Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Author :
Publisher : CRC Press
Total Pages : 263
Release :
ISBN-10 : 9781000922394
ISBN-13 : 1000922391
Rating : 4/5 (391 Downloads)

Book Synopsis Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II by : Anand Handa

Download or read book Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II written by Anand Handa and published by CRC Press. This book was released on 2023-07-27 with total page 263 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.


Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II Related Books

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Language: en
Pages: 263
Authors: Anand Handa
Categories: Computers
Type: BOOK - Published: 2023-07-27 - Publisher: CRC Press

DOWNLOAD EBOOK

Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and
Implementing Enterprise Cyber Security with Open-source Software and Standard Architecture
Language: en
Pages: 0
Authors: Anand Handa
Categories:
Type: BOOK - Published: 2023 - Publisher:

DOWNLOAD EBOOK

Mastering Classification Algorithms for Machine Learning
Language: en
Pages: 383
Authors: Partha Majumdar
Categories: Computers
Type: BOOK - Published: 2023-05-23 - Publisher: BPB Publications

DOWNLOAD EBOOK

A practical guide to mastering Classification algorithms for Machine learning KEY FEATURES ● Get familiar with all the state-of-the-art classification algorit
Protecting User Privacy in Web Search Utilization
Language: en
Pages: 360
Authors: Khan, Rafi Ullah
Categories: Computers
Type: BOOK - Published: 2023-04-25 - Publisher: IGI Global

DOWNLOAD EBOOK

Online user privacy is a delicate issue that has been unfortunately overlooked by technology corporations and especially the public since the birth of the inter
Enterprise Software Security
Language: en
Pages: 518
Authors: Kenneth R. van Wyk
Categories: Computers
Type: BOOK - Published: 2014-12-01 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER Traditional approaches to securing software are inadequate. The solution: