Cyber Threat: Internet Security for Home and Business

Cyber Threat: Internet Security for Home and Business

by David McMahon
     
 

Today, being on-line has become imperative. Yet harsh realities exist: there is a clear and present threat to businesses on the net from pirates looking to crack their data, and to individuals who are having their identity stolen. Witness the recent attacks on major internet players Yahoo! and e*toys. In Cyber Threat, David McMahon takes the reader through the… See more details below

Overview

Today, being on-line has become imperative. Yet harsh realities exist: there is a clear and present threat to businesses on the net from pirates looking to crack their data, and to individuals who are having their identity stolen. Witness the recent attacks on major internet players Yahoo! and e*toys. In Cyber Threat, David McMahon takes the reader through the electronic landscape to show you how to watch your assets and your net exposure.

Product Details

ISBN-13:
9781894020831
Publisher:
Warwick Publishing
Publication date:
01/28/2000
Pages:
240
Product dimensions:
5.93(w) x 9.04(h) x 0.60(d)

Meet the Author

Table of Contents

Foreword13
Introduction15
Chapter 1The Electronic Landscape: A Shared Risk Environment21
Risk Assessment23
What Are the Threats?26
Chapter 2Bringing Street Smarts to the Information Highway31
Not Everything is What it Seems32
Scams34
E-mail Chain Letters36
Web Shopping37
Online Auctions39
Be Anything You Want to Be40
Who Are You on the Web?43
Identity Fraud46
Your Very Own Web Site47
Threats from Your Side of the Net49
Chapter 3New Threats from the Wired World53
Privacy Issues54
An Unwelcome Visitor: Mobile and Active Code56
Trading on the Net58
Why Me?60
How Did They Find You?61
Falling into Software Holes63
Chapter 4Agents of Chaos65
Threat Agents66
Who Are Hackers?66
Hacktivism70
Web Ethics72
Script Kiddies74
Getting Started76
What Do Hackers Do?77
Truth and Consequences: The Case of the Phonemasters78
Cyber-Criminals81
Cybotage82
Cyber-Terrorism83
Spy vs. Spy85
Information Warfare86
The Enemy Within90
Chapter 5Playing Out of Bounds93
Hacking Wetware: Social Engineering Ploys93
Dumpster Diving95
Onsite Tactics97
Steal the Computer99
Physical Attack99
Chapter 6The Sorcerer's Apprentice: Exploits and Trade Craft101
The Sorcerer's Apprentice102
Potions: Malicious Code102
Viruses103
Trojan Horses104
Droppers, Logic Bombs, and Worms104
Concoctions105
The Case of Melissa106
I Love You. vbs107
The Virus Business109
Third-Party Liability110
Devices111
War Dialers111
Vulnerability Scanners112
Computer Microphones112
Spells and Incantations113
IP Fragmentation113
Ping of Death114
SYNflood114
Storm115
Connection115
Kill Session116
DNS Spoofing116
Strategies and Tactics116
Reconnaissance117
Interception117
Insertion and Replay118
Delay119
Degradation119
The Attack119
Attack Impact123
Cyber-Espionage124
Chapter 7Surfing with Sharks: A Case Study127
Chapter 8Effective Risk Management153
Poachers and Gatekeepers157
What is Your Risk?157
Chapter 9Practicing Safe Surfing159
Information Security 101159
Procedures and Practices160
What's the Password?161
Password Tips164
How's Your Browser?165
Travel Advice for the Information Highway167
Web Surfing Safety Tips168
E-mailing with Confidence169
E-mail Tips171
Contingency Plans and Reaction172
Backing Up173
Incident Handling175
Basic Information176
What to Do in the Meantime177
Handling the Intrusion178
Chapter 10Configuring for Self Defense181
Virus Scanners and E-mmunity182
Content with Content183
Firewalls183
The Next Steps: Detection and Response187
Intrusion Detection Systems (IDS)188
Operational Assurance189
Choosing the Right Person for the Job190
Making Secure E-Commerce a Reality191
Secure Transactions194
Cryptography195
Public Key Cryptography197
Digital Signatures198
Pretty Good Privacy (PGP)200
Secure Sockets Layer (SSL)201
Web Certificates203
The SSL Process Continues203
Brute-Force Code Breaking204
Beyond SSL205
Real-Time Credit Card Authorization205
Public Key Infrastructures (PKIs)206
RSA-512 Cracked208
Conclusion209
Glossary213
Selected Bibliography219
Resources225
Index233

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >