Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book’s step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.
Table of Contents
Preface. About the Authors. 1 Computers and Networks. 2 Cybersecurity Basics. 3 Types of Cyberattacks. 4 Recent Cyberattacks and Their Impact. 5 Types of Computer Malware. 6 Securing Your Computers. 7 Password Management. 8 Prevention from Cyberattacks. 9 Wireless Network Security. 10 Secure Online Shopping and Internet Browsing. 11 Mobile Device Security. 12 Cybersecurity Standards. Index.
Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas, and has delivered many keynotes and invited speeches at various international conferences and events, as well as chairing and organising others. He is currently serving as the Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, on top of editing a number of other journals and publishing seven books.
Kutub Thakur Ph.D is the Director of NJCU Center for cybersecurity, Assistant professor and Director of Cybersecurity Program at New Jersey City University. He worked for various private and public entities such as United Nations, Lehman Brothers, Barclays Capital, ConEdison, City University of New York, and Metropolitan Transport Authority. He received his Ph.D. in computer science with specialization in cybersecurity from the Pace University, New York, M.S in Engineering Electrical and computer Control systems from University of Wisconsin, B.S and A.A.S in Computer Systems Technology from the City University of New York.
He has reviewed for many prestigious journals and published many papers in reputable journals and conferences. His research interests include digital forensics, Network security, Machine learning, IoT Security, privacy, and Security and user behaviour.
Dr. Thakur is currently serving/served as the program chair for many conferences and workshop. He is also currently supervising/ supervised many graduate and doctoral students for their thesis, proposal, and dissertation in the field of cyber security.