White Hacker: Student Handbook

· Burak Bozkurtlar
3.9
11 review
E-book
41
Mga Page
Hindi na-verify ang mga rating at review  Matuto Pa

Tungkol sa ebook na ito

1.      Introduction

Cybersecurity is the body of technologies, processes and practices designed to protect

networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.

What is a secure system?

·         A very wide-ranging term with no standard definition.

·         It covers all aspects of ensuring the protection of citizens, businesses and critical infrastructures from threats that arise from their use of computers and the internet.

Concept of Cybersecurity

ITU-T X.1205 Definition

·         Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.

·         Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

·         The general security objectives comprise the following:

o    Availability

o   Integrity, which may include authenticity and non-repudiation

o    Confidentiality

Cybersecurity is not…

•        Computer security

•        Security engineering

•        Encryption

•        Computer crime

 Computer forensics

Cyber attack

A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organizational data.


 

The Most Common Types of Cyberattacks 

Mga rating at review

3.9
11 review

Tungkol sa may-akda

 Contents

1.      Introduction. 4

1.2.       Reference. 6

2.      Network Security. 7

2.1.       FireWall 10

3.      Hardware. 18

2.1.       Raspberry Pi 3. 18

2.2.       Arduino. 20

2.2.1.        Arduino MEGA 2560. 20

2.2.2.        Arduino UNO.. 23

2.3.       GGS01 GSM/GPS SHIELD.. 24

2.4.       Panda Latte. 26

4.      Operating Systems and Software’s. 30

4.1.       Kali LINUX. 30

5. PYTHON  INSTALLATION IN KALI LINUX………………………………………………………………………………………….31

 

 

I-rate ang e-book na ito

Ipalaam sa amin ang iyong opinyon.

Impormasyon sa pagbabasa

Mga smartphone at tablet
I-install ang Google Play Books app para sa Android at iPad/iPhone. Awtomatiko itong nagsi-sync sa account mo at nagbibigay-daan sa iyong magbasa online o offline nasaan ka man.
Mga laptop at computer
Maaari kang makinig sa mga audiobook na binili sa Google Play gamit ang web browser ng iyong computer.
Mga eReader at iba pang mga device
Para magbasa tungkol sa mga e-ink device gaya ng mga Kobo eReader, kakailanganin mong mag-download ng file at ilipat ito sa iyong device. Sundin ang mga detalyadong tagubilin sa Help Center para mailipat ang mga file sa mga sinusuportahang eReader.