Making Sense of Cyber Security
Thomas Kranz
  • MEAP began October 2020
  • Publication in Summer 2021 (estimated)
  • ISBN 9781617298004
  • 300 pages (estimated)
  • printed in black & white

It opened my eyes to just how shockingly under-secured some major parts of modern comms infrastructure really is!

Derek Hampton
A jargon-free, practical guide to the key concepts, terminology, and technologies of cybersecurity perfect for anyone planning or implementing a security strategy.

Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cyber Security is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts effectively.

About the Technology

Every high-profile data breach underlines the need for cybersecurity. A proper understanding of threats, vulnerabilities, and most-likely attacks empowers you to make better decisions and mitigate risks.

About the book

Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.

Renowned security expert Tom Kranz teaches you to think like a hacker, ensuring you can spot your own weak points and evaluate risks in new technologies or processes. You'll cement this mindset by planning your own penetration test—taking on the role of the attacker in a simulated hack against an asset management firm. Finally, you'll work through a real-world security breach, learning how to respond to live threats and apply the lessons learned to your own organization.
Table of Contents detailed table of contents

1 Cyber Security and Hackers

1.1 Cyber security: how it has evolved

1.2 Why should you care about cyber security?

1.3 Who is the ideal reader for this book?

1.4 How does hacking — and defending - work?

1.5 What will you learn in this book?

1.6 What we won’t be covering

1.6.1 Denial of Service attacks

1.6.2 Encryption

1.7 What tools do you need to get started?

2 Cyber Security: everyone’s problem

2.1 Keeping it simple

2.2 Impacts of a security breach

2.3 Objectives of a Cyber Security Strategy

2.4 Supporting our strategy: building a patching policy

2.4.1 Building a patching policy

2.4.2 Exercise: How do we patch for CVE-2018-0101

2.5 A culture of security

2.6 How ready are you?

2.7 Summary

Part 1: The Black Hats: Thinking like the bad guys

3 Understanding Hackers

3.1 Who are the Hackers?

3.1.1 Black Hat

3.1.2 Grey Hat

3.1.3 White Hat

3.2 Where do they come from?

3.2.1 Black Hat hacker: Alberto Gonzalez

3.2.2 Grey Hat hacker: Sabu and the Anonymous collective

3.2.3 White Hat hacker: mudge

3.2.4 The Hacker Mindset

3.3 What are they capable of?

3.3.1 Black Hats

3.3.2 Grey Hats

3.3.3 White Hats

3.4 Working through a real-life problem: How do hackers think?

3.4.1 Breaking a financial services website

3.4.2 Combing The Hacker Mindset with the OODA loop

3.5 Summary

4 External Attacks

4.1 How do hackers get in?

4.1.1 Home Setup

4.1.2 Corporate Network

4.2 Data injection attacks

4.2.1 SQL Injection (SQLi)

4.2.2 Defenses

4.2.3 Cross-Site Scripting (XSS)

4.2.4 Defenses

4.3 Malware: Viruses, Trojans, and Ransomware

4.3.1 Viruses

4.3.2 Trojans

4.3.3 Ransomware

4.3.4 Protection

4.3.5 The Four Golden Rules of Malware Security:

4.4 Dodgy Wifi

4.4.1 Defenses

4.5 Mobile phones, SMS, and 5G

4.5.1 Malware

4.5.2 IMEI cloning

4.5.3 SMS spoofing

4.5.4 Problems with 5G

4.5.5 Keeping safe

4.6 Chapter Summary

5 Tricking your way in: Social engineering

6 Internal Attacks

7 The Dark Web: Where is stolen data traded?

Part 2: The White Hats: Thinking like the good guys

8 Understanding your risk

9 Testing your systems

10 Inside the Security Operations Centre

11 Protecting the People

12 After the Hack

What's inside

  • Develop and incrementally improve your own cybersecurity strategy
  • Detect rogue WiFi networks and safely browse on public WiFi
  • Protect against physical attacks utilizing USB devices or building access cards
  • Use the OODA loop and a hacker mindset to plan out your own attacks
  • Connect to and browse the Dark Web
  • Apply threat models to build, measure, and improve your defenses
  • Respond to a detected cyber attack and work through a security breach

About the reader

For security-conscious professionals. No IT skills or cybersecurity experience required.

About the author

Tom Kranz is a cybersecurity consultant with almost 30 years' experience in IT. After a successful career helping UK Government departments and private sector clients, Tom now advises and supports organizations on their security strategy and challenges.

placing your order...

Don't refresh or navigate away from the page.
Manning Early Access Program (MEAP) Read chapters as they are written, get the finished eBook as soon as it’s ready, and receive the pBook long before it's in bookstores.
print book $24.99 $49.99 pBook + eBook + liveBook
Additional shipping charges may apply
Making Sense of Cyber Security (print book) added to cart
continue shopping
go to cart

eBook $19.99 $39.99 3 formats + liveBook
Making Sense of Cyber Security (eBook) added to cart
continue shopping
go to cart

Prices displayed in rupees will be charged in USD when you check out.
customers also reading

This book

FREE domestic shipping on three or more pBooks