Introduction |
|
xxvii | |
Assessment Test |
|
xi | |
|
Chapter 1 Cryptographic Tools and Techniques |
|
|
1 | (46) |
|
The History of Cryptography |
|
|
3 | (1) |
|
|
4 | (6) |
|
|
4 | (2) |
|
|
6 | (3) |
|
|
9 | (1) |
|
|
10 | (6) |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Advanced Encryption Standard |
|
|
14 | (1) |
|
International Data Encryption Algorithm |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (3) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Elliptic Curve Cryptography |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (3) |
|
Hashing and Message Digests |
|
|
20 | (3) |
|
|
23 | (2) |
|
Public Key Infrastructure |
|
|
25 | (7) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Certificate Revocation List |
|
|
27 | (1) |
|
|
27 | (2) |
|
|
29 | (2) |
|
|
31 | (1) |
|
Implementation of Cryptographic Solutions |
|
|
32 | (7) |
|
Application Layer Encryption |
|
|
33 | (1) |
|
Transport Layer Encryption |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (4) |
|
Chapter 2 Comprehensive Security Solutions |
|
|
47 | (50) |
|
|
50 | (11) |
|
Network Authentication Methods |
|
|
50 | (1) |
|
Placement of Fixed/Mobile Devices |
|
|
50 | (1) |
|
Placement of Hardware and Application |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (2) |
|
Virtual Networking and Placement of Security Components |
|
|
54 | (4) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (14) |
|
|
62 | (2) |
|
|
64 | (6) |
|
|
70 | (2) |
|
|
72 | (3) |
|
Secure Communication Solutions |
|
|
75 | (8) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Lightweight Directory Access Protocol |
|
|
81 | (1) |
|
Secure Directory Services |
|
|
81 | (1) |
|
|
82 | (1) |
|
Security Information and Event Management |
|
|
82 | (1) |
|
Database Activity Monitoring |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Secure Facility Solutions |
|
|
83 | (2) |
|
|
84 | (1) |
|
|
85 | (1) |
|
Secure Network Infrastructure Design |
|
|
85 | (5) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (3) |
|
|
93 | (4) |
|
Chapter 3 Securing Virtualized, Distributed, and Shared Computing |
|
|
97 | (46) |
|
|
100 | (4) |
|
Software-Defined Networking |
|
|
102 | (2) |
|
|
104 | (15) |
|
|
104 | (1) |
|
Cloud Computing Providers and Hosting Options |
|
|
105 | (1) |
|
Benefits of Cloud Computing |
|
|
106 | (3) |
|
Security of On-Demand/Elastic Cloud Computing |
|
|
109 | (4) |
|
|
113 | (1) |
|
Cloud Computing Vulnerabilities |
|
|
114 | (2) |
|
|
116 | (1) |
|
Cloud-Augmented Security Services |
|
|
117 | (2) |
|
|
119 | (7) |
|
Virtual Desktop Infrastructure |
|
|
119 | (1) |
|
|
120 | (6) |
|
|
126 | (1) |
|
Virtual Networking and Security Components |
|
|
127 | (2) |
|
|
129 | (7) |
|
|
136 | (1) |
|
|
136 | (2) |
|
|
138 | (5) |
|
|
143 | (52) |
|
Firewalls and Network Access Control |
|
|
147 | (5) |
|
|
152 | (3) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Agentless-Based Technology |
|
|
156 | (1) |
|
Trusted Operating Systems |
|
|
156 | (4) |
|
Endpoint Security Solutions |
|
|
160 | (4) |
|
Common Threats to Endpoint Security |
|
|
162 | (2) |
|
|
164 | (7) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (2) |
|
|
171 | (5) |
|
|
176 | (1) |
|
|
177 | (3) |
|
External I/O Restrictions on Hardware |
|
|
179 | (1) |
|
Intrusion Detection and Prevention |
|
|
180 | (5) |
|
Network Management, Monitoring, and Security Tools |
|
|
185 | (3) |
|
|
186 | (1) |
|
Operational and Consumer Network-Enabled Devices |
|
|
186 | (2) |
|
|
188 | (1) |
|
|
188 | (2) |
|
|
190 | (5) |
|
Chapter 5 Application Security and Penetration Testing |
|
|
195 | (70) |
|
Application Security Design Considerations |
|
|
201 | (3) |
|
Specific Application Issues |
|
|
204 | (6) |
|
Cross-Site Scripting (XSS) |
|
|
205 | (1) |
|
Cross-Site Request Forgery |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
Application Security Frameworks |
|
|
211 | (1) |
|
|
212 | (2) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (2) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (2) |
|
|
218 | (1) |
|
Security Requirements Traceability Matrix (SRTM) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Validation and Acceptance Testing |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Improper Storage of Sensitive Data |
|
|
222 | (1) |
|
Secure Cookie Storage and Transmission |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
Client-Side Processing vs. Server-Side Processing |
|
|
228 | (8) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
Race Conditions (TOC/TOU) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Use of Third-Party Libraries |
|
|
236 | (1) |
|
|
236 | (1) |
|
Security Assessments and Penetration Testing |
|
|
236 | (4) |
|
|
236 | (1) |
|
Penetration Testing Steps |
|
|
237 | (1) |
|
|
238 | (2) |
|
Red, Blue, and White Teaming |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
White Team: The Judge and Jury |
|
|
241 | (1) |
|
Vulnerability Assessment Areas |
|
|
241 | (2) |
|
Security Assessment and Penetration Test Tools |
|
|
243 | (15) |
|
|
244 | (2) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (2) |
|
Passive Vulnerability Scanners |
|
|
252 | (1) |
|
|
253 | (1) |
|
Network Enumeration Tools |
|
|
253 | (1) |
|
|
254 | (1) |
|
File Integrity Monitoring Tools |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (2) |
|
Fuzzing and False Injection Tools |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
Local Exploitation Tools/Frameworks |
|
|
257 | (1) |
|
|
257 | (1) |
|
Reverse Engineering Tools |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (5) |
|
Chapter 6 Risk Management |
|
|
265 | (48) |
|
|
268 | (2) |
|
Identifying Vulnerabilities |
|
|
270 | (2) |
|
|
272 | (19) |
|
|
273 | (7) |
|
Risk in External and Internal Influences |
|
|
280 | (4) |
|
Adherence to Risk Management Frameworks |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (6) |
|
The Risk Assessment Process |
|
|
291 | (13) |
|
|
291 | (2) |
|
Information Classification |
|
|
293 | (1) |
|
|
294 | (5) |
|
|
299 | (2) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Business Continuity Planning |
|
|
303 | (1) |
|
Enterprise Security Architecture Frameworks and Governance |
|
|
304 | (1) |
|
Best Practices for Risk Assessments |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (2) |
|
|
309 | (4) |
|
Chapter 7 Policies, Procedures, and Incident Response |
|
|
313 | (44) |
|
A High-Level View of Documentation |
|
|
316 | (7) |
|
The Policy Development Process |
|
|
317 | (1) |
|
|
318 | (5) |
|
Business Documents Used to Support Security |
|
|
323 | (3) |
|
Documents and Controls Used for Sensitive Information |
|
|
326 | (9) |
|
|
326 | (1) |
|
Personally Identifiable Information Controls |
|
|
327 | (2) |
|
|
329 | (2) |
|
Policies Used to Manage Employees |
|
|
331 | (4) |
|
Training and Awareness for Users |
|
|
335 | (1) |
|
Auditing Requirements and Frequency |
|
|
336 | (1) |
|
The Incident Response Framework |
|
|
337 | (3) |
|
Incident and Emergency Response |
|
|
340 | (10) |
|
Facilitate Incident Detection and Response |
|
|
342 | (1) |
|
Vulnerabilities Yet to Discover |
|
|
342 | (1) |
|
Incident Response Support Tools |
|
|
342 | (4) |
|
Severity of Incidents and Breaches |
|
|
346 | (1) |
|
|
346 | (4) |
|
|
350 | (1) |
|
|
351 | (2) |
|
|
353 | (4) |
|
Chapter 8 Security Research and Analysis |
|
|
357 | (56) |
|
Applying Research Methods to Determine Industry Trends and Impact on the Enterprise |
|
|
361 | (36) |
|
Performing Ongoing Research |
|
|
361 | (5) |
|
|
366 | (3) |
|
|
369 | (9) |
|
|
378 | (1) |
|
|
379 | (3) |
|
Knowledge of Current Vulnerabilities and Threats |
|
|
382 | (5) |
|
Research Security Implications of Emerging Business Tools |
|
|
387 | (4) |
|
Global IA Industry Community |
|
|
391 | (5) |
|
Research Security Requirements for Contracts |
|
|
396 | (1) |
|
Analyze Scenarios to Secure the Enterprise |
|
|
397 | (9) |
|
Benchmarking and Baselining |
|
|
398 | (1) |
|
Prototyping and Testing Multiple Solutions |
|
|
398 | (1) |
|
|
398 | (1) |
|
Analyze and Interpret Trend Data to Anticipate Cyber Defense Needs |
|
|
399 | (1) |
|
Reviewing the Effectiveness of Existing Security Controls |
|
|
400 | (2) |
|
Conducting Lessons Learned and After-Action Reviews |
|
|
402 | (1) |
|
Reverse Engineering or Deconstructing Existing Solutions |
|
|
403 | (1) |
|
Creation, Collection, and Analysis of Metrics |
|
|
403 | (1) |
|
Analyzing Security Solutions to Ensure They Meet Business Needs |
|
|
404 | (1) |
|
Using Judgment to Solve Difficult Problems |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (2) |
|
|
408 | (5) |
|
Chapter 9 Enterprise Security Integration |
|
|
413 | (46) |
|
Integrate Enterprise Disciplines to Achieve Secure Solutions |
|
|
417 | (16) |
|
Governance, Risk, and Compliance |
|
|
419 | (2) |
|
Interpreting Security Requirements and Goals to Communicate with Stakeholders from Other Disciplines |
|
|
421 | (4) |
|
Providing Objective Guidance and Impartial Recommendations to Staff and Senior Management on Security Processes and Controls |
|
|
425 | (2) |
|
Establish Effective Collaboration within Teams to Implement Secure Solutions |
|
|
427 | (3) |
|
|
430 | (3) |
|
Integrate Hosts, Storage, Networks, and Applications into a Secure Enterprise Architecture |
|
|
433 | (15) |
|
Adapt Data Flow Security to Meet Changing Business Needs |
|
|
436 | (2) |
|
Logical Deployment Diagram and Corresponding Physical Deployment Diagram of All Relevant Devices |
|
|
438 | (1) |
|
Secure Infrastructure Design |
|
|
438 | (1) |
|
|
439 | (1) |
|
Design Considerations during Mergers, Acquisitions, and Demergers/Divestitures |
|
|
439 | (1) |
|
Technical Deployment Models (Outsourcing, Insourcing, Managed Services, Partnership) |
|
|
440 | (2) |
|
Implementing Cryptographic Techniques |
|
|
442 | (1) |
|
Security and Privacy Considerations of Storage Integration |
|
|
442 | (1) |
|
In-House Developed vs. Commercial vs. Commercial Customized |
|
|
443 | (2) |
|
|
445 | (2) |
|
Security Implications of Integrating Enterprise Applications |
|
|
447 | (1) |
|
Integrate Mobility Management |
|
|
448 | (4) |
|
|
448 | (1) |
|
Mobile Management Techniques |
|
|
449 | (1) |
|
Signature and Application Concerns |
|
|
450 | (1) |
|
Whose Device Is It Anyway? |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
453 | (1) |
|
|
454 | (5) |
|
Chapter 10 Security Controls for Communication and Collaboration |
|
|
459 | (60) |
|
Selecting the Appropriate Control to Secure Communications and Collaboration Solutions |
|
|
464 | (24) |
|
Security of Unified Collaboration |
|
|
464 | (9) |
|
|
473 | (2) |
|
|
475 | (1) |
|
Trust Models and Remote Access |
|
|
476 | (2) |
|
|
478 | (1) |
|
|
478 | (1) |
|
Secure External Communications |
|
|
479 | (2) |
|
Secure Implementation of Collaboration Sites and Platforms |
|
|
481 | (2) |
|
Prioritizing Traffic with QoS |
|
|
483 | (1) |
|
|
484 | (4) |
|
Integrate Advanced Authentication and Authorization Technologies to Support Enterprise Objectives |
|
|
488 | (9) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
Certificate-Based Authentication |
|
|
495 | (2) |
|
Implement Security Activities across the Technology Life Cycle |
|
|
497 | (14) |
|
Systems Development Life Cycle |
|
|
497 | (7) |
|
Adapt Solutions to Address Emerging Threats and Security Trends |
|
|
504 | (3) |
|
Validating System Designs |
|
|
507 | (1) |
|
Integrate Security Controls for Mobile and Small Form Factor Devices |
|
|
508 | (3) |
|
Physical Security Tools for Security Assessment |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (2) |
|
|
514 | (5) |
|
Appendix A Answers to Review Questions |
|
|
519 | (14) |
|
Chapter 1 Cryptographic Tools and Techniques |
|
|
520 | (1) |
|
Chapter 2 Comprehensive Security Solutions |
|
|
521 | (1) |
|
Chapter 3 Securing Virtualized, Distributed and Shared Computing |
|
|
522 | (1) |
|
|
523 | (1) |
|
Chapter 5 Application Security and Penetration Testing |
|
|
524 | (2) |
|
Chapter 6 Risk Management |
|
|
526 | (1) |
|
Chapter 7 Policies, Procedures, and Incident Response |
|
|
527 | (1) |
|
Chapter 8 Security Research and Analysis |
|
|
528 | (1) |
|
Chapter 9 Enterprise Security Integration |
|
|
529 | (2) |
|
Chapter 10 Security Controls for Communication and Collaboration |
|
|
531 | (2) |
|
Appendix B CASP+ Lab Manual |
|
|
533 | (58) |
|
|
534 | (3) |
|
Lab A1 Verifying a Baseline Security Configuration |
|
|
537 | (3) |
|
Lab A2 Introduction to a Protocol Analyzer |
|
|
540 | (3) |
|
Lab A3 Performing a Wireless Site Survey |
|
|
543 | (1) |
|
Lab A4 Using Windows Remote Access |
|
|
544 | (1) |
|
Connecting to the Remote Desktop PC |
|
|
545 | (2) |
|
Lab A5 Configuring a VPN Client |
|
|
547 | (2) |
|
Lab A6 Using the Windows Command-Line Interface (CLI) |
|
|
549 | (1) |
|
Lab A7 Cisco IOS Command-Line Basics |
|
|
550 | (2) |
|
Lab A8 Shopping for Wi-Fi Antennas |
|
|
552 | (2) |
|
Lab A9 Cloud Provisioning |
|
|
554 | (1) |
|
Lab A10 Introduction to Windows Command-Line Forensic Tools |
|
|
555 | (6) |
|
Lab A11 Introduction to Hashing Using a GUI |
|
|
561 | (2) |
|
Lab A12 Hashing from the Command Line |
|
|
563 | (1) |
|
Verifying File Integrity from a Command Line |
|
|
563 | (1) |
|
Verifying File Integrity on a Downloaded File |
|
|
564 | (1) |
|
Lab A13 Cracking Encrypted Passwords |
|
|
565 | (3) |
|
|
568 | (1) |
|
Lab A15 Social Engineering |
|
|
569 | (3) |
|
Lab A16 Downloading, Verifying, and Installing a Virtual Environment |
|
|
572 | (2) |
|
Lab A17 Exploring Your Virtual Network |
|
|
574 | (5) |
|
|
579 | (4) |
|
Lab A19 Introduction to the Metasploit Framework |
|
|
583 | (2) |
|
Lab A20 Sniffing NET in VM Traffic with Wireshark |
|
|
585 | (4) |
|
Suggestions for Further Exploration of Security Topics |
|
|
589 | (2) |
Index |
|
591 | |