Book Image

Cybersecurity: The Beginner's Guide

By : Dr. Erdal Ozkaya
5 (2)
Book Image

Cybersecurity: The Beginner's Guide

5 (2)
By: Dr. Erdal Ozkaya

Overview of this book

It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.
Table of Contents (14 chapters)

IoT security

In the first two quarters of 2018, IoT devices grew at an unprecedented rate to hit a total of 7 billion devices. It has been projected that there may be 20.8 billion IoT devices in active use by 2020.

You can find more about this at https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/.

Going by the numbers from the first two quarters of 2018, the numbers are going to grow quickly. However, there has been a major challenge with IoT devices regarding their security. These devices have been flooded into the market by different manufacturers while lacking the bare minimum security requirements. As a result, many botnets are being formed using these devices.

Botnets are malicious networks of internet-connected devices that are used for performing denial-of-service attacks, or spamming. One of the most powerful botnets today is called...