Waubonsee Community College

Cybersecurity for small networks, a no-nonsense guide for the reasonably paranoid, by Seth Enoka

Label
Cybersecurity for small networks, a no-nonsense guide for the reasonably paranoid, by Seth Enoka
Language
eng
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Cybersecurity for small networks
Oclc number
1334726244
Responsibility statement
by Seth Enoka
Sub title
a no-nonsense guide for the reasonably paranoid
Summary
"This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security--from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity. The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you'll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available."--, Provided by publisher
Table Of Contents
Getting started with a Base Linux system network map -- Architecting and segmenting your network -- Filtering network traffic with firewalls -- Securing wireless networks -- Creating a virtual private network -- Improving browsing and privacy with the Squid Proxy -- Blacking internet advertisements -- Detecting, removing, and preventing malware -- Backing up your data -- Monitoring your network with detection and alerting -- Tips for managing user security on your network
Classification
Content
Mapped to