Introduction |
|
xxiv | |
Assessment Test |
|
xli | |
Chapter 1 Managing Risk |
|
1 | (44) |
|
|
3 | (3) |
|
|
6 | (1) |
|
|
6 | (11) |
|
Computing Risk Assessment |
|
|
7 | (5) |
|
|
12 | (1) |
|
Acting on Your Risk Assessment |
|
|
12 | (3) |
|
Risks Associated with Cloud Computing |
|
|
15 | (1) |
|
Risks Associated with Virtualization |
|
|
16 | (1) |
|
Developing Policies, Standards, and Guidelines |
|
|
17 | (21) |
|
|
17 | (9) |
|
Understanding Control Types and False Positives/Negatives |
|
|
26 | (2) |
|
Risk Management Best Practices |
|
|
28 | (10) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (2) |
|
|
40 | (5) |
Chapter 2 Monitoring and Diagnosing Networks |
|
45 | (34) |
|
Monitoring and Diagnosing Networks Terminology |
|
|
47 | (1) |
|
Frameworks, Best Practices, and Configuration Guides |
|
|
48 | (9) |
|
Industry-Standard Frameworks and Reference Architectures |
|
|
48 | (3) |
|
National Institute of Standards and Technology (NIST) |
|
|
51 | (3) |
|
Benchmarks/Secure Configuration Guides |
|
|
54 | (3) |
|
Secure Network Architecture Concepts |
|
|
57 | (11) |
|
|
57 | (6) |
|
|
63 | (1) |
|
|
64 | (3) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (6) |
|
Hardware and Firmware Security |
|
|
68 | (1) |
|
|
69 | (4) |
|
|
73 | (1) |
|
Secure Staging Deployment Concepts |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (2) |
|
|
76 | (3) |
Chapter 3 Understanding Devices and Infrastructure |
|
79 | (42) |
|
Infrastructure Terminology |
|
|
81 | (3) |
|
Designing with Security in Mind |
|
|
84 | (31) |
|
|
84 | (5) |
|
VPNs and VPN Concentrators |
|
|
89 | (2) |
|
Intrusion Detection Systems |
|
|
91 | (13) |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (3) |
|
|
111 | (1) |
|
|
111 | (1) |
|
Network Access Control (NAC) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (5) |
Chapter 4 Identity and Access Management |
|
121 | (48) |
|
Using Tools to Assess Your Network |
|
|
125 | (18) |
|
|
125 | (2) |
|
|
127 | (3) |
|
|
130 | (1) |
|
|
131 | (4) |
|
|
135 | (7) |
|
|
142 | (1) |
|
Troubleshooting Common Security Issues |
|
|
143 | (4) |
|
|
144 | (1) |
|
|
145 | (2) |
|
|
147 | (4) |
|
Intrusion Detection Systems |
|
|
147 | (1) |
|
|
148 | (1) |
|
Firewalls and Related Devices |
|
|
149 | (1) |
|
|
150 | (1) |
|
Identity and Access Management Concepts |
|
|
151 | (8) |
|
Identification vs. Authentication |
|
|
151 | (1) |
|
Authentication (Single Factor) and Authorization |
|
|
152 | (1) |
|
Multifactor Authentication |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Potential Authentication and Access Problems |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
Install and Configure Identity and Access Services |
|
|
159 | (4) |
|
|
159 | (1) |
|
Discretionary Access Control |
|
|
160 | (1) |
|
Role-Based Access Control |
|
|
160 | (1) |
|
Rule-Based Access Control |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
File and Database Security |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (4) |
Chapter 5 Wireless Network Threats |
|
169 | (14) |
|
Wireless Threat Terminology |
|
|
170 | (1) |
|
Wireless Vulnerabilities to Know |
|
|
171 | (5) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (4) |
Chapter 6 Securing the Cloud |
|
183 | (18) |
|
Cloud-Related Terminology |
|
|
184 | (2) |
|
Working with Cloud Computing |
|
|
186 | (4) |
|
Software as a Service (SaaS) |
|
|
186 | (1) |
|
Platform as a Service (PaaS) |
|
|
186 | (2) |
|
Infrastructure as a Service (IaaS) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
Working with Virtualization |
|
|
190 | (4) |
|
Understanding Hypervisors |
|
|
190 | (2) |
|
Understanding Containers and Application Cells |
|
|
192 | (1) |
|
|
192 | (1) |
|
On-Premise vs. Hosted vs. Cloud |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (2) |
|
Cloud Access Security Brokers |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (4) |
Chapter 7 Host, Data, and Application Security |
|
201 | (30) |
|
Threat Actors and Attributes |
|
|
204 | (4) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
Use of Open Source Intelligence |
|
|
208 | (3) |
|
|
211 | (3) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (2) |
|
|
214 | (1) |
|
Embedded Systems Security |
|
|
214 | (2) |
|
Application Vulnerabilities |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (5) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Specific Types of Testing |
|
|
219 | (1) |
|
|
220 | (1) |
|
Application Configuration Baselining |
|
|
221 | (1) |
|
Operating System Patch Management |
|
|
221 | (1) |
|
Application Patch Management |
|
|
222 | (1) |
|
Other Application Security Issues |
|
|
222 | (3) |
|
Databases and Technologies |
|
|
222 | (3) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (4) |
Chapter 8 Cryptography |
|
231 | (46) |
|
An Overview of Cryptography |
|
|
234 | (4) |
|
|
234 | (4) |
|
|
238 | (16) |
|
Working with Symmetric Algorithms |
|
|
239 | (4) |
|
Working with Asymmetric Algorithms |
|
|
243 | (3) |
|
|
246 | (1) |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (2) |
|
|
252 | (2) |
|
Using Cryptographic Systems |
|
|
254 | (4) |
|
Confidentiality and Strength |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
Understanding Cryptography Standards and Protocols |
|
|
258 | (6) |
|
The Origins of Encryption Standards |
|
|
259 | (2) |
|
Public Key Infrastructure X.509/Public Key Cryptography Standards |
|
|
261 | (1) |
|
|
262 | (2) |
|
Public Key Infrastructure |
|
|
264 | (5) |
|
|
264 | (2) |
|
|
266 | (3) |
|
Using Public Key Infrastructure |
|
|
269 | (1) |
|
Hardware-Based Encryption Devices |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (2) |
|
|
273 | (4) |
Chapter 9 Threats, Attacks, and Vulnerabilities |
|
277 | (38) |
|
Threat and Attack Terminology |
|
|
278 | (4) |
|
Living in a World of Viruses |
|
|
282 | (6) |
|
Symptoms of a Virus Infection |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (2) |
|
Managing Spam to Avoid Viruses |
|
|
286 | (1) |
|
|
287 | (1) |
|
Malware and Crypto-Malware |
|
|
288 | (8) |
|
Understanding Various Types of Application/Service Attacks |
|
|
296 | (13) |
|
Identifying Denial-of-Service and Distributed Denial-of-Service Attacks |
|
|
296 | (2) |
|
Man-in-the-Middle Attacks |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (3) |
|
Cross-Site Scripting and Request Forgery |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
Hijacking and Related Attacks |
|
|
306 | (1) |
|
|
307 | (1) |
|
MAC and IP Spoofing Attacks |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (2) |
|
|
311 | (4) |
Chapter 10 Social Engineering and Other Foes |
|
315 | (48) |
|
Social Engineering and Physical Security Terminology |
|
|
316 | (2) |
|
Understanding Social Engineering |
|
|
318 | (12) |
|
Types of Social Engineering Attacks |
|
|
319 | (6) |
|
What Motivates an Attack? |
|
|
325 | (1) |
|
The Principles Behind Social Engineering |
|
|
326 | (1) |
|
Social Engineering Attack Examples |
|
|
327 | (3) |
|
Understanding Physical Security |
|
|
330 | (18) |
|
|
331 | (1) |
|
|
331 | (1) |
|
Fencing, Gates, and Cages |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Secure Cabinets and Enclosures |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (6) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
348 | (2) |
|
An Analogy of Control Types |
|
|
349 | (1) |
|
Data Security and Privacy Practices |
|
|
350 | (6) |
|
Data Destruction and Media Sanitation |
|
|
350 | (2) |
|
Data Sensitivity Labeling and Handling |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
356 | (2) |
|
|
358 | (5) |
Chapter 11 Security Administration |
|
363 | (20) |
|
|
365 | (4) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (2) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (5) |
|
|
371 | (2) |
|
|
373 | (1) |
|
Account Management Concepts |
|
|
374 | (4) |
|
|
375 | (1) |
|
|
376 | (2) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (4) |
Chapter 12 Disaster Recovery and Incident Response |
|
383 | (36) |
|
Disaster and Incident Related Terminology |
|
|
385 | (2) |
|
|
387 | (2) |
|
|
387 | (1) |
|
|
388 | (1) |
|
Issues Associated with Business Continuity |
|
|
389 | (23) |
|
Types of Storage Mechanisms |
|
|
390 | (2) |
|
Crafting a Disaster-Recovery Plan |
|
|
392 | (11) |
|
Incident Response Procedures |
|
|
403 | (1) |
|
Understanding Incident Response |
|
|
404 | (8) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
414 | (5) |
Appendix Answers to Review Questions |
|
419 | (16) |
|
|
420 | (1) |
|
Chapter 2: Monitoring and Diagnosing Networks |
|
|
421 | (1) |
|
Chapter 3: Understanding Devices and Infrastructure |
|
|
422 | (1) |
|
Chapter 4: Identity and Access Management |
|
|
423 | (2) |
|
Chapter 5: Wireless Network Threats |
|
|
425 | (1) |
|
Chapter 6: Securing the Cloud |
|
|
426 | (1) |
|
Chapter 7: Host, Data, and Application Security |
|
|
427 | (1) |
|
|
428 | (1) |
|
Chapter 9: Threats, Attacks, and Vulnerabilities |
|
|
429 | (1) |
|
Chapter 10: Social Engineering and Other Foes |
|
|
430 | (1) |
|
Chapter 11: Security Administration |
|
|
431 | (1) |
|
Chapter 12: Disaster Recovery and Incident Response |
|
|
432 | (3) |
Index |
|
435 | |