Preface |
|
xxxi | |
Acknowledgments |
|
xxxiii | |
Introduction |
|
xxxv | |
Part I Network Security |
|
|
Chapter 1 Network Device Configuration |
|
|
3 | (22) |
|
|
3 | (16) |
|
|
3 | (4) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Intrusion Detection Systems |
|
|
12 | (2) |
|
Intrusion Prevention Systems |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (3) |
|
|
18 | (1) |
|
Web Application Firewall vs. Network Firewall |
|
|
18 | (1) |
|
Application-aware Devices |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
22 | (3) |
|
Chapter 2 Secure Network Administration |
|
|
25 | (10) |
|
Secure Network Administration Principles |
|
|
25 | (5) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Secure Router Configuration |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Unified Threat Management |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
30 | (3) |
|
|
33 | (2) |
|
Chapter 3 Secure Network Design |
|
|
35 | (28) |
|
Network Design Elements and Components |
|
|
35 | (10) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Network Access Control (NAC) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (2) |
|
Layered Security/Defense in Depth |
|
|
45 | (1) |
|
|
45 | (10) |
|
|
45 | (7) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (3) |
|
|
60 | (3) |
|
Chapter 4 Secure Wireless Networking |
|
|
63 | (16) |
|
|
63 | (5) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (4) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (3) |
|
|
75 | (4) |
Part II Compliance and Operational Security |
|
|
|
79 | (22) |
|
An Overview of Risk Management |
|
|
79 | (15) |
|
Key Terms for Understanding Risk Management |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
Importance of Policies in Reducing Risk |
|
|
82 | (4) |
|
Qualitative Risk Assessment |
|
|
86 | (1) |
|
Quantitative Risk Assessment |
|
|
87 | (3) |
|
|
90 | (1) |
|
Quantitative vs. Qualitative |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
Probability/Threat Likelihood |
|
|
93 | (1) |
|
Risk Avoidance, Transference, Acceptance, Mitigation, Deterrence |
|
|
94 | (1) |
|
|
94 | (2) |
|
Risks Associated with Cloud Computing and Virtualization |
|
|
95 | (1) |
|
|
95 | (1) |
|
Recovery Time Objective and Recovery Point Objective |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (3) |
|
|
100 | (1) |
|
Chapter 6 System Integration Processes |
|
|
101 | (10) |
|
|
101 | (1) |
|
On-boarding/Off-boarding Business Partners |
|
|
101 | (1) |
|
|
102 | (1) |
|
Interoperability Agreements |
|
|
102 | (3) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (3) |
|
|
108 | (3) |
|
Chapter 7 Risk Management |
|
|
111 | (20) |
|
Risk Mitigation Strategies |
|
|
111 | (3) |
|
|
111 | (1) |
|
|
112 | (1) |
|
User Rights and Permissions Reviews |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Risk Management Best Practices |
|
|
114 | (12) |
|
Business Continuity Concepts |
|
|
115 | (4) |
|
|
119 | (2) |
|
Disaster Recovery Concepts |
|
|
121 | (5) |
|
|
126 | (1) |
|
|
126 | (3) |
|
|
129 | (2) |
|
Chapter 8 Digital Forensics and Incident Response |
|
|
131 | (22) |
|
|
132 | (11) |
|
|
132 | (5) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (2) |
|
Incident Response Procedures |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (4) |
|
Escalation and Notification |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
Recovery/Reconstitution Procedures |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (2) |
|
|
150 | (3) |
|
Chapter 9 Security Awareness and Training |
|
|
153 | (16) |
|
Security Awareness and Training |
|
|
153 | (8) |
|
Security Policy Training and Procedures |
|
|
154 | (1) |
|
|
154 | (1) |
|
Personally Identifiable Information |
|
|
154 | (2) |
|
Information Classification |
|
|
156 | (1) |
|
Data Labeling, Handling, and Disposal |
|
|
157 | (1) |
|
Compliance with Laws, Best Practices, and Standards |
|
|
157 | (1) |
|
|
158 | (3) |
|
New Threats and Security Trends/Alerts |
|
|
161 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Social Networking and P2P |
|
|
163 | (1) |
|
Training Metrics and Compliance |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
166 | (3) |
|
Chapter 10 Physical Security and Environmental Controls |
|
|
169 | (24) |
|
|
169 | (6) |
|
|
170 | (1) |
|
|
170 | (4) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Temperature and Humidity Controls |
|
|
175 | (1) |
|
|
175 | (11) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (3) |
|
Protected Distribution (Cabling) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (3) |
|
|
190 | (3) |
|
Chapter 11 Security Controls |
|
|
193 | (12) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (3) |
|
|
200 | (5) |
Part III Threats and Vulnerabilities |
|
|
Chapter 12 Attacks and Malware |
|
|
205 | (30) |
|
|
205 | (5) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (19) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Distributed Denial-of-Service |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
216 | (3) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (3) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (2) |
|
Typo Squatting/URL Hijacking |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (4) |
|
|
233 | (2) |
|
Chapter 13 Social Engineering |
|
|
235 | (12) |
|
Social Engineering Methods |
|
|
235 | (5) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Social Engineering Principles |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (4) |
|
|
245 | (2) |
|
Chapter 14 Application and Wireless Attacks |
|
|
247 | (20) |
|
|
247 | (6) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
War Dialing and War Driving |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (9) |
|
|
253 | (1) |
|
|
254 | (1) |
|
Directory Traversal/Command Injection |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (3) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
Arbitrary/Remote Code Execution |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (2) |
|
|
265 | (2) |
|
Chapter 15 Mitigation Techniques |
|
|
267 | (22) |
|
|
267 | (2) |
|
|
267 | (2) |
|
Periodic Audits of Security Settings |
|
|
269 | (1) |
|
|
269 | (6) |
|
Disabling Unused Interfaces and Unused Application Service Ports |
|
|
270 | (1) |
|
Protecting Management Interfaces and Applications |
|
|
271 | (1) |
|
|
271 | (3) |
|
Disabling Unused Accounts |
|
|
274 | (1) |
|
|
275 | (4) |
|
|
275 | (1) |
|
Network Device Configuration |
|
|
276 | (1) |
|
|
277 | (1) |
|
MAC Limiting and Filtering |
|
|
278 | (1) |
|
Disabling Unused Interfaces and Unused Application Service Ports |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (2) |
|
Initial Baseline Configuration |
|
|
279 | (1) |
|
Updates (aka Hotfixes, Service Packs, and Patches) |
|
|
279 | (1) |
|
Continuous Security Monitoring |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
Detection Controls vs. Prevention Controls |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (3) |
|
|
286 | (3) |
|
Chapter 16 Threat and Vulnerability Discovery |
|
|
289 | (28) |
|
Interpret Results of Security Assessment Tools |
|
|
289 | (10) |
|
|
289 | (10) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (4) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
Actively Test Security Controls |
|
|
305 | (1) |
|
Exploiting Vulnerabilities |
|
|
305 | (1) |
|
|
305 | (2) |
|
Passively Testing Security Controls |
|
|
306 | (1) |
|
|
306 | (1) |
|
Identify Lack of Security Controls |
|
|
306 | (1) |
|
Identify Common Misconfigurations |
|
|
306 | (1) |
|
Intrusive vs. Non-intrusive |
|
|
306 | (1) |
|
Credentialed vs. Non-credentialed |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (3) |
|
|
312 | (5) |
Part IV Application, Data, and Host Security |
|
|
Chapter 17 Application Security Controls |
|
|
317 | (10) |
|
|
317 | (3) |
|
Error and Exception Handling |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
Cross-site Scripting Prevention |
|
|
319 | (1) |
|
Cross-site Request Forgery |
|
|
320 | (1) |
|
|
320 | (2) |
|
Application Configuration Baseline |
|
|
321 | (1) |
|
Application Patch Management |
|
|
321 | (1) |
|
NoSQL Databases vs. SQL Databases |
|
|
321 | (1) |
|
Server-side vs. Client-side Validation |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (2) |
|
|
324 | (3) |
|
Chapter 18 Mobile Device Security |
|
|
327 | (14) |
|
|
327 | (5) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
Disabling Unused Features |
|
|
331 | (1) |
|
Mobile Application Security |
|
|
332 | (1) |
|
Key and Credential Management |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
Transitive Trust/Authentication |
|
|
333 | (1) |
|
|
333 | (4) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
Adherence to Corporate Policies |
|
|
336 | (1) |
|
|
336 | (1) |
|
Architecture/Infrastructure Considerations |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
337 | (2) |
|
|
339 | (2) |
|
Chapter 19 Host-based Security |
|
|
341 | (34) |
|
|
341 | (23) |
|
Operating System Security and Settings |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
343 | (6) |
|
|
349 | (4) |
|
Whitelisting vs. Blacklisting Applications |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
Host-based Intrusion Detection |
|
|
355 | (7) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
Host-based Security Controls |
|
|
364 | (5) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Hardware-based Encryption Devices |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (4) |
|
|
373 | (2) |
|
Chapter 20 Securing Alternative Environments |
|
|
375 | (12) |
|
|
375 | (4) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Phones and Mobile Devices |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
In-vehicle Computing Systems |
|
|
379 | (1) |
|
|
379 | (2) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
Control Redundancy and Diversity |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
381 | (2) |
|
|
383 | (4) |
Part V Access Control and Identity Management |
|
|
Chapter 21 Access Control and Authentication |
|
|
387 | (30) |
|
|
387 | (10) |
|
|
388 | (3) |
|
|
391 | (3) |
|
Common Remote Access Ports |
|
|
394 | (1) |
|
|
394 | (2) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (6) |
|
|
397 | (2) |
|
|
399 | (1) |
|
|
399 | (3) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
403 | (4) |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
403 | (1) |
|
Personal Identity Verification Card |
|
|
404 | (1) |
|
Multifactor Authentication |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
407 | (4) |
|
|
408 | (3) |
|
|
411 | (1) |
|
|
412 | (1) |
|
Transitive Trust/Authentication |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
412 | (3) |
|
|
415 | (2) |
|
Chapter 22 Account Management |
|
|
417 | (14) |
|
User, Group, and Role Management |
|
|
417 | (3) |
|
|
417 | (1) |
|
|
418 | (2) |
|
|
420 | (1) |
|
Account Policy Enforcement |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
420 | (3) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (2) |
|
|
426 | (5) |
Part VI Cryptography |
|
|
Chapter 23 Cryptographic Concepts |
|
|
431 | (16) |
|
General Cryptographic Concepts |
|
|
431 | (8) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (3) |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
441 | (1) |
|
Use of Proven Technologies |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
442 | (3) |
|
|
445 | (2) |
|
Chapter 24 Cryptographic Methods |
|
|
447 | (46) |
|
|
447 | (2) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
449 | (2) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
451 | (2) |
|
|
452 | (1) |
|
|
452 | (1) |
|
|
452 | (1) |
|
Cryptographic Applications |
|
|
453 | (4) |
|
|
453 | (1) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
Comparative Strengths and Performance of Algorithms |
|
|
455 | (1) |
|
Use of Algorithms/Protocols with Transport Encryption |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
457 | (1) |
|
The Basics of Public Key Infrastructures |
|
|
457 | (3) |
|
|
460 | (1) |
|
|
461 | (9) |
|
Trust and Certificate Verification |
|
|
463 | (4) |
|
|
467 | (1) |
|
|
468 | (2) |
|
|
470 | (9) |
|
Registration and Generation |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
471 | (3) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (2) |
|
|
478 | (1) |
|
Public Certificate Authorities |
|
|
478 | (1) |
|
|
479 | (6) |
|
|
481 | (1) |
|
Walking the Certificate Path |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (3) |
|
|
488 | (5) |
Part VII Appendixes and Glossary |
|
|
Appendix A OSI Model and Internet Protocols |
|
|
493 | (10) |
|
Networking Frameworks and Protocols |
|
|
493 | (1) |
|
|
494 | (4) |
|
|
496 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
498 | (3) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
501 | (2) |
|
Appendix B About the CD-ROM |
|
|
503 | (4) |
|
|
503 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
503 | (1) |
|
Installing and Running Total Tester Premium |
|
|
|
|
504 | (1) |
|
|
504 | (1) |
|
|
505 | (2) |
|
Total Seminars Technical Support |
|
|
505 | (1) |
|
McGraw-Hill Education Content Support |
|
|
505 | (2) |
Glossary |
|
507 | (28) |
Index |
|
535 | |