Hacking For Dummies. Kevin Beaver

Чтение книги онлайн.

Читать онлайн книгу Hacking For Dummies - Kevin Beaver страница 9

Hacking For Dummies - Kevin  Beaver

Скачать книгу

367

      361  368

      362  369

      363  370

      364  371

      365  372

      366  373

      367  374

      368  375

      369  376

      370  377

      371  378

      372  379

      373 380

      374 381

      375 382

      376 383

      377 384

      378 385

      379 386

      380 387

      381 388

      382 389

      383 390

      384 391

      385 392

      386 393

      387 394

      388 395

      389 396

      390  397

      391  398

      392  399

      393 400

      394  401

      Welcome to Hacking For Dummies, 7th Edition. This book outlines — in plain English — computer hacking tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I refer to as vulnerability and penetration testing or ethical hacking throughout the book.

      Computer and network security is a complex subject and an ever-moving target. You must stay on top of it to ensure that your information is protected from the bad guys and their exploits, including the growing challenges associated with ransomware. The techniques and tools outlined in this book can help.

      You could implement all the security technologies and other best practices possible, and your network environment might be secure — as far as you know. But unless and until you understand how malicious attackers think, apply that knowledge, and use the right tools to assess your systems from their point of view, it’s practically impossible to have a true sense of how secure your systems and information really are.

      Ethical hacking (or, more simply, security assessments), which encompasses formal and methodical vulnerability and penetration testing, is necessary to find security flaws and to validate that your information systems are truly secure on an ongoing basis.

      Given the COVID-19 situation, ensuring security is especially critical today. With so many people working from home and outside the traditional enterprise network security controls, hacking and related breaches are off the charts. It’s clear that businesses are having to adapt to new ways of working. IT and security professionals are also grappling with the associated emerging technologies, and that’s only further complicating security. It’s a tricky place to be and not an enviable position. Still, it represents an opportunity for learning and improving, so it’s not all bad.

      Hacking For Dummies is a reference guide for hacking your systems to improve security and minimize business risks. The security testing techniques are based on written and unwritten rules of computer system vulnerability and penetration testing and information security best practices. This book covers everything from establishing your testing plan to assessing your systems to plugging the holes and managing an ongoing security testing program.

      Realistically, for most networks, operating systems, and applications, thousands of possible vulnerabilities exist. I don’t cover them all, but I do cover the big ones on various platforms and systems that I believe contribute to most security problems in business today. I cover basic Pareto principle (80/20 rule) stuff, with the goal of helping you find the 20 percent of the issues that create 80 percent of your security risks. Whether you need to assess security vulnerabilities on a small home-office network, a medium-size corporate network, or across a large enterprise, Hacking For Dummies provides the information you need.

      This book includes the following features:

       Various technical and nontechnical tests and their detailed methodologies

       Specific countermeasures to protect against hacking and breaches

      Before you start testing your systems, familiarize yourself with the information in Part 1 so that you’re prepared for the tasks at hand. The adage “If you fail to plan, you plan to fail” rings true for the security assessment process. You must have a solid game plan in place if you’re going to be successful.

      Okay, now that that’s out of the way, let’s get to the good stuff! This book is for you if you’re a network administrator, IT or information security manager, security consultant, security auditor, compliance manager, or otherwise interested in finding out more about evaluating computer systems, software, and IT operations for security flaws and, of course, making long-term improvements.

      I also make a few assumptions about you, the

Скачать книгу