Computer Security Fundamentals

E-book Engels 2021 9780135774748
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today’s latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a computer security career

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

LEARN HOW TO

Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today’s most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you’re attacked Learn how cyberterrorism and information warfare are evolving

Specificaties

ISBN13:9780135774748
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p style="margin: 0px;">&nbsp;&nbsp;&nbsp; Introduction xxvi<br>Chapter 1: Introduction to Computer Security 2<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2<br>&nbsp;&nbsp;&nbsp; How Seriously Should You Take Threats to Network Security? . . . . . . . . . 4<br>&nbsp;&nbsp;&nbsp; Identifying Types of Threats . . . . . . . . . . . . . . . . . . . . . . . . 7<br>&nbsp;&nbsp;&nbsp; Assessing the Likelihood of an Attack on Your Network . . . . . . . . . . . . 16<br>&nbsp;&nbsp;&nbsp; Basic Security Terminology . . . . . . . . . . . . . . . . . . . . . . . 16<br>&nbsp;&nbsp;&nbsp; Concepts and Approaches . . . . . . . . . . . . . . . . . . . . . . . . 19<br>&nbsp;&nbsp;&nbsp; How Do Legal Issues Impact Network Security? . . . . . . . . . . . . . . . 22<br>&nbsp;&nbsp;&nbsp; Online Security Resources . . . . . . . . . . . . . . . . . . . . . . . . 23<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br>Chapter 2: Networks and the Internet 32<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br>&nbsp;&nbsp;&nbsp; Network Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br>&nbsp;&nbsp;&nbsp; How the Internet Works . . . . . . . . . . . . . . . . . . . . . . . . . 40<br>&nbsp;&nbsp;&nbsp; History of the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . 47<br>&nbsp;&nbsp;&nbsp; Basic Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . 49<br>&nbsp;&nbsp;&nbsp; Other Network Devices . . . . . . . . . . . . . . . . . . . . . . . . . 55<br>&nbsp;&nbsp;&nbsp; Advanced Network Communications Topics . . . . . . . . . . . . . . . . 56<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br>Chapter 3: Cyber Stalking, Fraud, and Abuse 66<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br>&nbsp;&nbsp;&nbsp; How Internet Fraud Works . . . . . . . . . . . . . . . . . . . . . . . . 67<br>&nbsp;&nbsp;&nbsp; Identity Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72<br>&nbsp;&nbsp;&nbsp; Cyber Stalking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89<br>Chapter 4: Denial of Service Attacks 96<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96<br>&nbsp;&nbsp;&nbsp; DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97<br>&nbsp;&nbsp;&nbsp; Illustrating an Attack . . . . . . . . . . . . . . . . . . . . . . . . . . 97<br>&nbsp;&nbsp;&nbsp; Common Tools Used for DoS Attacks . . . . . . . . . . . . . . . . . . . 99<br>&nbsp;&nbsp;&nbsp; DoS Weaknesses . . . . . . . . . . . . . . . . . . . . . . . . . . . 102<br>&nbsp;&nbsp;&nbsp; Specific DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 102<br>&nbsp;&nbsp;&nbsp; Real-World Examples of DoS Attacks . . . . . . . . . . . . . . . . . . . 109<br>&nbsp;&nbsp;&nbsp; How to Defend Against DoS Attacks . . . . . . . . . . . . . . . . . . . 111<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113<br>Chapter 5: Malware 120<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120<br>&nbsp;&nbsp;&nbsp; Viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121<br>&nbsp;&nbsp;&nbsp; Trojan Horses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129<br>&nbsp;&nbsp;&nbsp; The Buffer-Overflow Attack . . . . . . . . . . . . . . . . . . . . . . . 132<br>&nbsp;&nbsp;&nbsp; Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134<br>&nbsp;&nbsp;&nbsp; Other Forms of Malware . . . . . . . . . . . . . . . . . . . . . . . . 137<br>&nbsp;&nbsp;&nbsp; Detecting and Eliminating Viruses and Spyware . . . . . . . . . . . . . . 140<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145<br>Chapter 6: Techniques Used by Hackers 152<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152<br>&nbsp;&nbsp;&nbsp; Basic Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . 153<br>&nbsp;&nbsp;&nbsp; The Reconnaissance Phase . . . . . . . . . . . . . . . . . . . . . . . 153<br>&nbsp;&nbsp;&nbsp; Actual Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162<br>&nbsp;&nbsp;&nbsp; Malware Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . 168<br>&nbsp;&nbsp;&nbsp; Penetration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . 171<br>&nbsp;&nbsp;&nbsp; The Dark Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176<br>Chapter 7: Industrial Espionage in Cyberspace 182<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182<br>&nbsp;&nbsp;&nbsp; What Is Industrial Espionage? . . . . . . . . . . . . . . . . . . . . . . 183<br>&nbsp;&nbsp;&nbsp; Information as an Asset . . . . . . . . . . . . . . . . . . . . . . . . 184<br>&nbsp;&nbsp;&nbsp; Real-World Examples of Industrial Espionage . . . . . . . . . . . . . . . 187<br>&nbsp;&nbsp;&nbsp; How Does Espionage Occur? . . . . . . . . . . . . . . . . . . . . . . 189<br>&nbsp;&nbsp;&nbsp; Low-Tech Industrial Espionage . . . . . . . . . . . . . . . . 189<br>&nbsp;&nbsp;&nbsp; Spyware Used in Industrial Espionage . . . . . . . . . . . . . 193<br>&nbsp;&nbsp;&nbsp; Steganography Used in Industrial Espionage . . . . . . . . . . . 193<br>&nbsp;&nbsp;&nbsp; Phone Taps and Bugs . . . . . . . . . . . . . . . . . . . . 194<br>&nbsp;&nbsp;&nbsp; Protecting Against Industrial Espionage . . . . . . . . . . . . . . . . . . 194<br>&nbsp;&nbsp;&nbsp; The Industrial Espionage Act . . . . . . . . . . . . . . . . . . . . . . 197<br>&nbsp;&nbsp;&nbsp; Spear Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199<br>Chapter 8: Encryption 206<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206<br>&nbsp;&nbsp;&nbsp; Cryptography Basics . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br>&nbsp;&nbsp;&nbsp; History of Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br>&nbsp;&nbsp;&nbsp; Modern Cryptography Methods . . . . . . . . . . . . . . . . . . . . . 216<br>&nbsp;&nbsp;&nbsp; Public Key (Asymmetric) Encryption . . . . . . . . . . . . . . . . . . . 223<br>&nbsp;&nbsp;&nbsp; PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228<br>&nbsp;&nbsp;&nbsp; Legitimate Versus Fraudulent Encryption Methods . . . . . . . . . . . . . 229<br>&nbsp;&nbsp;&nbsp; Digital Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . 230<br>&nbsp;&nbsp;&nbsp; Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230<br>&nbsp;&nbsp;&nbsp; MAC and HMAC . . . . . . . . . . . . . . . . . . . . . . . . . . . 231<br>&nbsp;&nbsp;&nbsp; Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233<br>&nbsp;&nbsp;&nbsp; Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235<br>&nbsp;&nbsp;&nbsp; Cryptography Used on the Internet . . . . . . . . . . . . . . . . . . . . 236<br>&nbsp;&nbsp;&nbsp; Quantum Computing Cryptography . . . . . . . . . . . . . . . . . . . 237<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238<br>Chapter 9: Computer Security Technology 244<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244<br>&nbsp;&nbsp;&nbsp; Virus Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245<br>&nbsp;&nbsp;&nbsp; Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248<br>&nbsp;&nbsp;&nbsp; Antispyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253<br>&nbsp;&nbsp;&nbsp; Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . 265<br>&nbsp;&nbsp;&nbsp; SSL/TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266<br>&nbsp;&nbsp;&nbsp; Virtual Private Networks . . . . . . . . . . . . . . . . . . . . . . . . 268<br>&nbsp;&nbsp;&nbsp; Wi-Fi Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272<br>Chapter 10: Security Policies 278<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278<br>&nbsp;&nbsp;&nbsp; What Is a Policy? . . . . . . . . . . . . . . . . . . . . . . . . . . . 279<br>&nbsp;&nbsp;&nbsp; Defining User Policies . . . . . . . . . . . . . . . . . . . . . . . . . 280<br>&nbsp;&nbsp;&nbsp; Defining System Administration Policies . . . . . . . . . . . . . . . . . . 287<br>&nbsp;&nbsp;&nbsp; New Employees . . . . . . . . . . . . . . . . . . . . . . . 287<br>&nbsp;&nbsp;&nbsp; Departing Employees . . . . . . . . . . . . . . . . . . . . 287<br>&nbsp;&nbsp;&nbsp; Change Requests . . . . . . . . . . . . . . . . . . . . . . 288<br>&nbsp;&nbsp;&nbsp; Security Breaches . . . . . . . . . . . . . . . . . . . . . . 290<br>&nbsp;&nbsp;&nbsp; Virus Infection . . . . . . . . . . . . . . . . . . . . . . . 290<br>&nbsp;&nbsp;&nbsp; DoS Attacks . . . . . . . . . . . . . . . . . . . . . . . . 291<br>&nbsp;&nbsp;&nbsp; Intrusion by a Hacker . . . . . . . . . . . . . . . . . . . . 291<br>&nbsp;&nbsp;&nbsp; Defining Access Control . . . . . . . . . . . . . . . . . . . . . . . . 292<br>&nbsp;&nbsp;&nbsp; Development Policies . . . . . . . . . . . . . . . . . . . . . . . . . 293<br>&nbsp;&nbsp;&nbsp; Standards, Guidelines, and Procedures . . . . . . . . . . . . . . . . . . 294<br>&nbsp;&nbsp;&nbsp; Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 295<br>&nbsp;&nbsp;&nbsp; Important Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300<br>Chapter 11: Network Scanning and Vulnerability Scanning 306<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306<br>&nbsp;&nbsp;&nbsp; Basics of Assessing a System . . . . . . . . . . . . . . . . . . . . . . 307<br>&nbsp;&nbsp;&nbsp; Securing Computer Systems . . . . . . . . . . . . . . . . . . . . . . 315<br>&nbsp;&nbsp;&nbsp; Scanning Your Network . . . . . . . . . . . . . . . . . . . . . . . . 321<br>&nbsp;&nbsp;&nbsp; Getting Professional Help . . . . . . . . . . . . . . . . . . . . . . . . 330<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333<br>Chapter 12: Cyber Terrorism and Information Warfare 342<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342<br>&nbsp;&nbsp;&nbsp; Actual Cases of Cyber Terrorism . . . . . . . . . . . . . . . . . . . . . 343<br>&nbsp;&nbsp;&nbsp; Weapons of Cyber Warfare . . . . . . . . . . . . . . . . . . . . . . . 345<br>&nbsp;&nbsp;&nbsp; Economic Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 347<br>&nbsp;&nbsp;&nbsp; Military Operations Attacks . . . . . . . . . . . . . . . . . . . . . . . 350<br>&nbsp;&nbsp;&nbsp; General Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350<br>&nbsp;&nbsp;&nbsp; Supervisory Control and Data Acquisitions (SCADA) . . . . . . . . . . . . . 351<br>&nbsp;&nbsp;&nbsp; Information Warfare . . . . . . . . . . . . . . . . . . . . . . . . . . 352<br>&nbsp;&nbsp;&nbsp; Actual Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355<br>&nbsp;&nbsp;&nbsp; Future Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359<br>&nbsp;&nbsp;&nbsp; Defense Against Cyber Terrorism . . . . . . . . . . . . . . . . . . . . . 362<br>&nbsp;&nbsp;&nbsp; Terrorist Recruiting and Communication . . . . . . . . . . . . . . . . . . 362<br>&nbsp;&nbsp;&nbsp; TOR and the Dark Web . . . . . . . . . . . . . . . . . . . . . . . . . 363<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365<br>Chapter 13: Cyber Detective 370<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370<br>&nbsp;&nbsp;&nbsp; General Searches . . . . . . . . . . . . . . . . . . . . . . . . . . . 371<br>&nbsp;&nbsp;&nbsp; Court Records and Criminal Checks . . . . . . . . . . . . . . . . . . . 375<br>&nbsp;&nbsp;&nbsp; Usenet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380<br>Chapter 14: Introduction to Forensics 386<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386<br>&nbsp;&nbsp;&nbsp; General Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . 387<br>&nbsp;&nbsp;&nbsp; Finding Evidence on the PC . . . . . . . . . . . . . . . . . . . . . . . 397<br>&nbsp;&nbsp;&nbsp; Finding Evidence in System Logs . . . . . . . . . . . . . . . . . . . . 398<br>&nbsp;&nbsp;&nbsp; Getting Back Deleted Files . . . . . . . . . . . . . . . . . . . . . . . 399<br>&nbsp;&nbsp;&nbsp; Operating System Utilities . . . . . . . . . . . . . . . . . . . . . . . 402<br>&nbsp;&nbsp;&nbsp; The Windows Registry . . . . . . . . . . . . . . . . . . . . . . . . . 404<br>&nbsp;&nbsp;&nbsp; Mobile Forensics: Cell Phone Concepts . . . . . . . . . . . . . . . . . . 408<br>&nbsp;&nbsp;&nbsp; The Need for Forensic Certification . . . . . . . . . . . . . . . . . . . . 413<br>&nbsp;&nbsp;&nbsp; Expert Witnesses . . . . . . . . . . . . . . . . . . . . . . . . . . . 414<br>&nbsp;&nbsp;&nbsp; Additional Types of Forensics . . . . . . . . . . . . . . . . . . . . . . 415<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418<br>Chapter 15: Cybersecurity Engineering 422<br>&nbsp;&nbsp;&nbsp; Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422<br>&nbsp;&nbsp;&nbsp; Defining Cybersecurity Engineering . . . . . . . . . . . . . . . . . . . . 423<br>&nbsp;&nbsp;&nbsp; Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440<br>&nbsp;&nbsp;&nbsp; Test Your Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440<br>Glossary 442<br>Appendix A: Resources 448<br>Appendix B: Answers to the Multiple Choice Questions 450<br>9780135774779, TOC, 8/15/19<br></p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Computer Security Fundamentals