相關主題
商品描述
In today's world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing that we can do is to mitigate the risks as much as much as possible so that they do not happen at all. But even when a security breach does indeed happen, the immediate reaction is to contain it so that it does not penetrate further into the IT/Network Infrastructure. From there, mission-critical processes need to be restored, until the business can resume a normal state of operations, like it was before the security breach.
But another key step here is to investigate how and why the security breach happened in the first place. The best to do this is through what is known as "Digital Forensics". This is where specially trained Digital Forensics Investigators collect and comb through every piece of evidence to determine this. Eventually, the goal is then to use this evidence in a court of law so the cyberattacker can be made to answer to their crime and eventually be brought to justice.
However, the area of digital forensics is a large one, and many topics around it can be covered. Also, generative AI is being used to not only help in the analysis of the evidence, but also to help automate the Digital Forensics software packages that are available today. Therefore, in this book, the following is covered:
- Examples of security breaches, and overview into Digital Forensics
- How Digital Forensics can be used to investigate the loss or theft of data
- An introduction to the SQL Server Database
- A review of the SQL Injection Attack
- How generative AI can be used in Digital Forensics
商品描述(中文翻譯)
在當今世界,網路安全攻擊和安全漏洞已成為常態。不幸的是,我們並不免疫於此,任何個人和實體都面臨著嚴重的風險。我們能做的最好也是唯一的事情,就是儘可能減輕風險,以防止這些事件的發生。但即使當安全漏洞確實發生時,立即的反應是控制它,以防止其進一步滲透到IT/網路基礎設施中。從那裡開始,必須恢復關鍵任務流程,直到業務能夠恢復到安全漏洞發生之前的正常運作狀態。
但這裡的另一個關鍵步驟是調查安全漏洞最初是如何以及為什麼發生的。最好的方法是通過所謂的「數位取證」。在這裡,專門訓練的數位取證調查員會收集並仔細檢查每一個證據,以確定這一點。最終,目標是將這些證據用於法庭,以便讓網路攻擊者對其罪行負責,並最終受到制裁。
然而,數位取證的領域非常廣泛,許多相關主題都可以涵蓋。此外,生成式AI不僅被用來幫助分析證據,還幫助自動化當前可用的數位取證軟體包。因此,在本書中,將涵蓋以下內容:
- 安全漏洞的範例,以及數位取證的概述
- 如何使用數位取證調查數據的丟失或盜竊
- SQL Server 資料庫的介紹
- SQL 注入攻擊的回顧
- 生成式AI如何應用於數位取證
作者簡介
Ravindra Das is a technical writer in the cybersecurity realm. He also does cybersecurity consulting on the side through his private practice, ML Tech, Inc. He holds the Certified in Cybersecurity certification from the ISC(2).
作者簡介(中文翻譯)
Ravindra Das 是一位在網路安全領域的技術作家。他同時也透過他的私人公司 ML Tech, Inc. 提供網路安全諮詢服務。他持有 ISC(2) 的網路安全認證。