Cyber Security for Beginners: How to Protect Your Devices from Malicious Attacks Using Risk Management, Social Engineering, and Information Security (2022 Guide for Newbies)
()
About this ebook
Everyone has to address and be aware of cyber security today; anybody or everything that accesses the Internet is a target.
Do you ever wonder how cyber security per
Related to Cyber Security for Beginners
Related ebooks
Zero Trust Proactive Cyber Security For Everyone: Protecting America Through Technology Rating: 0 out of 5 stars0 ratingsCyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsCybersecurity Essentials: The Beginner's Guide Rating: 5 out of 5 stars5/5Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsTrends In Cybersecurity: The Insider To Insider Risks Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsCrash Course Data Security Rating: 0 out of 5 stars0 ratingsModern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5IT Security Concepts Rating: 5 out of 5 stars5/5The Future and Opportunities of Cybersecurity in the Workforce Rating: 3 out of 5 stars3/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsAsset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsCISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsStay Cyber Safe: What Every CEO Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs & Career Paths: Find Cybersecurity Jobs, #2 Rating: 0 out of 5 stars0 ratingsBeginner's Guide to Information Security Rating: 0 out of 5 stars0 ratingsIntroduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratings
True Crime For You
Mindhunter: Inside the FBI's Elite Serial Crime Unit Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5Hollywood's Dark History: Silver Screen Scandals Rating: 4 out of 5 stars4/5My Story Rating: 4 out of 5 stars4/5Devil's Knot: The True Story of the West Memphis Three Rating: 4 out of 5 stars4/5Waco: David Koresh, the Branch Davidians, and A Legacy of Rage Rating: 4 out of 5 stars4/5Dead Mountain: The Untold True Story of the Dyatlov Pass Incident Rating: 4 out of 5 stars4/5The Devil and Harper Lee Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Under the Bridge Rating: 4 out of 5 stars4/5Breaking Free: How I Escaped Polygamy, the FLDS Cult, and My Father, Warren Jeffs Rating: 4 out of 5 stars4/5Wicked New Orleans: The Dark Side of the Big Easy Rating: 4 out of 5 stars4/5The Ivy League Counterfeiter Rating: 4 out of 5 stars4/5Manhunt: The 12-Day Chase for Lincoln's Killer: An Edgar Award Winner Rating: 4 out of 5 stars4/5Confession of a Serial Killer: The Untold Story of Dennis Rader, the BTK Killer Rating: 4 out of 5 stars4/5The Foundling: The True Story of a Kidnapping, a Family Secret, and My Search for the Real Me Rating: 4 out of 5 stars4/5An Assassin in Utopia: The True Story of a Nineteenth-Century Sex Cult and a President's Murder Rating: 0 out of 5 stars0 ratingsJourney Into Darkness Rating: 4 out of 5 stars4/5The Enigma of Ted Bundy: The Questions and Controversies Surrounding America's Most Infamous Serial Killer Rating: 5 out of 5 stars5/5Are You There Alone?: The Unspeakable Crime of Andrea Yates Rating: 4 out of 5 stars4/5Picking Cotton: Our Memoir of Injustice and Redemption Rating: 4 out of 5 stars4/518 Tiny Deaths: The Untold Story of Frances Glessner Lee and the Invention of Modern Forensics Rating: 4 out of 5 stars4/5Buried Memories: My Story: Updated Edition Rating: 4 out of 5 stars4/5Quest for Love: Memoir of a Child Sex Slave Rating: 5 out of 5 stars5/5
Reviews for Cyber Security for Beginners
0 ratings0 reviews
Book preview
Cyber Security for Beginners - Adrian Gildon
Introduction to NIST Cybersecurity Framework
There are numerous threats to your network's security. But how do you defend against all of them? That, after all, is the subject of this book. Adequate time and resources are rarely allocated to the most critical steps in network security. In this book, I'll walk you through 21 steps, including the most important ones. As a result, you'll be certain to cover everything. Similarly, you'll ensure that you don't waste time on steps that don't add much value. Who is this book intended for? Anyone who needs to secure a network, such as an engineer or security analyst, or a manager with limited technical knowledge, would most likely be hired as an engineering security manager. The owner of a SOHO, which is a small business with a small office/home office, and anyone else interested in learning more about network security. This book is based on my over a decade of hands-on experience in information technology. The majority of it was spent as a security analyst and network engineer. Let's get specific about what we'll cover. We'll begin with fundamental concepts, where you'll learn the fundamental theories required to understand the fundamentals. Then we'll go over how to write a security policy, how to educate end-users and IT staff, how to implement physical security and perimeter security, and what constitutes good password management. Following that, we will examine the elimination of unnecessary services, the implementation of good patch management, antivirus measures, and access control. Following that, we'll look at how to secure data in transit, what firewalls, IDS, and IPS systems are, how to backup your data, and what kinds of automated solutions are available today. Now let's get started.
Chapter 1
Basic Cybersecurity concepts
image001Before we proceed to the first step, we must first grasp a few fundamental network security concepts.
This will provide you with the necessary background to feel confident about the steps you should take to create a solid security policy.
The CIA triad is the first concept.
This is one of the most fundamental information security principles. The acronym CIA stands for confidentiality, integrity, and accessibility.
In general, all data that you want to keep secure must be confidential, maintain integrity, and be accessible. Confidentiality simply means keeping data private. Secret from those who are not authorized to see it, that is. Data integrity refers to preventing unauthorized or accidental changes to data.
The availability of information means that it is available when you need it.
The following concept is aaa,
which is often pronounced as triple a,
which stands for authentication, authorization, and accountability.
Authentication entails demonstrating that you are who you claim to be. So, if you log in as John and enter John's password, the system will most likely authenticate you. After you've been authenticated, authorization refers to the actions you can take.
Typically, this determines which files you can read, write, or modify.
Accountability is the third concept.
Users are held accountable for their actions on the system as a result of this. It is usually accomplished through logging and auditing.
One thing you'll notice a lot with accountability is that if you're paying for the amount of time you spend on the network, it will be recorded.
The following concept is defense-in-depth, also known as multiple layers of security.
To protect network resources, multiple layers of security are used. The idea is that if one layer of security fails, another layer will still protect you.
A server in a locked room is a simple example. Even if an intruder successfully breaks into the server room, the intruder does not have access to the server's data without a password.
The principle of least privilege is the next concept we'll look at, which states that you should only have access to information that is necessary.
A user should only be able to access information on the network that is required for their job.
Similarly, a process should only be able to access the network resources that it requires to perform its legitimate services.
The following concept is good faith.
If you inquire about good faith, you should be able to obtain it. "In contract law, the implied covenant of good faith and fear and fair dealing is a general presumption that