. Chapter 11 Penetration Testing Building Blocks. 255 Abhijeet Kumar, Independent Researcher, India Penetration testing is an art, and the path of its mastery starts from having a good grasp on fundamental knowledge. Throughout this chapter, readers will be made familiar with the building blocks in an easy-to-interpret manner. During the course of this chapter, readers will learn about topics such as penetration testing types, phases, dos don’ts, and types of OSINT (open source intelligence) methods including image OSINT, email OSINT, Google dorking and social media intelligence
(SOCMINT). Please note that this chapter will not be very comprehensive. Readers are recommended to do their own research on such topics in order to gain more in depth knowledge. Links to additional reading materials will be added in reference section at the end of the chapter. Readers are advised to go through them at least once to learn more comprehensive information about some chapter topics. Chapter 12 Penetration Testing Tools and Techniques. 280 Abhijeet Kumar, Independent Researcher, India Penetration testing is an ever-growing field that deals with a lot of products and services. This chapter will begin introduction of networking, Linux, and Bash. Furthermore, the common tools of the trade (Nmap, Nessus, Metasploit, Burp suite, etc.) for specific type of penetration testing assessments. Readers are recommended to do their own research on such topics in order to gain more in-depth knowledge. Links to additional reading materials will be added in the reference section at the end of the chapter. Readers are advised to go through them at least once to learn more comprehensive information about some chapter topics. Chapter 13 Social Engineering Attacks and Countermeasures.307 Kshyamasagar Mahanta, Maharaja Sriram Chandra Bhanja Deo University, India Hima Bindu Maringanti, Maharaja Sriram Chandra Bhanja Deo University, India This book chapter examines the increasing danger of social engineering attacks in cybersecurity. These attacks focus on exploiting human
vulnerabilities instead of technical weaknesses and target the human element of organizations. The chapter outlines the various types of social engineering attacks such as phishing, pretexting, baiting, and quid pro quo, and explores the strategies employed by social engineers including the creation of urgency, trust, and fear. It also covers countermeasures that can be employed to guard against social engineering attacks, such as education and awareness programs for employees and technical solutions like spam filters and multi-factor authentication. By understanding the threat of social engineering attacks and taking proactive steps to mitigate this risk, individuals and organizations can protect themselves against this growing cybersecurity menace. Chapter 14 Technological Trends and Recent Statistics of Dark Web. 338 Kamna Solanki, Maharshi Dayanand University, Rohtak, India Sandeep Dalal, Maharshi Dayanand University, Rohtak, India
The depth of the Internet extends well beyond the surface information that many people may quickly access in their routine searches. Some people may think of the web as only being made up of webpages that can be found using conventional search engines like Google. This information, referred to as the “Surface web,” represents a very small percentage of the entire internet. The part of the internet that search engines and web crawlers do not index is known as the deep web. On the other hand, a subset of the deep web known as the “dark web” is only accessible using specialized software like Tor (The Onion Router). The surface web is primarily used for acceptable daily online activity, while the dark web is purely anonymous and is known for carrying out illicit transactions. The dark web is a small part of the deep web which can be accessed through the Tor browser. This chapter aims to examine current technology developments and some intriguing recent dark web statistics to evaluate the dark web’s present state, technologies, usage, and current trends and data breaches. Chapter 15 Unraveling the Server: Mastering Server-Side Attacks for Ethical Hacking. 360 Aviral Srivastava, Amity University, Rajasthan, India This chapter, per the authors, delves into the realm of server-side attacks within the context of ethical hacking and penetration testing. It aims to provide a comprehensive understanding of server-side vulnerabilities, focusing on web, database, and application servers. Additionally, the chapter explores prevalent server-side attack techniques, guiding readers
through the process of identifying, exploiting, and mitigating server-side vulnerabilities in a responsible and ethical manner. Legal and ethical considerations surrounding server-side attacks are also discussed, emphasizing the importance of responsible disclosure and collaboration with vendors. Lastly, the chapter concludes by examining the role of server-side attacks in ethical hacking and highlighting future trends and challenges that ethical hackers may encounter in the ever-evolving digital landscape. Chapter 16 Wireless Hacking.382 Shubh Gupta, University of Petroleum and Energy Studies, India Oroos Arshi, University of Petroleum and Energy Studies, India Ambika Aggarwal, University of Petroleum and Energy Studies, India The network has become portable as a result of digital modulation, adaptive modulation, information compression, wireless access, and multiplexing. Wireless devices connected to the internet can possess a serious risk to the information security. These devices communicate among themselves in a public domain which is very easily susceptible to attacks. These devices only depend upon the encryption and their shared keys to help them mitigate the risk when data is in transit. Also WEP/WPA
(wired equivalent privacy/ wireless protected access) cracking tools are taken care to avoid break into attacks. Several wireless networks, their security features, threats, and countermeasures to keep the network secure are all covered in this chapter. It analyses various wireless encryption techniques, highlighting their advantages and disadvantages. The chapter also explores wireless network attack techniques and provides countermeasures to safeguard the information systems and also provide a wireless penetration testing framework for safeguarding the wireless network. Compilation of References. 413 About the Contributors. 437 Index. 442 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author2 | Kaushik, Keshav Bhardwaj, Akashdeep 1971- |
author2_role | edt edt |
author2_variant | k k kk a b ab |
author_GND | (DE-588)1310505136 (DE-588)1284516636 |
author_facet | Kaushik, Keshav Bhardwaj, Akashdeep 1971- |
building | Verbundindex |
bvnumber | BV049505331 |
classification_rvk | ST 277 |
ctrlnum | (ELiSA)ELiSA-9781668482186 (OCoLC)1429559846 (DE-599)KXP1847512135 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049505331</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240325</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240117s2023 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2022062311</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668482186</subfield><subfield code="c">h/c</subfield><subfield code="9">978-1-66848-218-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668482193</subfield><subfield code="c">s/c</subfield><subfield code="9">978-1-66848-219-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781668482186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELiSA)ELiSA-9781668482186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429559846</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1847512135</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Perspectives on ethical hacking and penetration testing</subfield><subfield code="c">Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 445 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in computational intelligence and robotics (ACIR) book series</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">DLC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">DLC</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computerkriminalität & Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bioethik, Tierethik</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaushik, Keshav</subfield><subfield code="0">(DE-588)1310505136</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhardwaj, Akashdeep</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)1284516636</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Perspectives on ethical hacking and penetration testing</subfield><subfield code="d">Hershey, Pennsylvania : IGI Global, publishers of timely knowledge, 2023</subfield><subfield code="h">1 Online-Ressource (xx, 445 Seiten)</subfield><subfield code="z">9781668482209</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
id | DE-604.BV049505331 |
illustrated | Illustrated |
index_date | 2024-07-03T23:22:13Z |
indexdate | 2024-07-20T04:35:26Z |
institution | BVB |
isbn | 9781668482186 9781668482193 |
language | English |
lccn | 2022062311 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034850398 |
oclc_num | 1429559846 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xx, 445 Seiten Illustrationen |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in computational intelligence and robotics (ACIR) book series Premier reference source |
spelling | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India Hershey, PA IGI Global [2023] xx, 445 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Advances in computational intelligence and robotics (ACIR) book series Premier reference source Includes bibliographical references and index Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians. Penetration testing (Computer security) DLC Computer crimes Prevention DLC Social Engineering Sicherheit (DE-588)7539699-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität & Hacking Bioethik, Tierethik Computersicherheit (DE-588)4274324-2 s Social Engineering Sicherheit (DE-588)7539699-3 s DE-604 Kaushik, Keshav (DE-588)1310505136 edt Bhardwaj, Akashdeep 1971- (DE-588)1284516636 edt Erscheint auch als Online-Ausgabe Perspectives on ethical hacking and penetration testing Hershey, Pennsylvania : IGI Global, publishers of timely knowledge, 2023 1 Online-Ressource (xx, 445 Seiten) 9781668482209 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Perspectives on ethical hacking and penetration testing Penetration testing (Computer security) DLC Computer crimes Prevention DLC Social Engineering Sicherheit (DE-588)7539699-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7539699-3 (DE-588)4274324-2 |
title | Perspectives on ethical hacking and penetration testing |
title_auth | Perspectives on ethical hacking and penetration testing |
title_exact_search | Perspectives on ethical hacking and penetration testing |
title_exact_search_txtP | Perspectives on ethical hacking and penetration testing |
title_full | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
title_fullStr | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
title_full_unstemmed | Perspectives on ethical hacking and penetration testing Keshav Kaushik, University of Petroleum and Energy Studies, India; Akashdeep Bhardwaj, University of Petroleum and Energy Studies, India |
title_short | Perspectives on ethical hacking and penetration testing |
title_sort | perspectives on ethical hacking and penetration testing |
topic | Penetration testing (Computer security) DLC Computer crimes Prevention DLC Social Engineering Sicherheit (DE-588)7539699-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Penetration testing (Computer security) Computer crimes Prevention Social Engineering Sicherheit Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034850398&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kaushikkeshav perspectivesonethicalhackingandpenetrationtesting AT bhardwajakashdeep perspectivesonethicalhackingandpenetrationtesting |