ABSTRACT

When people are prepared to apply cybersecurity ideas and theory to practical application in the real world, they equip themselves with tools to better enable the successful outcome of their efforts. But do they choose the right tools? The focus of this chapter is to identify functional areas in which cybersecurity tools are available and to list examples in each area to demonstrate how tools are better suited to provide insight in one area over the other. In particular, this chapter studies boundary tools (e.g., firewalls, antivirus software), network monitoring tools, memory protection tools, memory forensics tools, and password protection software. We will go through the most widely used of these tools, and most importantly, we will give hints on how to configure them and understand their intended purposes.