Principles of computer security CompTIA Security+ and beyond

Fully updated computer security essentials-mapped to the CompTIA Security+ SY0-601 exam Save 10% on any CompTIA exam voucher! Coupon code inside. Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. T...

Descripción completa

Detalles Bibliográficos
Otros Autores: Conklin, Wm. Arthur author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York : McGraw-Hill [2022]
Edición:Sixth edition
Colección:McGraw-Hill's AccessEngineeringLibrary
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009633579506719
Tabla de Contenidos:
  • Cover
  • About the Authors
  • Title Page
  • Copyright Page
  • Acknowledgments
  • About this Book
  • Contents at a Glance
  • Contents
  • Foreword
  • Preface
  • Introduction
  • Instructor Website
  • Chapter 1 Introduction and Security Trends
  • The Computer Security Problem
  • Definition of Computer Security
  • Historical Security Incidents
  • The Current Threat Environment
  • Infrastructure Attacks
  • Ransomware
  • Threats to Security
  • Viruses and Worms
  • Intruders
  • Insiders
  • Criminal Organizations
  • Nation-States, Terrorists, and Information Warfare
  • Brand-Name Attacks
  • Attributes of Actors
  • Internal/External
  • Level of Sophistication
  • Resources/Funding
  • Intent/Motivation
  • Security Trends
  • Targets and Attacks
  • Specific Target
  • Opportunistic Target
  • Minimizing Possible Avenues of Attack
  • Approaches to Computer Security
  • Cybersecurity Kill Chain
  • Threat Intelligence
  • Open Source Intelligence
  • Ethics
  • Additional References
  • Chapter 1 Review
  • Chapter 2 General Security Concepts
  • Basic Security Terminology
  • Security Basics
  • Security Tenets
  • Security Approaches
  • Security Principles
  • Formal Security Models
  • Confidentiality Models
  • Integrity Models
  • Additional References
  • Chapter 2 Review
  • Chapter 3 Operational and Organizational Security
  • Policies, Procedures, Standards, and Guidelines
  • Organizational Policies
  • Change Management Policy
  • Change Control
  • Asset Management
  • Security Policies
  • Data Policies
  • Credential Policies
  • Password and Account Policies
  • Human Resources Policies
  • Code of Ethics
  • Job Rotation
  • Separation of Duties
  • Employee Hiring (Onboarding) and Promotions
  • Retirement, Separation, or Termination (Offboarding)
  • Exit Interviews
  • Onboarding/Offboarding Business Partners
  • Adverse Actions
  • Mandatory Vacations
  • Acceptable Use Policy.
  • Internet Usage Policy
  • E-mail Usage Policy
  • Social Media Analysis
  • Clean Desk Policy
  • Bring-Your-Own-Device (BYOD) Policy
  • Privacy Policy
  • Due Care and Due Diligence
  • Due Process
  • Incident Response Policies and Procedures
  • Security Awareness and Training
  • Diversity of Training Techniques
  • Security Policy Training and Procedures
  • User Training
  • Role-Based Training
  • Continuing Education
  • Compliance with Laws, Best Practices, and Standards
  • User Habits
  • Training Metrics and Compliance
  • Standard Operating Procedures
  • Third-Party Risk Management
  • Vendors
  • Supply Chain
  • Business Partners
  • Interoperability Agreements
  • Service Level Agreement (SLA)
  • Memorandum of Understanding (MOU)
  • Measurement Systems Analysis (MSA)
  • Business Partnership Agreement (BPA)
  • Interconnection Security Agreement (ISA)
  • NDA
  • End of Service Life (EOSL)
  • End of Life (EOL)
  • Chapter 3 Review
  • Chapter 4 The Role of People in Security
  • People-A Security Problem
  • Social Engineering
  • Tools
  • Principles (Reasons for Effectiveness)
  • Defenses
  • Attacks
  • Impersonation
  • Phishing
  • Smishing
  • Vishing
  • Spam
  • Spam over Internet Messaging (SPIM)
  • Spear Phishing
  • Whaling
  • Pharming
  • Dumpster Diving
  • Shoulder Surfing
  • Tailgating/Piggybacking
  • Eliciting Information
  • Prepending
  • Identity Fraud
  • Invoice Scams
  • Credential Harvesting
  • Reverse Social Engineering
  • Reconnaissance
  • Hoax
  • Watering Hole Attack
  • Typo Squatting
  • Influence Campaigns
  • Poor Security Practices
  • Password Selection
  • Shoulder Surfing
  • Piggybacking
  • Dumpster Diving
  • Installing Unauthorized Hardware and Software
  • Data Handling
  • Physical Access by Non-Employees
  • Clean Desk Policies
  • People as a Security Tool
  • Security Awareness
  • Security Policy Training and Procedures
  • Chapter 4 Review.
  • Chapter 5 Cryptography
  • Cryptography in Practice
  • Fundamental Methods
  • Comparative Strengths and Performance of Algorithms
  • Key Length
  • Cryptographic Objectives
  • Diffusion
  • Confusion
  • Obfuscation
  • Perfect Forward Secrecy
  • Security Through Obscurity
  • Historical Perspectives
  • Algorithms
  • Substitution Ciphers
  • One-Time Pads
  • Key Management
  • Random Numbers
  • Salting
  • Hashing Functions
  • Message Digest
  • SHA
  • RIPEMD
  • Hashing Summary
  • Symmetric Encryption
  • DES
  • 3DES
  • AES
  • CAST
  • RC
  • Blowfish
  • Twofish
  • IDEA
  • ChaCha20
  • Cipher Modes
  • Authenticated Encryption with Associated Data (AEAD)
  • Block vs. Stream
  • Symmetric Encryption Summary
  • Asymmetric Encryption
  • Diffie-Hellman
  • RSA Algorithm
  • ElGamal
  • ECC
  • Asymmetric Encryption Summary
  • Symmetric vs. Asymmetric
  • Quantum Cryptography
  • Post-Quantum
  • Lightweight Cryptography
  • Homomorphic Encryption
  • For More Information
  • Chapter 5 Review
  • Chapter 6 Applied Cryptography
  • Cryptography Use
  • Confidentiality
  • Integrity
  • Authentication
  • Nonrepudiation
  • Digital Signatures
  • Digital Rights Management
  • Cryptographic Applications
  • Use of Proven Technologies
  • Cipher Suites
  • Secret Algorithms
  • Key Exchange
  • Key Escrow
  • Session Keys
  • Ephemeral Keys
  • Key Stretching
  • Transport Encryption
  • TLS v1.3
  • Data in Transit/Motion
  • Data at Rest
  • Data in Use/Processing
  • Implementation vs. Algorithm Selection
  • Common Use Cases
  • HMAC
  • S/MIME
  • IETF S/MIME History
  • IETF S/MIME v3 Specifications
  • PGP
  • How PGP Works
  • Steganography
  • Secure Protocols
  • DNSSEC
  • SSH
  • S/MIME
  • SRTP
  • LDAPS
  • FTPS
  • SFTP
  • SNMPv3
  • TLS
  • HTTPS
  • Secure POP/IMAP
  • IPSec
  • Secure Protocol Use Cases
  • Voice and Video
  • Time Synchronization
  • E-mail and Web
  • File Transfer
  • Directory Services.
  • Remote Access
  • Domain Name Resolution
  • Routing and Switching
  • Network Address Allocation
  • Subscription Services
  • Cryptographic Attacks
  • Birthday
  • Known Plaintext/Ciphertext
  • Chosen Cipher Text Attack
  • Weak Implementations
  • Meet-in-the-Middle Attacks
  • Replay
  • Downgrade
  • Collision
  • Password Attacks
  • Other Standards
  • FIPS
  • Common Criteria
  • ISO/IEC 27002 (Formerly ISO 17799)
  • Chapter 6 Review
  • Chapter 7 Public Key Infrastructure
  • The Basics of Public Key Infrastructures
  • Certificate Authorities
  • Registration Authorities
  • Local Registration Authorities
  • Public Certificate Authorities
  • In-house Certificate Authorities
  • Choosing Between a Public CA and an In-house CA
  • Outsourced Certificate Authorities
  • Online vs. Offline CA
  • Stapling
  • Pinning
  • Trust Models
  • Certificate Chaining
  • Hierarchical Trust Model
  • Peer-to-Peer Model
  • Hybrid Trust Model
  • Walking the Certificate Path
  • Digital Certificates
  • Certificate Classes
  • Certificate Extensions
  • Certificate Attributes
  • Certificate Formats
  • Certificate Lifecycles
  • Registration and Generation
  • CSR
  • Renewal
  • Suspension
  • Certificate Revocation
  • Key Destruction
  • Certificate Repositories
  • Sharing Key Stores
  • Trust and Certificate Verification
  • Centralized and Decentralized Infrastructures
  • Hardware Security Modules
  • Private Key Protection
  • Key Recovery
  • Key Escrow
  • Certificate-Based Threats
  • PKIX and PKCS
  • PKIX Standards
  • PKCS
  • Why You Need to Know the PKIX and PKCS Standards
  • Stolen Certificates
  • ISAKMP
  • CMP
  • XKMS
  • CEP
  • Chapter 7 Review
  • Chapter 8 Physical Security
  • The Security Problem
  • Physical Security Safeguards
  • Walls and Guards
  • Lights and Signage
  • Physical Access Controls and Monitoring
  • Electronic Access Control Systems
  • Policies and Procedures.
  • Environmental Controls
  • Hot and Cold Aisles
  • Fire Suppression
  • Water-Based Fire Suppression Systems
  • Halon-Based Fire Suppression Systems
  • Clean-Agent Fire Suppression Systems
  • Handheld Fire Extinguishers
  • Fire Detection Devices
  • Electromagnetic Environment
  • Power Protection
  • UPS
  • Backup Power and Cable Shielding
  • Generator
  • Dual Supply
  • Managed Power Distribution Units (PDUs)
  • Drones/UAVs
  • Chapter 8 Review
  • Chapter 9 Network Fundamentals
  • Network Architectures
  • Network Topology
  • Wireless
  • Ad Hoc
  • Segregation/Segmentation/Isolation
  • Physical Separation
  • Enclaves
  • Logical (VLAN)
  • Virtualization
  • Airgaps
  • Zones and Conduits
  • Zero Trust
  • Security Zones
  • DMZ
  • Internet
  • East-West Traffic
  • Intranet
  • Extranet
  • Wireless
  • Guest
  • Honeynets
  • Flat Networks
  • Network Protocols
  • Protocols
  • Packets
  • Internet Protocol
  • IP Packets
  • TCP vs. UDP
  • ICMP
  • IPv4 vs. IPv6
  • Expanded Address Space
  • Neighbor Discovery
  • Benefits of IPv6
  • Packet Delivery
  • Ethernet
  • Local Packet Delivery
  • ARP Attacks
  • Remote Packet Delivery
  • IP Addresses and Subnetting
  • Network Address Translation
  • Inter-Networking
  • MPLS
  • Software-Defined Networking (SDN)
  • Software-Defined Visibility (SDV)
  • Quality of Service (QoS)
  • Traffic Engineering
  • Route Security
  • For More Information
  • Chapter 9 Review
  • Chapter 10 Infrastructure Security
  • Devices
  • Workstations
  • Servers
  • Mobile Devices
  • Device Security, Common Concerns
  • Network-Attached Storage
  • Removable Storage
  • Virtualization
  • Hypervisor
  • Application Cells/Containers
  • VM Sprawl Avoidance
  • VM Escape Protection
  • Snapshots
  • Patch Compatibility
  • Host Availability/Elasticity
  • Security Control Testing
  • Sandboxing
  • Networking
  • Network Interface Cards
  • Hubs
  • Bridges
  • Switches.
  • Port Security.