,

Network Defense and Countermeasures

Principles and Practices

Paperback Engels 2018 9780789759962
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Network Defense and Countermeasures: Principles and Practices, Third Edition is designed to be the ideal one-volume gateway into the field of network defense. It brings together thoroughly updated coverage of all basic concepts, terminology, and issues, along with the practical skills essential to network defense. Drawing on his extensive experience as both an IT professional and instructor, Chuck Easttom thoroughly covers core topics such as practical applications of firewalls, intrusion detection systems, encryption fundamentals, operating system hardening, defending against virus attacks, Trojan horses and spyware, Ransomware, malware, security policies and security standards. Unlike many other authors, however, he also fully addresses more specialized issues, including cryptrography, industrial espionage and encryption - including public/private key systems, digital signatures, and certificates.

Specificaties

ISBN13:9780789759962
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 9]><xml> Normal 0 false false false EN-US X-NONE X-NONE </xml><![endif]--> <!--[if gte mso 9]><xml> </xml><![endif]--> <!--[if gte mso 10]> <![endif]--> <p style="margin:0px;">Chapter 1: Introduction to Network Security </p> <p style="margin:0px;">Introduction</p> <p style="margin:0px;">The Basics of a Network </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Basic Network Structure</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Data Packets</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; IP Addresses</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Uniform Resource Locators</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; MAC Addresses </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Protocols</p> <p style="margin:0px;">Basic Network Utilities</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; ipconfig</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; ping</p> <p style="margin:0px;">&nbsp; &nbsp;&nbsp;tracert</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; netstat</p> <p style="margin:0px;">The OSI Model</p> <p style="margin:0px;">What Does This Mean for Security?</p> <p style="margin:0px;">Assessing Likely Threats to the Network</p> <p style="margin:0px;">Classifications of Threats</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Malware</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Compromising System Security–Intrusions</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Denial of Service</p> <p style="margin:0px;">Likely Attacks</p> <p style="margin:0px;">Threat Assessment</p> <p style="margin:0px;">Understanding Security Terminology</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Hacking Terminology</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Terminology</p> <p style="margin:0px;">Choosing a Network Security Approach</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Perimeter Security Approach</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Layered Security Approach</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Hybrid Security Approach</p> <p style="margin:0px;">Network Security and the Law</p> <p style="margin:0px;">Using Security Resources</p> <p style="margin:0px;">Summary</p> <p style="margin:0px;">Chapter 2: Types of Attacks </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Understanding Denial of Service Attacks </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; DoS in Action </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SYN Flood </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Smurf Attack </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Ping of Death </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; UDP Flood </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; ICMP Flood </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; DHCP Starvation </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; HTTP Post DoS </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PDoS </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Distributed Reflection Denial of Service </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; DoS Tools </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Real-World Examples </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Defending Against DoS Attacks </p> <p style="margin:0px;">Defending Against Buffer Overflow Attacks </p> <p style="margin:0px;">Defending Against IP Spoofing </p> <p style="margin:0px;">Defending Against Session Hijacking </p> <p style="margin:0px;">Blocking Virus and Trojan Horse Attacks </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Viruses </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Types of Viruses </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Trojan Horses </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 3: Fundamentals of Firewalls </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">What Is a Firewall? </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Types of Firewalls </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Packet Filtering Firewall </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Stateful Packet Inspection </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Application Gateway </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Circuit Level Gateway </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Hybrid Firewalls </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Blacklisting/Whitelisting </p> <p style="margin:0px;">Implementing Firewalls </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Host-Based </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Dual-Homed Hosts </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Router-Based Firewall </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Screened Hosts </p> <p style="margin:0px;">Selecting and Using a Firewall </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Using a Firewall </p> <p style="margin:0px;">Using Proxy Servers </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The WinGate Proxy Server </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NAT </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 4: Firewall Practical Applications </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Using Single Machine Firewalls </p> <p style="margin:0px;">Windows 10 Firewall </p> <p style="margin:0px;">User Account Control </p> <p style="margin:0px;">Linux Firewalls </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Iptables </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Symantec Norton Firewall </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; McAfee Personal Firewall </p> <p style="margin:0px;">Using Small Office/Home Office Firewalls </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SonicWALL </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; D-Link DFL-2560 Office Firewall </p> <p style="margin:0px;">Using Medium-Sized Network Firewalls </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Check Point Firewall </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cisco Next-Generation Firewalls </p> <p style="margin:0px;">Using Enterprise Firewalls </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 5: Intrusion-Detection Systems </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Understanding IDS Concepts </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Preemptive Blocking </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Anomaly Detection </p> <p style="margin:0px;">IDS Components and Processes </p> <p style="margin:0px;">Understanding and Implementing IDSs </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Snort </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cisco Intrusion-Detection and Prevention </p> <p style="margin:0px;">Understanding and Implementing Honeypots </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Specter </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Symantec Decoy Server </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Intrusion Deflection </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Intrusion Deterrence </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 6: Encryption Fundamentals </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">The History of Encryption </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Caesar Cipher </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; ROT 13 </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Atbash Cipher </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Multi-Alphabet Substitution </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Rail Fence </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Vigenère </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Enigma </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Binary Operations </p> <p style="margin:0px;">Learning About Modern Encryption Methods </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Symmetric Encryption </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Key Stretching </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PRNG </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Public Key Encryption </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Digital Signatures </p> <p style="margin:0px;">Identifying Good Encryption </p> <p style="margin:0px;">Understanding Digital Signatures and Certificates </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Digital Certificates </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PGP Certificates </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; MD5 </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SHA </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; RIPEMD </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; HAVAL </p> <p style="margin:0px;">Understanding and Using Decryption </p> <p style="margin:0px;">Cracking Passwords </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; John the Ripper </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Using Rainbow Tables </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Using Other Password Crackers </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; General Cryptanalysis </p> <p style="margin:0px;">Steganography </p> <p style="margin:0px;">Steganalysis </p> <p style="margin:0px;">Quantum Computing and Quantum Cryptography </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 7: Virtual Private Networks </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Basic VPN Technology </p> <p style="margin:0px;">Using VPN Protocols for VPN Encryption </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PPTP </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PPTP Authentication </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; L2TP </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; L2TP Authentication </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; L2TP Compared to PPTP </p> <p style="margin:0px;">IPSec </p> <p style="margin:0px;">SSL/TLS </p> <p style="margin:0px;">Implementing VPN Solutions </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cisco Solutions </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Service Solutions </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Openswan </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Solutions </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 8: Operating System Hardening </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Configuring Windows Properly </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Accounts, Users, Groups, and Passwords </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Setting Security Policies </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Registry Settings </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Services </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Encrypting File System </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Templates </p> <p style="margin:0px;">Configuring Linux Properly </p> <p style="margin:0px;">Patching the Operating System </p> <p style="margin:0px;">Configuring Browsers </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Securing Browser Settings for Microsoft Internet Explorer </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Browsers </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 9: Defending Against Virus Attacks </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Understanding Virus Attacks </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; What Is a Virus? </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; What Is a Worm? </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; How a Virus Spreads </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Virus Hoax </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Types of Viruses </p> <p style="margin:0px;">Virus Scanners </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Virus Scanning Techniques </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Commercial Antivirus Software </p> <p style="margin:0px;">Antivirus Policies and Procedures </p> <p style="margin:0px;">Additional Methods for Defending Your System </p> <p style="margin:0px;">What to Do If Your System Is Infected by a Virus </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Stopping the Spread of the Virus </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Removing the Virus </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Finding Out How the Infection Started </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 10: Defending Against Trojan Horses, Spyware, and Adware </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Trojan Horses </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Identifying Trojan Horses </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Symptoms of a Trojan Horse </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Why So Many Trojan Horses? </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Preventing Trojan Horses </p> <p style="margin:0px;">Spyware and Adware </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Identifying Spyware and Adware </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Anti-Spyware </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Anti-Spyware Policies </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 11: Security Policies </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Defining User Policies </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Passwords </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Internet Use Policy </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; E-mail Attachments </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Software Installation and Removal </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Instant Messaging </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Desktop Configuration </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Final Thoughts on User Policies </p> <p style="margin:0px;">Defining System Administration Policies </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; New Employees </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Leaving Employees </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Change Requests </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Breaches </p> <p style="margin:0px;">Defining Access Control </p> <p style="margin:0px;">Defining Developmental Policies </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 12: Assessing System Security </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Risk Assessment Concepts </p> <p style="margin:0px;">Evaluating the Security Risk </p> <p style="margin:0px;">Conducting the Initial Assessment </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Patches </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Ports </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Protect </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Physical </p> <p style="margin:0px;">Probing the Network </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetCop </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetBrute </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cerberus </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Port Scanner for Unix: SATAN </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; SAINT </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Nessus </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NetStat Live </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Active Ports </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Port Scanners </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Microsoft Baseline Security Analyzer </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NSAuditor </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NMAP </p> <p style="margin:0px;">Vulnerabilities </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; CVE </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NIST </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; OWASP </p> <p style="margin:0px;">McCumber Cube </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Goals </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Information States </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Safeguards </p> <p style="margin:0px;">Security Documentation </p> <p style="margin:0px;">&nbsp;&nbsp; &nbsp;Physical Security Documentation </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Policy and Personnel Documentation </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Probe Documents </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Protection Documents </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 13: Security Standards </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">COBIT </p> <p style="margin:0px;">ISO Standards </p> <p style="margin:0px;">NIST Standards </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NIST SP 800-14 </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NIST SP 800-35 </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NIST SP 800-30 Rev. 1 </p> <p style="margin:0px;">U.S. DoD Standards </p> <p style="margin:0px;">Using the Orange Book </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; D - Minimal Protection </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; C - Discretionary Protection </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; B - Mandatory Protection </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; A - Verified Protection </p> <p style="margin:0px;">Using the Rainbow Series </p> <p style="margin:0px;">Using the Common Criteria </p> <p style="margin:0px;">Using Security Models </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Bell-LaPadula Model </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Biba Integrity Model </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Clark-Wilson Model </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Chinese Wall Model </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; State Machine Model </p> <p style="margin:0px;">U.S. Federal Regulations, Guidelines, and Standards </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Health Insurance Portability &amp; Accountability Act of 1996 (HIPAA) </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; HITECH </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Sarbanes-Oxley (SOX) </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Computer Fraud and Abuse Act (CFAA): 18 U.S. Code § 1030 </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Fraud and Related Activity in Connection with Access Devices: 18 U.S. Code § 1029 </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; General Data Protection Regulation (GDPR) </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PCI DSS </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 14: Physical Security and Disaster Recovery </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Physical Security </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Equipment Security </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Securing Building Access </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Monitoring </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Fire Protection </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; General Premises Security </p> <p style="margin:0px;">Disaster Recovery </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Disaster Recovery Plan </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Business Continuity Plan </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Determining Impact on Business </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Testing Disaster Recovery </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Disaster Recovery Related Standards </p> <p style="margin:0px;">Ensuring Fault Tolerance </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 15: Techniques Used by Attackers </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Preparing to Hack </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Passively Searching for Information </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Active Scanning </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; NSAuditor </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Enumerating </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Nmap </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Shodan.io </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Manual Scanning </p> <p style="margin:0px;">The Attack Phase </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Physical Access Attacks </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Remote Access Attacks </p> <p style="margin:0px;">Wi-Fi Hacking </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 16: Introduction to Forensics </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">General Forensics Guidelines </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; EU Evidence Gathering </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Scientific Working Group on Digital Evidence </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; U.S. Secret Service Forensics Guidelines </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Don’t Touch the Suspect Drive </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Leave a Document Trail </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Secure the Evidence </p> <p style="margin:0px;">FBI Forensics Guidelines </p> <p style="margin:0px;">Finding Evidence on the PC </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; In the Browser </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; In System Logs </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Recovering Deleted Files </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Operating System Utilities </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Windows Registry </p> <p style="margin:0px;">Gathering Evidence from a Cell Phone </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Logical Acquisition </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Physical Acquisition </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Chip-off and JTAG </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cellular Networks </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cell Phone Terms </p> <p style="margin:0px;">Forensic Tools to Use </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; AccessData Forensic Toolkit </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; EnCase </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Sleuth Kit </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; OSForensics </p> <p style="margin:0px;">Forensic Science </p> <p style="margin:0px;">To Certify or Not to Certify? </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Chapter 17: Cyber Terrorism </p> <p style="margin:0px;">Introduction </p> <p style="margin:0px;">Defending Against Computer-Based Espionage </p> <p style="margin:0px;">Defending Against Computer-Based Terrorism </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Economic Attack </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Compromising Defense </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; General Attacks </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; China Eagle Union </p> <p style="margin:0px;">Choosing Defense Strategies </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Defending Against Information Warfare </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Propaganda </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Information Control </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Actual Cases </p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Packet Sniffers </p> <p style="margin:0px;">Summary </p> <p style="margin:0px;">Appendix A: Answers </p> <p style="margin:0px;">Glossary</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">9780789759962&nbsp;&nbsp; TOC&nbsp;&nbsp; 3/21/2018</p> <p style="margin:0px;">&nbsp;</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Network Defense and Countermeasures