Bezpieczeństwo systemów
Trevor Stuart, Joe Anich
Security in information technology has always been a topic of discussion, one that comes with various backgrounds, tools, responsibilities, education, and change! The SC-200 exam comprises a wide range of topics that introduce Microsoft technologies and general operations for security analysts in enterprises. This book is a comprehensive guide that covers the usefulness and applicability of Microsoft Security Stack in the daily activities of an enterprise security operations analyst.Starting with a quick overview of what it takes to prepare for the exam, you'll understand how to implement the learning in real-world scenarios. You'll learn to use Microsoft's security stack, including Microsoft 365 Defender, and Microsoft Sentinel, to detect, protect, and respond to adversary threats in your enterprise. This book will take you from legacy on-premises SOC and DFIR tools to leveraging all aspects of the M365 Defender suite as a modern replacement in a more effective and efficient way.By the end of this book, you'll have learned how to plan, deploy, and operationalize Microsoft's security stack in your enterprise and gained the confidence to pass the SC-200 exam.
Richard Diver, Gary Bushey, John Perkins
Microsoft Sentinel is a security information and event management (SIEM) tool developed by Microsoft that helps you integrate cloud security and artificial intelligence (AI). This book will teach you how to implement Microsoft Sentinel and understand how it can help detect security incidents in your environment with integrated AI, threat analysis, and built-in and community-driven logic.The first part of this book will introduce you to Microsoft Sentinel and Log Analytics, then move on to understanding data collection and management, as well as how to create effective Microsoft Sentinel queries to detect anomalous behaviors and activity patterns. The next part will focus on useful features, such as entity behavior analytics and Microsoft Sentinel playbooks, along with exploring the new bi-directional connector for ServiceNow. In the next part, you’ll be learning how to develop solutions that automate responses needed to handle security incidents and find out more about the latest developments in security, techniques to enhance your cloud security architecture, and explore how you can contribute to the security community.By the end of this book, you’ll have learned how to implement Microsoft Sentinel to fit your needs and protect your environment from cyber threats and other security issues.
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
Światowiak Jacek
Zapewnij bezpieczeństwo Twoim systemom informatycznym! Jak w pełni wykorzystać serwer ISA 2006? Jak zautomatyzować proces aktualizacji, korzystając z WSUS? Czym jest infrastruktura klucza publicznego, jak ją zaprojektować i wdrożyć? Jak chronić specjalizowane serwery i stacje robocze przed szkodliwym oprogramowaniem oraz spamem? Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne przechowywanie oraz przesyłanie danych, ochronę przed szkodliwym oprogramowaniem i niechcianą pocztą. Teraz możesz dowiedzieć się, jak w praktyce wykorzystać te możliwości! W trakcie lektury zapoznasz się z architekturą systemu Forefront Security Suite oraz jego zaletami. Zdobędziesz wiedzę na temat infrastruktury klucza publicznego, usługi WSUS (skrót od ang. Windows System Update Service) oraz metod wdrażania jednostki certyfikacyjnej. Ponadto dowiesz się, jak zagwarantować najwyższy poziom wiarygodności w systemach z rodziny Windows Server 2003/2008 oraz wykorzystać wszystkie programy i narzędzia pakietu. Dodatkowo zgłębisz tajniki zabezpieczania stacji roboczych z użyciem Forefront Client Security. Książka ta adresowana jest do administratorów serwerów, administratorów sieci, specjalistów od zabezpieczeń oraz pasjonatów zagadnień związanych z bezpieczeństwem systemów informatycznych. Architektura Microsoft Forefront Automatyczna aktualizacja systemów oraz oprogramowania Wdrażanie infrastruktury klucza publicznego Wykorzystanie kreatora konfiguracji zabezpieczeń Instalacja i praca z ISA Server 2006 w wersji Standard oraz Enterprise Dostęp VPN z wykorzystaniem serwera ISA 2006 Ochrona antyspamowa w Exchange 2003 oraz 2007 Zabezpieczanie serwerów Exchange - Forefront Server Security for Exchange Ochrona serwerów SharePoint - Forefront Server Security for SharePoint Zabezpieczanie środowiska OCS 2007 - Forefront Server Security for Office Communications Server 2007 Zarządzanie bezpieczeństwem serwerów z wykorzystaniem Forefront Server Security Management Console Przyszłość technologii - Forefront Threat Management Gateway oraz technologia Stirling Kompletne źródło informacji na temat bezpieczeństwa w systemach Windows Server 2003/2008!
Abhinav Mishra
Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps.This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You’ll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you’ll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you’ll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues.By the end of this reverse engineering book, you’ll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence.
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
Oleg Afonin, Vladimir Katalov
Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work.We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and plays and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence.By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.
Igor Mikhaylov
Considering the emerging use of mobile phones, there is a growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic examinations of mobile devices, which involves extracting, recovering and analyzing data for the purposes of information security, criminal and civil investigations, and internal investigations.Mobile Forensics Cookbook starts by explaining SIM cards acquisition and analysis using modern forensics tools. You will discover the different software solutions that enable digital forensic examiners to quickly and easily acquire forensic images. You will also learn about forensics analysis and acquisition on Android, iOS, Windows Mobile, and BlackBerry devices. Next, you will understand the importance of cloud computing in the world of mobile forensics and understand different techniques available to extract data from the cloud. Going through the fundamentals of SQLite and Plists Forensics, you will learn how to extract forensic artifacts from these sources with appropriate tools. By the end of this book, you will be well versed with the advanced mobile forensics techniques that will help you perform the complete forensic acquisition and analysis of user data stored in different devices.
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
red. Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek
Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania oraz zwalczania niebezpiecznych zachowań w cyberprzestrzeni. Wyzwaniem badawczym stały się także relacje pomiędzy systemem cyberbezpieczeństwa a systemem prawa i związanym z tym działaniem organów władzy publicznej. Ważne zagadnienie stanowiła również analiza prawno-administracyjnych uregulowań w zakresie ochrony danych osobowych oraz ochrony informacji w cyberprzestrzeni, a także odpowiedzialności karnej za naruszenie dóbr podlegających przedmiotowej ochronie. Prof. dr hab. Waldemar KITLER, ASZWOJ Publikacja wpisuje się w aktualny nurt nauk o cyberbezpieczeństwie i jest interdyscyplinarna, tak samo jak pojęcie i system cyberbezpieczeństwa, obejmując swoim zakresem prawo publiczne i prywatne. Istotą i tym co odróżnia ją o innych dostępnych na rynku opracowań w zakresie systemu cyberbezpieczeństwa jest wskazanie przez każdego z Autorów rekomendacji w zakresie rozwoju określonych dziedzin prawa w systemie cyberbezpieczeństwa. dr hab. Jarosław Kostrubiec, prof. UMCS
Lisa Bock
In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.