ABE-IPSABE HOLDINGABE BOOKS
English Polski
Dostęp on-line

Książki

0.00 PLN
Schowek (0) 
Schowek jest pusty
Cybersecurity Essentials

Cybersecurity Essentials

Autorzy
Wydawnictwo John Wiley & Sons Inc
Data wydania 2018
Liczba stron 784
Forma publikacji książka w miękkiej oprawie
Poziom zaawansowania Dla profesjonalistów, specjalistów i badaczy naukowych
Język angielski
ISBN 9781119362395
Kategorie Bezpieczeństwo komputerowe
187.95 PLN (z VAT)
$42.28 / €40.30 / £34.98 /
Produkt na zamówienie
Dostawa 3-4 tygodnie
Ilość
Do schowka

Opis książki

An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
* Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Cybersecurity Essentials

Spis treści

Introduction xix





PART I SECURING THE INFRASTRUCTURE 1





Chapter 1 Infrastructure Security in the Real World 3





Security Challenges 3





Infrastructure Security Scenario 1 4





Infrastructure Security Scenario 2 6





Summary 8





Chapter 2 Understanding Access-Control and Monitoring Systems 9





A Quick Primer on Infrastructure Security 9





Access Control 12





Security Policies 14





Physical Security Controls 15





Locks and Keys 16





Standard Key-Locking Deadbolts 17





Solenoid-Operated Deadbolt Locks 18





Cipher Locks 19





Access-Control Gates 20





Sliding Gates 20





Swinging Gates 21





Control Relays 21





Authentication Systems 23





Magnetic Stripe Readers 24





Smart Cards 25





RFID Badges 26





Biometric Scanners 27





Remote-Access Monitoring 29





Opened- and Closed-Condition Monitoring 30





Automated Access-Control Systems 32





Hands-On Exercises 33





Discussion 34





Procedure 35





Review Questions 43





Chapter 3 Understanding Video Surveillance Systems 45





Video Surveillance Systems 45





Cameras 46





Hands-On Exercises 60





Discussion 61





Procedure 61





Review Questions 69





Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71





Intrusion-Detection and Reporting Systems 71





Security Controllers 74





Sensors 77





Vehicle-Detection Sensors 82





Fire-Detection Sensors 85





Output Devices 87





Hands-On Exercises 90





Discussion 90





Procedure 92





Review Questions 94





Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97





Summary Points 97





Security Challenge Scenarios 101





Infrastructure Security Scenario 1 101





Infrastructure Security Scenario 2 102





Professional Feedback 102





Review Questions 107





Exam Questions 109





PART II SECURING LOCAL HOSTS 113





Chapter 6 Local Host Security in the Real World 115





Security Challenges 115





Computing Device Security Scenario 1 116





Computing Device Security Scenario 2 117





Summary 120





Chapter 7 Securing Devices 121





The Three Layers of Security 121





Securing Host Devices 123





Securing Outer-Perimeter Portals 124





Additional Inner-Perimeter Access Options 127





Hands-On Exercises 137





Objectives 137





Procedure 137





Review Questions 148





Chapter 8 Protecting the Inner Perimeter 149





The Inner Perimeter 149





Operating Systems 151





Operating System Security Choices 168





Common Operating System Security Tools 169





Using Local Administrative Tools 177





Implementing Data Encryption 182





Hands-On Exercises 188





Objectives 188





Resources 188





Discussion 189





Procedures 190





Tables 200





Lab Questions 201





Chapter 9 Protecting Remote Access 203





Protecting Local Computing Devices 203





Using a Secure Connection 204





Establishing and Using a Firewall 204





Installing and Using Anti-Malware Software 205





Removing Unnecessary Software 205





Disabling Nonessential Services 205





Disabling Unnecessary OS Default Features 205





Securing the Web Browser 205





Applying Updates and Patches 206





Requiring Strong Passwords 206





Implementing Local Protection Tools 206





Software-Based Local Firewalls 207





Using Local Intrusion-Detection Tools 209





Profile-Based Anomaly-Detection Systems 210





Threshold-Based Anomaly-Detection Systems 211





Configuring Browser Security Options 211





Configuring Security Levels 213





Configuring Script Support 214





Defending Against Malicious Software 218





Using Antivirus Programs 220





Using Antispyware 221





Hardening Operating Systems 222





Service Packs 222





Patches 222





Updates 223





Overseeing Application Software Security 223





Software Exploitation 223





Applying Software Updates and Patches 224





Hands-On Exercises 225





Objectives 225





Resources 225





Discussion 225





Procedures 226





Tables 241





Lab Questions 242





Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243





Summary Points 243





Security Challenge Scenarios 248





Computing Device Security Scenario 1 248





Computing Device Security Scenario 2 248





Professional Feedback 248





Review Questions 257





Exam Questions 259





PART III SECURING LOCAL NETWORKS 263





Chapter 11 Local Network Security in the Real World 265





Security Challenges 266





Local Network Security Scenario 1 266





Local Network Security Scenario 2 270





Summary 272





Chapter 12 Networking Basics 273





Understanding the Basics of Networking 273





Campus Area Networks or Corporate Area Networks (CANs) 274





Metropolitan Area Networks (MANs) 274





Wireless Local Area Networks (WLANs) 274





Storage Area Networks (SANs) 274





The OSI Networking Model 275





Layer 1: Physical 276





Layer 2: Data Link 276





Layer 3: Network 276





Layer 4: Transport 276





Layer 5: Session 276





Layer 6: Presentation 277





Layer 7: Application 277





Data Transmission Packets 277





OSI Layer Security 278





Network Topologies 280





Bus Topology 280





Ring Topology 280





Star Topology 281





Mesh Topology 282





Logical Topologies 282





Hands-On Exercises 283





Objectives 283





Resources 283





Discussion 283





Procedure 284





Lab Questions 295





Lab Answers 295





Chapter 13 Understanding Networking Protocols 297





The Basics of Networking Protocols 297





MAC Addresses 298





TCP/IP 299





Ethernet 309





Network Control Strategies 311





Hands-On Exercises 313





Objectives 313





Discussion 313





Procedures 314





Lab Questions 325





Lab Answers 326





Chapter 14 Understanding Network Servers 327





The Basics of Network Servers 327





Server Security 330





Network Administrators 331





Server Software Security 335





User Accounts 341





Network Authentication Options 347





Establishing Resource Controls 348





Maintaining Server Security 352





Vulnerability Scanning 358





Hands-On Exercises 361





Objectives 361





Resources 361





Discussion 362





Procedures 362





Lab Questions 382





Lab Answers 382





Chapter 15 Understanding Network Connectivity Devices 385





Network Switches 386





Routers 388





Gateways 390





Network Bridges 391





Wireless Network Connectivity 392





Network Connectivity Device Vulnerabilities 392





Network Connectivity Device Attacks 393





Network Connectivity Defense 397





Network Hardening 398





Hands-On Exercises 399





Objectives 399





Resources 399





Procedures 399





Lab Questions 404





Lab Answers 404





Chapter 16 Understanding Network Transmission Media Security 407





The Basics of Network Transmission Media 407





Copper Wire 408





Light Waves 410





Wireless Signals 412





Transmission Media Vulnerabilities 415





Securing Wireless Networks 415





Hands-On Exercises 417





Objectives 417





Resources 417





Procedure 417





Lab Questions 421





Lab Answers 421





Chapter 17 Local Network Security: Review Questions 423





Summary Points 423





Security Challenge Scenarios 432





Local Network Security Scenario 1 432





Local Network Security Scenario 2 432





Professional Feedback 432





Review Questions 443





PART IV SECURING THE PERIMETER 449





Chapter 18 Perimeter Security in the Real World 451





Security Challenges 451





Internet Security Scenario 1 451





Internet Security Scenario 2 454





Summary 455





Chapter 19 Understanding the Environment 457





The Basics of Internet Security 457





Understanding the Environment 460





Basic Internet Concepts 461





Internet Services 468





Standards and RFCs 470





Hands-On Exercises 471





Objectives 471





Resources 472





Discussion 472





Procedures 472





Lab Questions 486





Lab Answers 486





Chapter 20 Hiding the Private Network 487





Understanding Private Networks 487





Network Address Translation 488





Port Address Translation 489





Port Forwarding or Mapping 490





Network Segmentation 492





Software-Defined Networking 494





Hands-On Exercises 496





Objectives 496





Resources 496





Discussion 496





Procedure 497





Lab Questions 508





Lab Answers 509





Chapter 21 Protecting the Perimeter 511





Understanding the Perimeter 511





Firewalls 515





Firewall Considerations 517





Network Appliances 519





Proxy Servers 520





Demilitarized Zones (DMZs) 522





Single-Firewall DMZs 523





Dual-Firewall DMZs 524





Honeypots 525





Extranets 526





Hands-On Exercises 528





Objectives 528





Resources 528





Procedures 528





Lab Questions 534





Lab Answers 534





Chapter 22 Protecting Data Moving Through the Internet 535





Securing Data in Motion 535





Authentication 536





Encryption 542





Cryptography 543





Digital Certificates 545





Hash Tables 548





Cookies 548





CAPTCHAs 549





Virtual Private Networks 550





Hands-On Exercises 552





Objectives 552





Resources 552





Discussion 552





Procedures 552





Lab Questions 563





Lab Answers 563





Chapter 23 Tools and Utilities 565





Using Basic Tools 565





IFconfig/IPconfig 565





Whois 566





Nslookup 567





PING 567





Traceroute 568





Telnet 569





Secure Shell 570





Monitoring Tools and Software 570





Nagios 572





SolarWinds 572





Microsoft Network Monitor 572





Wireshark 572





Snort 573





Nmap 575





Nikto 575





OpenVAS 575





Metasploit 575





The Browser Exploitation Framework (BeEF) 576





Other Products 576





Hands-On Exercises 578





Objectives 578





Resources 578





Discussion 578





Procedures 579





Capturing a PING 583





Lab Questions 589





Lab Answers 589





Chapter 24 Identifying and Defending Against Vulnerabilities 591





Zero Day Vulnerabilities 591





Software Exploits 592





SQL Injection 594





Java 597





Other Software Exploits 599





Social Engineering Exploits 600





Phishing Attacks 600





Network Threats and Attacks 603





Broadcast Storms 603





Session-Hijacking Attacks 604





Dictionary Attacks 606





Denial of Service (DoS) Attacks 606





Tarpitting 611





Spam 612





Protecting Against Spam Exploits 613





Other Exploits 614





Transport Layer Security (TLS) Exploits 614





FREAK Exploits 615





Logjam Exploits 615





Hands-On Exercises 616





Objectives 616





Resources 616





Discussion 616





Procedures 616





Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627





Summary Points 627





Security Scenario Review 637





Network Security Scenario 1 637





Network Security Scenario 2 637





Professional Feedback 637





Review Questions 644





Exam Questions 647





Appendix A 651





Appendix B 703





Appendix C 715





Index 727

Polecamy również książki

Strony www Białystok Warszawa
801 777 223