Atnaujinkite slapukų nuostatas

Securityplus in Depth [Multiple-component retail product]

  • Formatas: Multiple-component retail product, 474 pages, Illustrations, unspecified, Contains 1 Book and 1 CD-ROM
  • Išleidimo metai: 21-Jul-2003
  • Leidėjas: Premier Press
  • ISBN-10: 1592000649
  • ISBN-13: 9781592000647
Kitos knygos pagal šią temą:
  • Formatas: Multiple-component retail product, 474 pages, Illustrations, unspecified, Contains 1 Book and 1 CD-ROM
  • Išleidimo metai: 21-Jul-2003
  • Leidėjas: Premier Press
  • ISBN-10: 1592000649
  • ISBN-13: 9781592000647
Kitos knygos pagal šią temą:
"Security+ In Depth' gives you the coverage you need to fully understand the current risks and threats to your organization's data. If you are just entering the IT field, you will appreciate the comprehensive coverage of the tools and techniques necessary to safeguard electronic data. This book also serves as a valuable tool for those seeking to pass the CompTIA Security+ certification exam. "Security+ In Depth" provides hands on, practical techniques for working in the field of security in the twenty-first century.
PREFACE xiv
CHAPTER ONE Security Overview 1(16)
Understanding Network Security
2(1)
Security Threats
3(2)
Integrity
4(1)
Confidentiality
4(1)
Availability
4(1)
Security Ramifications: Costs of Intrusion
5(3)
Technology Weaknesses
5(1)
Configuration Weaknesses
6(1)
Policy Weaknesses
6(1)
Human Error
7(1)
Goals of Network Security
8(1)
Eliminating Theft
8(1)
Determining Authentication
8(1)
Identifying Assumptions
8(1)
Controlling Secrets
8(1)
Creating a Secure Network Strategy
9(3)
Human Factors
9(1)
Knowing Your Weaknesses
9(1)
Limiting Access
9(1)
Achieving Security through Persistence
10(1)
Remembering Physical Security
10(1)
Perimeter Security
10(1)
Firewalls
10(1)
Web and File Servers
10(1)
Access Control
11(1)
Change Management
11(1)
Encryption
11(1)
Intrusion Detection Systems
12(1)
Chapter Summary
12(1)
Key Terms
12(1)
Review Questions
13(4)
CHAPTER TWO Authentication 17(30)
Usernames and Passwords
18(2)
Strong Password Creation Techniques
19(1)
Techniques to Use Multiple Passwords
20(1)
Storing Passwords
20(1)
Kerberos
20(5)
Kerberos Assumptions
21(1)
Kerberos Authentication Process
21(3)
Using Kerberos in Very Large Network Systems
24(1)
Security Weaknesses of Kerberos
25(1)
Challenge Handshake Authentication Protocol
25(2)
The CHAP Challenge-and-Response Sequence
25(1)
CHAP Security Issues
26(1)
Mutual Authentication
27(1)
Digital Certificates
27(3)
Electronic Encryption and Decryption Concepts
27(2)
How Much Trust Should One Place in a CA?
29(1)
Security Tokens
30(2)
Passive Tokens
30(1)
Active Tokens
31(1)
One-time Passwords
31(1)
Biometrics
32(7)
How a Biometric Authentication System Works
32(1)
False Positives and False Negatives
33(1)
Different Kinds of Biometrics
34(4)
General Trends in Biometrics
38(1)
Multi-Factor Authentication
39(1)
Chapter: Summary
39(1)
Key Terms
40(2)
Review Questions
42(5)
CHAPTER THREE Attacks and Malicious Code 47(44)
Denial-of-Service Attacks
48(5)
SYN Flood
49(3)
Smurf
52(1)
IP Fragmentation Attacks: Ping of Death
53(2)
Distributed Denial-of-Service Attacks
55(5)
Setting Up DDOS Attacks
55(1)
Conducting DDOS Attacks
56(1)
DDOS Countermeasures
57(3)
Spoofing
60(4)
IP Address Spoofing
60(2)
ARP Poisoning
62(1)
Web Spoofing
62(2)
DNS Spoofing
64(1)
Man in the Middle
64(2)
Replays
66(1)
TCP Session Hijacking
67(2)
Social Engineering
69(2)
Dumpster Diving
70(1)
Online Attacks
70(1)
Social Engineering Countermeasures
70(1)
Attacks against Encrypted Data
71(3)
Weak Keys
71(1)
Mathematical Attacks
71(1)
Birthday Attack
72(1)
Password Guessing
72(1)
Brute Force
73(1)
Dictionary
74(1)
Software Exploitation
74(10)
Malicious Software
75(4)
Backdoor
79(4)
Logic Bombs
83(1)
Worms
83(1)
Chapter Summary
84(1)
Key Terms
85(2)
Review Questions
87(4)
CHAPTER FOUR Remote Access 91(26)
IFFE 802.1x
92(2)
Telnet
93(1)
Virtual Private Networks
94(2)
VPN Options
95(1)
VPN Drawbacks
96(1)
Remote Authentication Dial-In User Service
96(3)
Authenticating with a RADIUS Server
97(2)
Terminal Access Controller Access Control System
99(2)
Point-to-Point Tunneling Protocol
101(1)
Layer 2 Tunneling Protocol
102(1)
Secure Shell
102(1)
IP Security Protocol
103(3)
ESP and Encryption Models
105(1)
Telecommuting Vulnerabilities
106(4)
Remote Solutions
110(1)
Chapter Summary
110(1)
Key Terms
111(1)
Review Questions
112(5)
CHAPTER FIVE E-mail 117(26)
Secure E-mail and Encryption
118(5)
Encryption
119(1)
Hash Functions
120(1)
Digital Signatures
120(1)
Digital Certificates
121(1)
Combining Encryption Methods
122(1)
How Secure E-mail Works
123(8)
Background on PGP
126(1)
PGP Certificates
126(1)
S/MIME
127(1)
Background on S/MIME
127(1)
S/MIME Encryption Algorithms
127(1)
X.509 Certificates
128(1)
S/MIME Trust Model: Certificate Authorities
129(1)
Differences between PGP and S/MIME
129(2)
E-mail Vulnerabilities
131(1)
Spam
132(1)
E-mail Spam
132(1)
Hoaxes and Chain Letters
133(2)
Countermeasures for Hoaxes
135(1)
Chapter Summary
136(1)
Key Terms
136(2)
Review Questions
138(5)
CHAPTER SIX Web Security 143(22)
SSL and TLS
144(2)
HTTPS
146(1)
Instant Messaging
147(2)
IM Security Issues
147(2)
Vulnerabilities of Web Tools
149(9)
JavaScript
149(1)
ActiveX
150(1)
Buffer Overflows
151(1)
Cookies
152(1)
Signed Applets
153(1)
CGI
154(2)
SMTP Relay
156(2)
Chapter Summary
158(1)
Key Terms
159(1)
Review Questions
160(5)
CHAPTER SEVEN Directory and File Transfer Services 165(22)
Directory Services
166(6)
LDAP
166(2)
LDAP Operations
168(1)
LDAP Framework
169(1)
LDAP Security Benefits
170(1)
LDAP Security Vulnerabilities
171(1)
File Transfer Services
172(6)
FTP
172(3)
FTP Security Issues
175(3)
Secure File Transfers
178(1)
File Sharing
179(2)
Protecting Your File Shares
181(1)
Chapter Summary
181(1)
Key Terms
182(1)
Review Questions
183(4)
CHAPTER EIGHT
Wireless and Instant Messaging
187(1)
The Alphabet Soup of 802.11
188(4)
802.11a
188(1)
802.11b
189(1)
802.11c
189(1)
802.11d
189(1)
802.11e
190(1)
802.11f
190(1)
802.11g
190(1)
802.11h
190(1)
802.11i
190(1)
802.11j
191(1)
WAP 1.x and WAP 2.0
192(8)
How WAP 1.x Works
193(3)
The WAP 2.0 Stack
196(2)
The Wireless Transport Layer Security Protocol
198(2)
Wired Equivalent Privacy
200(3)
How WEP Works
201(1)
WEP's Weaknesses
201(2)
Conducting a Wireless Site Survey
203(3)
Conducting a Needs Assessment of the Network Users
203(1)
Obtaining a Copy of the Site's Blueprints
204(1)
Doing a Walk-Through of the Site
204(1)
Identifying Possible Access Point Locations
204(1)
Verifying Access Point Locations
205(1)
Documenting Your Findings
205(1)
Instant Messaging
206(2)
A Definition of IM
206(1)
Lack of Default Encryption Enables Packet Sniffing
206(1)
Social Engineering Overcomes Even Encryption
207(1)
Technical Issues Surrounding IM
207(1)
Legal Issues Surrounding IM
207(1)
Blocking IM
208(1)
Cellular Phone SMS
208(1)
Chapter Summary
208(1)
Key Terms
208(3)
Review Questions
211(4)
CHAPTER NINE Devices 215(30)
Firewalls
216(5)
Drafting a Security Policy
216(2)
Designing the Firewall to Implement the Policy
218(1)
What do Firewalls Protect Against?
218(1)
How Do Firewalls Work?
218(3)
Routers
221(5)
How a Router Moves Information
221(1)
Beyond the Firewall
222(3)
The OSI Stack
225(1)
Limitations of Packet-Filtering Routers
226(1)
Switches
226(3)
Switch Security
227(2)
Wireless
229(1)
Modems
229(2)
DSL Versus Cable Modem Security
230(1)
Dynamic Versus Static IP Addressing
230(1)
Remote Access Services
231(1)
Security Problems with RAS
231(1)
Telecom/Private Branch Exchange
231(1)
Virtual Private Networks
232(2)
Intrusion Detection Systems
234(2)
Computer-based IDS
234(1)
Network-based IDS
234(1)
Anomaly-based Detection
235(1)
Signature-based Detection
236(1)
Network Monitoring and Diagnostics
236(1)
Workstations and Servers
236(2)
Personal Firewall Software Packages
237(1)
Antivirus Software Packages
237(1)
Mobile Devices
238(1)
Chapter Summary
238(1)
Key Terms
239(2)
Review Questions
241(4)
CHAPTER TEN Media and Medium 245(18)
Transmission Media
246(4)
Coaxial Cable
246(1)
Twisted Pair Copper Cable
247(1)
Fiber-Optic Cable
248(1)
Unguided Transmission
249(1)
Securing Transmission Media
250(2)
Storage Media 2SZ
Magnetic Storage Media
252(2)
Optical Storage Media
254(1)
Solid-State Storage Media
255(2)
Catastrophic Loss
257(1)
Encryption
257(1)
Storing and Destruction of Media
257(1)
Chapter Summary
258(1)
Key Terms
258(1)
Review Questions
259(4)
CHAPTER ELEVEN Network Security Topologies 263(24)
Perimeter Security Topologies
264(5)
Three-tiered Architecture
264(3)
Creating and Developing Your Security Design
267(2)
DMZ
269(4)
Intranet
271(1)
Extranet
272(1)
Network Address Translation
273(2)
Tunneling
275(1)
Virtual Local Area Networks
276(5)
Security Features of VLANs
279(1)
Vulnerabilities of VLAN Trunks
280(1)
Chapter Summary
281(1)
Key Terms
282(1)
Review Questions
282(5)
CHAPTER TWELVE Intrusion Detection 287(28)
The Value of Intrusion Detection
288(2)
Negatives and Positives
288(2)
Network-based and Host-based IDS
290(10)
Network-based IDS
291(5)
Host-based IDS
296(4)
Active Detection and Passive Detection
300(5)
Anomaly-based and Signature-based IDS
302(2)
Intrusion Detection Products
304(1)
Honeypots
305(3)
Honeypot Deployment Options
307(1)
Honeypot Design
307(1)
Honeypots, Ethics, and the Law
308(1)
Incident Response
308(2)
IDS Monitoring
308(1)
Information Security Incident Response Team
309(1)
Chapter Summary
310(1)
Key Terms
310(2)
Review Questions
312(3)
CHAPTER THIRTEEN Security Baselines 315(38)
OS/NOS Hardening
316(1)
File System
317(4)
Creating Needed User Groups
319(1)
Configuring Access Controls
319(1)
Installing and Configuring File Encryption Capabilities
320(1)
Updates
320(1)
Network Hardening
321(5)
Firmware Updates
322(1)
Configuration
322(2)
Access Control Lists
324(2)
Enabling and Disabling of Services and Protocols
326(2)
Application Hardening
328(17)
Web Servers
328(2)
E-mail Servers
330(2)
FTP Servers
332(2)
DNS Servers
334(3)
NNTP Servers
337(1)
File and Print Servers
338(1)
DHCP Servers
339(2)
Data Repositories
341(1)
Directory Services
341(4)
Chapter Summary
345(1)
Key Terms
346(3)
Review Questions
349(4)
CHAPTER FOURTEEN Cryptography 353(20)
Algorithms
354(1)
Hashing
354(1)
Symmetric versus Asymmetric Algorithms
354(4)
Symmetric Algorithms
355(1)
Asymmetric Algorithms
356(1)
Common Encryption Algorithms
356(2)
Concepts of Using Cryptography
358(2)
Digital Signatures
359(1)
Certificates
360(3)
PKT Certificates
360(2)
Trust Models
362(1)
Key and Certificate Life Cycle Management
363(5)
Setup and Initialization
364(2)
Certificate Expiration
366(1)
Certificate Revocation and Suspension
367(1)
Key History
367(1)
Key Archive
367(1)
Chapter Summary
368(1)
Key Terms
369(1)
Review Questions
370(3)
CHAPTER FIFTEEN Physical Security 373(18)
Physical Controls
374(5)
Location and Environment
374(1)
Construction
374(1)
Physical Barriers
375(3)
Physical Surveillance
378(1)
Technical Controls
379(6)
Personnel Access Controls
379(3)
Technical Surveillance
382(1)
Ventilation
382(1)
Power Supply
382(1)
Fire Detection and Suppression
383(1)
Shielding
384(1)
Natural Disasters
385(1)
Chapter Summary
385(1)
Key Terms
385(1)
Review Questions
386(5)
CHAPTER SIXTEEN Disaster Recovery and Business Continuity 391(20)
Business Continuity
392(1)
Disaster Recovery Planning Process
392(5)
Data Backups
393(2)
Disaster Recovery Plan
395(2)
Policies and Procedures
397(7)
Security Policy
397(3)
Human Resources Policy
400(2)
Incident Response Policy
402(2)
Privilege Management
404(2)
Chapter Summary
406(1)
Key Terms
406(1)
Review Questions
406(5)
CHAPTER SEVENTEEN Computer Forensics and Advanced Topics 411
Computer Forensics
412(5)
Digital Evidence
412(1)
Principles of Digital Evidence
412(1)
The Forensic Process
413(4)
Risk Management
417(1)
Asset Identification
417(1)
Risk Assessment
417(1)
Threat Identification
418(1)
Vulnerabilities
418(1)
Education and Training
418(1)
Communication
418(1)
User Awareness
419(1)
Auditing
419(2)
Documentation
421(2)
Standards and Guidelines
421(1)
Systems Architecture
421(1)
Change Documentation
421(1)
Logs and Inventories
422(1)
Classification and Notification
422(1)
Retention and Storage
422(1)
Destruction
423(1)
Chapter Summary
423(1)
Key Terms
423(1)
Review Questions
424
APPENDIX A Answers to
Chapter Review Questions
391(50)
GLOSSARY 441(18)
INDEX 459