Cyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying
By Zeph Reese
()
About this ebook
Fast-paced, practical, and hands-on. Cyber Combat is a book every person interested in protecting themselves from cyber threats can put to use immediately.
You'll learn how to:
- Protect your complete digital ecosystem including personal data, desktop devices, smartphones, home network, IoT devices against all types of viruses & malware.
- Never fall victim to a cyber attack again. Spot and defeat the sophisticated social engineering techniques being deployed by cyber criminals in order to exploit human nature.
- Prevent corporate data collection and counter the tracking of your online activities. .
- Clean up your digital footprint, practice privacy hygiene and take back control of your digital identity.
Related to Cyber Combat
Related ebooks
Cracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsCybersafe For Humans: A Simple Guide to Keep You and Your Family Safe Online Rating: 0 out of 5 stars0 ratingsMobile Malware Attacks and Defense Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsSelf-Organizing Networks: Self-Planning, Self-Optimization and Self-Healing for GSM, UMTS and LTE Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratingsHack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit Rating: 3 out of 5 stars3/5Wireless Operational Security Rating: 0 out of 5 stars0 ratingsTransitions from Digital Communications to Quantum Communications: Concepts and Prospects Rating: 0 out of 5 stars0 ratingsDissecting the Hack: The F0rb1dd3n Network, Revised Edition Rating: 5 out of 5 stars5/5How to Cheat at Securing a Wireless Network Rating: 2 out of 5 stars2/5Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills Rating: 3 out of 5 stars3/5Building Networks and Servers Using BeagleBone Rating: 0 out of 5 stars0 ratingsWindows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 Rating: 4 out of 5 stars4/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsThe Shellcoder's Handbook: Discovering and Exploiting Security Holes Rating: 0 out of 5 stars0 ratingsEmbedded FreeBSD Cookbook Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsOSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5Hack Attacks Denied: A Complete Guide to Network Lockdown Rating: 4 out of 5 stars4/5Secure Your Network for Free Rating: 0 out of 5 stars0 ratingsJuniper(r) Networks Secure Access SSL VPN Configuration Guide Rating: 5 out of 5 stars5/5Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD Rating: 0 out of 5 stars0 ratingsRIoT Control: Understanding and Managing Risks and the Internet of Things Rating: 5 out of 5 stars5/5CEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsCyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique (English Edition) Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5
Reviews for Cyber Combat
0 ratings0 reviews
Book preview
Cyber Combat - Zeph Reese
CYBER COMBAT
LEARN TO DEFEND YOURSELF FROM CYBER ATTACKS AND CORPORATE SPYING
ZEPH REESE
Contents
Title Page
PREFACE
Who This Book Is For
What’s in the Book?
PART I: INTRODUCTION
Cyber security and Privacy
Important Terms in Cybersecurity
Risk assessment
CHAPTER 1: DEFINING YOUR THREAT MODEL
Protect What You Value
The Threat Landscape
Know Your Enemies
What’s the Worst that Could Happen?
A Risk Based Approach
The Methodology of an Attack
PART II: SECURITY IN ACTION
CHAPTER 2: Operating System Security
CHAPTER 3: Virus & Malware Protection in Windows
CHATPER 4: Taking A Proactive Approach to Security
CHAPTER 5: Macs Are Not Immune
CHAPTER 6: Web Browser Security
CHAPTER 7: Home Network Security
CHAPTER 8: Smartphone Security
PART III: SOCIAL ENGINEERING
CHAPTER 9: Social Engineering Concepts & Attacks
CHAPTER 10: Social Engineering Defence Strategies
PART IV: THE BATTLE FOR ONLINE PRIVACY
CHAPTER 11: Why Care About Privacy?
CHAPTER 12: Operating System Privacy
CHAPTER 13: Web Browser Privacy
CHAPTER 14: Online Tracking
CHAPTER 15: Your Digital Footprint
CHAPTER 16: Metadata
CHAPTER 17: Smartphone Privacy
CHAPTER 18: Communication Apps
References
About The Author
PREFACE
In recent years, cybercrime has risen to record levels and continues to grow exponentially. Every minute of the day, individuals and organisations suffer monetary loss from cyber attacks, not to mention the emotional and psychological effect. The personal information of countless people is exposed in data breaches every day. Information which is then used by cyber criminals to launch more attacks on people like you.
Antivirus software is no longer enough to protect you from advanced malware or the sophisticated social engineering techniques being deployed by today’s cybercriminals. Desktop computers, laptops, tablets, smartphones, networks, and smart devices all offer plenty of opportunities for exploitation.
Data is the new oil
, a much sought after commodity in the digital age. Large amounts of personal data is being collected by shadowy entities who track, identify, and profile you across websites, and even devices. Your data is then sold, shared, and used for various purposes. A large digital footprint is a target on your back. Cyber attacks, identity theft, cyberstalking, scams, are just some of the consequences of having your privacy breached.
This book is an accumulation of many years of direct experience in the IT field as well as extensive research into the areas of information security and privacy. You will learn the skills, knowledge, tools and the mindset required to defend yourself, not only from current cyber threats, but also those that will emerge in the future.
Who This Book Is For
I believe this book would be a useful resource for people from all walks of life. Parents, students, business owners, marketers, salespeople, anyone who wants to protect themselves from cyber threats. Readers from all backgrounds and age groups, who are interested in cyber security, and those with or without a lot of technical knowledge will benefit from reading this book.
What’s in the Book?
The following breakdown of each section gives you an idea of the topics we’ll explore:
PART I: Introduction
This section introduces some key concepts of cybersecurity including threat modelling. The importance of defining the threat model which is unique to each person is also discussed. It also gives a brief overview of the kind of threats that currently exist in the cyber world.
PART II: Security in Practice
This part of the book dives straight into the practical side of cyber security, covering a broad range of technical controls, strategies, and tools that can be deployed to secure your digital ecosystem. There’s an emphasis on taking a proactive approach to security so that you can stop attacks from succeeding in the first place rather than dealing with the aftermath.
PART III: Social Engineering
This part of the book lays out key concepts of social engineering and the pivotal role it plays in all kinds of attacks. The close relationship between social engineering and human psychology is discussed. The various types of social engineering attacks are also covered along with the strategies to defend against them.
PART IV: Privacy in Practice
The final part of the book explores topics related to online privacy such as the collection and misuse of personal data by large corporations, tech companies, social media platforms and data brokers. The methods used by entities to identify and track users are also discussed as well as strategies to counter them. The actions and practices we can employ to take control of our personal information and improve our overall privacy is the main theme of this section.
PART I: INTRODUCTION
The purpose of cybersecurity is to identify the assets you want to protect, calculate the risks related to those assets and take necessary actions to safeguard those assets. Not all security risks can be eliminated and not all assets are worth protecting. This is where threat modelling plays an important role. The goal is to protect your most valued assets against attacks that are most probable. That way you will avoid wasting time, money, and effort in ways that don’t make sense.
Cyber security and Privacy
There’s a close relationship between cybersecurity and privacy. In the context of cybersecurity, privacy is the right and ability of an individual to control how their personal information is stored, shared and used. Cybersecurity plays an important role in ensuring that personal data is not breached. Choosing an application or service often requires a compromise between security and privacy. An example of this would be antivirus software or even operating systems. We sacrifice some of our privacy when using an antivirus, in return for protection against malware and other threats. The important thing is to be aware of the security and privacy risks when selecting a product or service.
Important Terms in Cybersecurity
Asset
Any piece of data or device that needs to be protected.
Threat
Any potential event that could undermine your efforts to defend your assets. Threats can be intentional attacks from threat actors or unintentional events, such as leaving your computer without locking it.
Attack surface
Your attack surfaces are the places and ways you are vulnerable to cyber-attacks.
Black Hat, Attacker, Threat Actor, Bad actor, Adversary, Malicious hacker
A person, organisation or entity who could cause you harm by undermining your security, privacy, or anonymity. We share some common adversaries, but they can also be unique for each person. Often the adversary is hypothetical.
Threat model
A way of thinking about the sorts of protection you want so you can protect the assets you value the most.
Threat Modelling
The process of determining which assets you need to protect and from whom.
Risk assessment
Calculating the chance that threats might succeed, so you know what resources to spend defending against them. There are countless ways that your assets can be attacked but some are less likely to succeed. Conducting a risk assessment means deciding the threats you are going to take seriously, and those that might be rare or harmless, or too difficult to combat and worry about.
CHAPTER 1: DEFINING YOUR THREAT MODEL
To make effective use of the information in this book, you need to ask the question: What am I trying to protect and from whom? This is essentially threat modelling in a nutshell. Defining your threat model will give you a goal to work towards. It will act as guidance and a framework that you can work within so that you don’t waste time and money on goals that are not relevant to you. There isn’t a one size fits