System Fundamentals For Cyber Security

From Wikibooks, open books for an open world
Jump to: navigation, search

Table of Contents[edit]

Introduction

Cyber Threat, 7 Principles of IA, Digital Forensics

Digital Data

Binary, Hex, ASCII, Raw Data v. Compressed Data

Disks

Disk Geometry, Logical Areas of a Disk, Disk Formatting, RAID

Computer Hardware

Motherboard, CPU, Memory, BIOS, I/O, Storage Devices

Operating Systems

Functions, Processes and Resources, File Systems, Booting, Windows, Mac OS X, Linux

Forensics

Forensics Procedures, Data Acquisition, Evidence Analysis, Network Forensics, Web & Artifacts, Email & Artifacts, P2P & Artifacts

Virtual Environments

Virtual Machines, Remote Desktops

Networking

Network Devices, Network Cabling, Wireless, Network Topologies, Network Addressing, DCHP, OSI Model

Data Protection/Privacy

PKI, VPN

Authentication

Password Protection, Password Cracking, Rainbow Tables

Data Confidentiality

Encryption, Steganography, Hashing