Open5

#ComputerSecurityFundamentals

gkzgkz

Computer Security Fundamentals, 4th Edition

Introduction

1 Introduction to Computer Security
2 Networks and the Internet
3 Cyber Stalking, Fraud, and Abuse
4 Denial of Service Attacks
5 Malware
6 Techniques Used by Hackers
7 Industrial Espionage in Cyberspace
8 Encryption
9 Computer Security Technology
10 Security Policies
11 Network Scanning and Vulnerability Scanning
12 Cyber Terrorism and Information Warfare
13 Cyber Detective
14 Introduction to Forensics
15 Cybersecurity Engineering

Glossary
Appendix A: Resources
Appendix B: Answers to the Multiple Choice Questions

About the author

  • Linkedin says to me:
    • Dr. Chuck Easttom is currently in his own consulting practice both consulting and conducting research. He is also an adjunct lecturer at Georgetown University. He is the author of 31 books, including several on computer security, forensics, and cryptography. His books are used at over 60 universities. He has also authored scientific papers (over 70 so far) on digital forensics, machine learning/AI, cyber warfare, cryptography, bio-engineering, and applied mathematics.

    • Source: Chuck Easttom, M.Ed., MBA, MSSE, Ph.D., D.Sc. | LinkedIn
gkzgkz

Introduction

  • Who is this book for?

    • The book is in textbook format, making it ideal for introductory computer security courses that have no specific prerequisites.


  • computer-savvy
    • So someone who is COMPUTER SAVVY means they have good experience with using computers. It can sometimes be seen as computer-savvy. Those who have poor skills in using computers would not be computer savvy. It usually refers to someone who can do more than just type an email or create a Word document.

    • Source: Fun English learning site for students and teachers - The English Student
gkzgkz

Chapter 4: Denial of Service Attacks

Introduction
DoS Attacks
Illustrating an Attack
Distributed Reflection Denial of Service Attacks
Common Tools Used for DoS Attacks
Low Orbit Ion Cannon
XOIC
TFN and TFN2K
Stacheldraht
DoS Weaknesses
Specific DoS Attacks
TCP SYN Flood Attacks
Smurf IP Attacks
UDP Flood Attacks
ICMP Flood Attacks
The Ping of Death
Teardrop Attacks
DHCP Starvation
HTTP POST DoS Attacks
PDoS Attacks
Registration DoS Attacks
Login DoS Attacks
Land Attacks
DDoS Attacks
Real-World Examples of DoS Attacks
Boston Globe Attack
Memcache Attacks
MyDoom
DDoS Blackmail
Mirai
How to Defend Against DoS Attacks
Summary
Test Your Skills