<p>Introduction xxiv</p> <p><strong>Chapter 1</strong> Introduction to Security 3</p> <p>Foundation Topics 4</p> <p>Security 101 4</p> <p>The CIA of Computer Security 4</p> <p>The Basics of Information Security 6</p> <p>Think Like a Hacker 9</p> <p>Threat Actor Types and Attributes 10</p> <p>Chapter Review Activities 12</p> <p>Review Key Topics 12</p> <p>Define Key Terms 12</p> <p>Review Questions 13</p> <p>Answers and Explanations 15</p> <p><strong>Chapter 2</strong> Computer Systems Security Part I 19</p> <p>Foundation Topics 19</p> <p>Malicious Software Types 19</p> <p>Viruses 20</p> <p>Worms 21</p> <p>Trojan Horses 22</p> <p>Ransomware 22</p> <p>Spyware 23</p> <p>Rootkits 24</p> <p>Spam 25</p> <p>Summary of Malware Threats 25</p> <p>Delivery of Malware 26</p> <p>Via Software, Messaging, and Media 26</p> <p>Botnets and Zombies 28</p> <p>Active Interception 28</p> <p>Privilege Escalation 29</p> <p>Backdoors 29</p> <p>Logic Bombs 29</p> <p>Preventing and Troubleshooting Malware 30</p> <p>Preventing and Troubleshooting Viruses 31</p> <p>Preventing and Troubleshooting Worms and Trojans 35</p> <p>Preventing and Troubleshooting Spyware 35</p> <p>Preventing and Troubleshooting Rootkits 38</p> <p>Preventing and Troubleshooting Spam 38</p> <p>You Can't Save Every Computer from Malware! 40</p> <p>Summary of Malware Prevention Techniques 40</p> <p>Chapter Summary 41</p> <p>Chapter Review Activities 42</p> <p>Review Key Topics 42</p> <p>Define Key Terms 42</p> <p>Complete the Real-World Scenarios 43</p> <p>Review Questions 43</p> <p>Answers and Explanations 48</p> <p><strong>Chapter 3</strong> Computer Systems Security Part II 53</p> <p>Foundation Topics 53</p> <p>Implementing Security Applications 53</p> <p>Personal Software Firewalls 53</p> <p>Host-Based Intrusion Detection Systems 55</p> <p>Pop-Up Blockers 57</p> <p>Data Loss Prevention Systems 59</p> <p>Securing Computer Hardware and Peripherals 59</p> <p>Securing the BIOS 60</p> <p>Securing Storage Devices 62</p> <p>Removable Storage 62</p> <p>Network Attached Storage 63</p> <p>Whole Disk Encryption 64</p> <p>Hardware Security Modules 65</p> <p>Securing Wireless Peripherals 66</p> <p>Securing Mobile Devices 66</p> <p>Malware 67</p> <p>Botnet Activity 68</p> <p>SIM Cloning and Carrier Unlocking 68</p> <p>Wireless Attacks 69</p> <p>Theft 70</p> <p>Application Security 71</p> <p>BYOD Concerns 74</p> <p>Chapter Summary 78</p> <p>Chapter Review Activities 79</p> <p>Review Key Topics 79</p> <p>Define Key Terms 79</p> <p>Complete the Real-World Scenarios 80</p> <p>Review Questions 80</p> <p>Answers and Explanations 83</p> <p><strong>Chapter 4</strong> OS Hardening and Virtualization 89</p> <p>Foundation Topics 89</p> <p>Hardening Operating Systems 89</p> <p>Removing Unnecessary Applications and Services 90</p> <p>Windows Update, Patches, and Hotfixes 97</p> <p>Patches and Hotfixes 99</p> <p>Patch Management 101</p> <p>Group Policies, Security Templates, and Configuration Baselines 102</p> <p>Hardening File Systems and Hard Drives 105</p> <p>Virtualization Technology 109</p> <p>Types of Virtualization and Their Purposes 110</p> <p>Hypervisor 111</p> <p>Securing Virtual Machines 113</p> <p>Chapter Summary 115</p> <p>Chapter Review Activities 117</p> <p>Review Key Topics 117</p> <p>Define Key Terms 118</p> <p>Complete the Real-World Scenarios 118</p> <p>Review Questions 118</p> <p>Answers and Explanations 122</p> <p><strong>Chapter 5</strong> Application Security 127</p> <p>Foundation Topics 127</p> <p>Securing the Browser 127</p> <p>General Browser Security Procedures 129</p> <p>Implement Policies 129</p> <p>Train Your Users 133</p> <p>Use a Proxy and Content Filter 133</p> <p>Secure Against Malicious Code 135</p> <p>Web Browser Concerns and Security Methods 135</p> <p>Basic Browser Security 135</p> <p>Cookies 136</p> <p>LSOs 137</p> <p>Add-ons 137</p> <p>Advanced Browser Security 138</p> <p>Securing Other Applications 140</p> <p>Secure Programming 144</p> <p>Software Development Life Cycle 145</p> <p>Core SDLC and DevOps Principles 146</p> <p>Programming Testing Methods 149</p> <p>White-box and Black-box Testing 149</p> <p>Compile-Time Errors Versus Runtime Errors 150</p> <p>Input Validation 150</p> <p>Static and Dynamic Code Analysis 151</p> <p>Fuzz Testing 152</p> <p>Programming Vulnerabilities and Attacks 152</p> <p>Backdoors 153</p> <p>Memory/Buffer Vulnerabilities 153</p> <p>Arbitrary Code Execution/Remote Code Execution 155</p> <p>XSS and XSRF 155</p> <p>More Code Injection Examples 156</p> <p>Directory Traversal 158</p> <p>Zero Day Attack 158</p> <p>Chapter Summary 160</p> <p>Chapter Review Activities 161</p> <p>Review Key Topics 161</p> <p>Define Key Terms 162</p> <p>Complete the Real-World Scenarios 162</p> <p>Review Questions 162</p> <p>Answers and Explanations 167</p> <p><strong>Chapter 6</strong> Network Design Elements 173</p> <p>Foundation Topics 173</p> <p>Network Design 173</p> <p>The OSI Model 173</p> <p>Network Devices 175</p> <p>Switch 175</p> <p>Bridge 178</p> <p>Router 178</p> <p>Network Address Translation, and Private Versus Public IP 180</p> <p>Network Zones and Interconnections 182</p> <p>LAN Versus WAN 182</p> <p>Internet 183</p> <p>Demilitarized Zone (DMZ) 183</p> <p>Intranets and Extranets 184</p> <p>Network Access Control (NAC) 185</p> <p>Subnetting 186</p> <p>Virtual Local Area Network (VLAN) 188</p> <p>Telephony 190</p> <p>Modems 190</p> <p>PBX Equipment 191</p> <p>VoIP 191</p> <p>Cloud Security and Server Defense 192</p> <p>Cloud Computing 192</p> <p>Cloud Security 195</p> <p>Server Defense 198</p> <p>File Servers 198</p> <p>Network Controllers 199</p> <p>E-mail Servers 199</p> <p>Web Servers 200</p> <p>FTP Server 202</p> <p>Chapter Summary 203</p> <p>Chapter Review Activities 205</p> <p>Review Key Topics 205</p> <p>Define Key Terms 205</p> <p>Complete the Real-World Scenarios 205</p> <p>Review Questions 206</p> <p>Answers and Explanations 210</p> <p><strong>Chapter 7</strong> Networking Protocols and Threats 217</p> <p>Foundation Topics 217</p> <p>Ports and Protocols 217</p> <p>Port Ranges, Inbound Versus Outbound, and Common Ports 217</p> <p>Protocols That Can Cause Anxiety on the Exam 225</p> <p>Malicious Attacks 226</p> <p>DoS 226</p> <p>DDoS 229</p> <p>Sinkholes and Blackholes 230</p> <p>Spoofing 231</p> <p>Session Hijacking 232</p> <p>Replay 234</p> <p>Null Sessions 235</p> <p>Transitive Access and Client-Side Attacks 236</p> <p>DNS Poisoning and Other DNS Attacks 236</p> <p>ARP Poisoning 238</p> <p>Summary of Network Attacks 238</p> <p>Chapter Summary 242</p> <p>Chapter Review Activities 243</p> <p>Review Key Topics 243</p> <p>Define Key Terms 243</p> <p>Complete the Real-World Scenarios 243</p> <p>Review Questions 244</p> <p>Answers and Explanations 250</p> <p><strong>Chapter 8</strong> Network Perimeter Security 255</p> <p>Foundation Topics 256</p> <p>Firewalls and Network Security 256</p> <p>Firewalls 256</p> <p>Proxy Servers 263</p> <p>Honeypots and Honeynets 266</p> <p>Data Loss Prevention (DLP) 267</p> <p>NIDS Versus NIPS 268</p> <p>NIDS 268</p> <p>NIPS 269</p> <p>Summary of NIDS Versus NIPS 271</p> <p>The Protocol Analyzer's Role in NIDS and NIPS 271</p> <p>Unified Threat Management 272</p> <p>Chapter Summary 273</p> <p>Chapter Review Activities 274</p> <p>Review Key Topics 274</p> <p>Define Key Terms 274</p> <p>Complete the Real-World Scenarios 274</p> <p>Review Questions 275</p> <p>Answers and Explanations 280</p> <p><strong>Chapter 9</strong> Securing Network Media and Devices 285</p> <p>Foundation Topics 285</p> <p>Securing Wired Networks and Devices 285</p> <p>Network Device Vulnerabilities 285</p> <p>Default Accounts 286</p> <p>Weak Passwords 286</p> <p>Privilege Escalation 287</p> <p>Back Doors 288</p> <p>Network Attacks 289</p> <p>Other Network Device Considerations 289</p> <p>Cable Media Vulnerabilities 289</p> <p>Interference 290</p> <p>Crosstalk 291</p> <p>Data Emanation 292</p> <p>Tapping into Data and Conversations 293</p> <p>Securing Wireless Networks 295</p> <p>Wireless Access Point Vulnerabilities 295</p> <p>The Administration Interface 295</p> <p>SSID Broadcast 296</p> <p>Rogue Access Points 296</p> <p>Evil Twin 297</p> <p>Weak Encryption 297</p> <p>Wi-Fi Protected Setup 299</p> <p>Ad Hoc Networks 299</p> <p>VPN over Open Wireless 300</p> <p>Wireless Access Point Security Strategies 300</p> <p>Wireless Transmission Vulnerabilities 304</p> <p>Bluetooth and Other Wireless Technology Vulnerabilities 305</p> <p>Bluejacking 306</p> <p>Bluesnarfing 306</p> <p>RFID and NFC 307</p> <p>More Wireless Technologies 308</p> <p>Chapter Summary 310</p> <p>Chapter Review Activities 312</p> <p>Review Key Topics 312</p> <p>Define Key Terms 312</p> <p>Complete the Real-World Scenarios 312</p> <p>Review Questions 313</p> <p>Answers and Explanations 317</p> <p><strong>Chapter 10</strong> Physical Security and Authentication Models 321</p> <p>Foundation Topics 322</p> <p>Physical Security 322</p> <p>General Building and Server Room Security 323</p> <p>Door Access 324</p> <p>Biometric Readers 326</p> <p>Authentication Models and Components 327</p> <p>Authentication Models 327</p> <p>Localized Authentication Technologies 329</p> <p>802.1X and EAP 330</p> <p>LDAP 333</p> <p>Kerberos and Mutual Authentication 334</p> <p>Remote Desktop Services 336</p> <p>Remote Authentication Technologies 337</p> <p>Remote Access Service 337</p> <p>Virtual Private Networks 340</p> <p>RADIUS Versus TACACS 343</p> <p>Chapter Summary 345</p> <p>Chapter Review Activities 346</p> <p>Review Key Topics 346</p> <p>Define Key Terms 347</p> <p>Complete the Real-World Scenarios 347</p> <p>Review Questions 347</p> <p>Answers and Explanations 355</p> <p><strong>Chapter 11</strong> Access Control Methods and Models 361</p> <p>Foundation Topic 361</p> <p>Access Control Models Defined 361</p> <p>Discretionary Access Control 361</p> <p>Mandatory Access Control 363</p> <p>Role-Based Access Control (RBAC) 364</p> <p>Attribute-based Access Control (ABAC) 365</p> <p>Access Control Wise Practices 366</p> <p>Rights, Permissions, and Policies 369</p> <p>Users, Groups, and Permissions 369</p> <p>Permission Inheritance and Propagation 374</p> <p>Moving and Copying Folders and Files 376</p> <p>Usernames and Passwords 376</p> <p>Policies 379</p> <p>User Account Control (UAC) 383</p> <p>Chapter Summary 384</p> <p>Chapter Review Activities 385</p> <p>Review Key Topics 385</p> <p>Define Key Terms 386</p> <p>Complete the Real-World Scenarios 386</p> <p>Review Questions 386</p> <p>Answers and Explanations 392</p> <p><strong>Chapter 12</strong> Vulnerability and Risk Assessment 397</p> <p>Foundation Topics 397</p> <p>Conducting Risk Assessments 397</p> <p>Qualitative Risk Assessment 399</p> <p>Quantitative Risk Assessment 400</p> <p>Security Analysis Methodologies 402</p> <p>Security Controls 404</p> <p>Vulnerability Management 405</p> <p>Penetration Testing 407</p> <p>OVAL 408</p> <p>Additional Vulnerabilities 409</p> <p>Assessing Vulnerability with Security Tools 410</p> <p>Network Mapping 411</p> <p>Vulnerability Scanning 412</p> <p>Network Sniffing 415</p> <p>Password Analysis 417</p> <p>Chapter Summary 420</p> <p>Chapter Review Activities 421</p> <p>Review Key Topics 421</p> <p>Define Key Terms 422</p> <p>Complete the Real-World Scenarios 422</p> <p>Review Questions 422</p> <p>Answers and Explanations 428</p> <p><strong>Chapter 13</strong> Monitoring and Auditing 435</p> <p>Foundation Topics 435</p> <p>Monitoring Methodologies 435</p> <p>Signature-Based Monitoring 435</p> <p>Anomaly-Based Monitoring 436</p> <p>Behavior-Based Monitoring 436</p> <p>Using Tools to Monitor Systems and Networks 437</p> <p>Performance Baselining 438</p> <p>Protocol Analyzers 440</p> <p>Wireshark 441</p> <p>SNMP 443</p> <p>Analytical Tools 445</p> <p>Use Static and Dynamic Tools 447</p> <p>Conducting Audits 448</p> <p>Auditing Files 448</p> <p>Logging 451</p> <p>Log File Maintenance and Security 455</p> <p>Auditing System Security Settings 457</p> <p>SIEM 460</p> <p>Chapter Summary 461</p> <p>Chapter Review Activities 462</p> <p>Review Key Topics 462</p> <p>Define Key Terms 463</p> <p>Complete the Real-World Scenarios 463</p> <p>Review Questions 463</p> <p>Answers and Explanations 470</p> <p><strong>Chapter 14</strong> Encryption and Hashing Concepts 477</p> <p>Foundation Topics 477</p> <p>Cryptography Concepts 477</p> <p>Symmetric Versus Asymmetric Key Algorithms 481</p> <p>Symmetric Key Algorithms 481</p> <p>Asymmetric Key Algorithms 483</p> <p>Public Key Cryptography 483</p> <p>Key Management 484</p> <p>Steganography 485</p> <p>Encryption Algorithms 486</p> <p>DES and 3DES 486</p> <p>AES 487</p> <p>RC 488</p> <p>Blowfish and Twofish 489</p> <p>Summary of Symmetric Algorithms 489</p> <p>RSA 490</p> <p>Diffie-Hellman 491</p> <p>Elliptic Curve 492</p> <p>More Encryption Types 493</p> <p>One-Time Pad 493</p> <p>PGP 494</p> <p>Pseudorandom Number Generators 495</p> <p>Hashing Basics 496</p> <p>Cryptographic Hash Functions 498</p> <p>MD5 498</p> <p>SHA 498</p> <p>RIPEMD and HMAC 499</p> <p>LANMAN, NTLM, and NTLMv2 500</p> <p>LANMAN 500</p> <p>NTLM and NTLMv2 501</p> <p>Hashing Attacks 502</p> <p>Pass the Hash 502</p> <p>Happy Birthday! 503</p> <p>Additional Password Hashing Concepts 503</p> <p>Chapter Summary 505</p> <p>Chapter Review Activities 507</p> <p>Review Key Topics 507</p> <p>Define Key Terms 507</p> <p>Complete the Real-World Scenarios 508</p> <p>Review Questions 508</p> <p>Answers and Explanations 515</p> <p><strong>Chapter 15</strong> PKI and Encryption Protocols 521</p> <p>Foundation Topics 521</p> <p>Public Key Infrastructure 521</p> <p>Certificates 522</p> <p>SSL Certificate Types 522</p> <p>Single-Sided and Dual-Sided Certificates 523</p> <p>Certificate Chain of Trust 523</p> <p>Certificate Formats 523</p> <p>Certificate Authorities 525</p> <p>Web of Trust 529</p> <p>Security Protocols 529</p> <p>S/MIME 530</p> <p>SSL/TLS 531</p> <p>SSH 532</p> <p>PPTP, L2TP, and IPsec 533</p> <p>PPTP 533</p> <p>L2TP 534</p> <p>IPsec 534</p> <p>Chapter Summary 535</p> <p>Chapter Review Activities 536</p> <p>Review Key Topics 536</p> <p>Define Key Terms 536</p> <p>Complete the Real-World Scenarios 537</p> <p>Review Questions 537</p> <p>Answers and Explanations 542</p> <p><strong>Chapter 16</strong> Redundancy and Disaster Recovery 547</p> <p>Foundation Topics 547</p> <p>Redundancy Planning 547</p> <p>Redundant Power 549</p> <p>Redundant Power Supplies 551</p> <p>Uninterruptible Power Supplies 551</p> <p>Backup Generators 553</p> <p>Redundant Data 555</p> <p>Redundant Networking 558</p> <p>Redundant Servers 560</p> <p>Redundant Sites 561</p> <p>Redundant People 562</p> <p>Disaster Recovery Planning and Procedures 562</p> <p>Data Backup 562</p> <p>DR Planning 567</p> <p>Chapter Summary 571</p> <p>Chapter Review Activities 572</p> <p>Review Key Topics 572</p> <p>Define Key Terms 572</p> <p>Complete the Real-World Scenarios 573</p> <p>Review Questions 573</p> <p>Answers and Explanations 577</p> <p><strong>Chapter 17</strong> Social Engineering, User Education, and Facilities Security 583</p> <p>Foundation Topics 583</p> <p>Social Engineering 583</p> <p>Pretexting 584</p> <p>Malicious Insider 585</p> <p>Diversion Theft 586</p> <p>Phishing 586</p> <p>Hoaxes 587</p>