ABSTRACT

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field.

FEATURES

  • Presents descriptions for each type of cybersecurity technology and their specifications
  • Explains applications, usages, and offers case studies to enhance comprehension
  • Offers an easy-to-understand classification of existing cybersecurity technologies
  • Provides an understanding of the technologies without getting lost in technical details
  • Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies

This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.

chapter 1|4 pages

Cybersecurity Technologies Classification

chapter 2|10 pages

Encryption

chapter 3|12 pages

Authentication

chapter 4|12 pages

Biometrics

chapter 5|10 pages

Firewall Technologies

chapter 6|8 pages

Virus Detection

chapter 7|12 pages

Phishing Detection

chapter 8|10 pages

Endpoint Protection

chapter 9|10 pages

Malware Protection Technology

chapter 10|12 pages

The Internet of Things (IoT)

chapter 11|12 pages

Network Security

chapter 12|10 pages

Location Tracking

chapter 13|12 pages

Surveillance

chapter 14|8 pages

Insider Threat Protection

chapter 15|8 pages

Intrusion Detection

chapter 16|8 pages

Vulnerability Scanning

chapter 17|8 pages

Penetration Testing

chapter 18|2 pages

Conclusion