The book beings with introduction to Cyber Security. Chapter-1 discusses the alarming growth rate of Cyber Crime and its consequences. It acquaints the users with the risks and vulnerabilities of the cyber world. It emphasises on the need of a secured IT infrastructure. • It focuses on the risks and vulnerabilities associated with a computer system due to weak security measures. File systems, Local Security Policies, Tools to Secure Desktop has been exhaustively dealt. • It describes the functions of Operating System and vulnerabilities related to it. The steps to harden the Windows OS is supported by several images/clips to augment the understanding of the concepts. The risks and vulnerabilities related to various ports have been also explained. • It discusses Computer Networking, Internet, Internet Protocol (IP), Email Attacks, Spoofing and risks and vulnerabilities associated in a networked environment. LAN Security Tools and Network Vulnerability Scanners have been discussed in a stepwise manner supported by illustrations. • It discusses various types of malicious codes like – Virus, Malware, Spyware, Adware, Worms, Trojans, Key Loggers etc. A list of free online Antivirus Scans has been provided followed by the precautionary steps. • It deals with cryptography and Public Key Infrastructure. Introduces Hashing Algorithms and the encryption methods (Symmetric Key and Public Key Encryption). Discusses the concept and need of Digital Signature Certificates, Certifying Authority and Public Key Infrastructure Tools. • It primarily focuses on various hacker exploits and its counter measures. Describes various types of Network Attacks like Spoofing, Sniffing, Mapping, Hijacking, Trojans, DOS, DDOS etc. Also discusses Web and Network Security through SSL, IPSec, VPN, Firewalls etc. • Discusses about Cyber Crimes, its types and motive behind Cyber Crimes. Select Cases of Cyber Crimes have been discussed. • Introduces Information System Audit, Professional Standards for Audits, Information System Audit and Control Association, Need for Information System Auditor, Objectives of Information System(IS) Audit, Information System Audit versus Conventional Audit, Information System Control Objectives, Phases of Information System Audit and finally the Information System Check-List.
Dr. Namrata Agrawal is faculty (Computers & MIS) from National Institute of Financial Management (Under Ministry of Finance), Faridabad. Her other books count to Comdex Tally 9 Course Kit, Financial Accounting Using Tally 6.3 and Comdex Tally 7.2 Course Kit