000 -LEADER |
fixed length control field |
13481cam a22004937a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240510164350.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
a||||fo||d| 00| 0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr aa aaaaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240508b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119362395 |
Qualifying information |
(softcover) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119369141 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)on1007857746 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.B766 2018 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Brooks, Charles J., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Cybersecurity essentials / |
Statement of responsibility, etc |
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short. |
246 3# - VARYING FORM OF TITLE |
Title proper/short title |
Cyber security essentials |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Indianapolis, Indiana : |
Name of publisher, distributor, etc |
John Wiley & Sons Inc., |
Date of publication, distribution, etc |
[2018] |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Date of publication, distribution, etc |
©2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
336 ## - CONTENT TYPE |
Content type term |
still image |
Content type code |
sti |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 0# - CONTENTS |
Formatted contents note |
TABLE OF CONTENTS<br/>Introduction xix<br/><br/>PART I SECURING THE INFRASTRUCTURE 1<br/><br/>Chapter 1 Infrastructure Security in the Real World 3<br/><br/>Security Challenges 3<br/><br/>Infrastructure Security Scenario 1 4<br/><br/>Infrastructure Security Scenario 2 6<br/><br/>Summary 8<br/><br/>Chapter 2 Understanding Access-Control and Monitoring Systems 9<br/><br/>A Quick Primer on Infrastructure Security 9<br/><br/>Access Control 12<br/><br/>Security Policies 14<br/><br/>Physical Security Controls 15<br/><br/>Locks and Keys 16<br/><br/>Standard Key-Locking Deadbolts 17<br/><br/>Solenoid-Operated Deadbolt Locks 18<br/><br/>Cipher Locks 19<br/><br/>Access-Control Gates 20<br/><br/>Sliding Gates 20<br/><br/>Swinging Gates 21<br/><br/>Control Relays 21<br/><br/>Authentication Systems 23<br/><br/>Magnetic Stripe Readers 24<br/><br/>Smart Cards 25<br/><br/>RFID Badges 26<br/><br/>Biometric Scanners 27<br/><br/>Remote-Access Monitoring 29<br/><br/>Opened- and Closed-Condition Monitoring 30<br/><br/>Automated Access-Control Systems 32<br/><br/>Hands-On Exercises 33<br/><br/>Discussion 34<br/><br/>Procedure 35<br/><br/>Review Questions 43<br/><br/>Chapter 3 Understanding Video Surveillance Systems 45<br/><br/>Video Surveillance Systems 45<br/><br/>Cameras 46<br/><br/>Hands-On Exercises 60<br/><br/>Discussion 61<br/><br/>Procedure 61<br/><br/>Review Questions 69<br/><br/>Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71<br/><br/>Intrusion-Detection and Reporting Systems 71<br/><br/>Security Controllers 74<br/><br/>Sensors 77<br/><br/>Vehicle-Detection Sensors 82<br/><br/>Fire-Detection Sensors 85<br/><br/>Output Devices 87<br/><br/>Hands-On Exercises 90<br/><br/>Discussion 90<br/><br/>Procedure 92<br/><br/>Review Questions 94<br/><br/>Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97<br/><br/>Summary Points 97<br/><br/>Security Challenge Scenarios 101<br/><br/>Infrastructure Security Scenario 1 101<br/><br/>Infrastructure Security Scenario 2 102<br/><br/>Professional Feedback 102<br/><br/>Review Questions 107<br/><br/>Exam Questions 109<br/><br/>PART II SECURING LOCAL HOSTS 113<br/><br/>Chapter 6 Local Host Security in the Real World 115<br/><br/>Security Challenges 115<br/><br/>Computing Device Security Scenario 1 116<br/><br/>Computing Device Security Scenario 2 117<br/><br/>Summary 120<br/><br/>Chapter 7 Securing Devices 121<br/><br/>The Three Layers of Security 121<br/><br/>Securing Host Devices 123<br/><br/>Securing Outer-Perimeter Portals 124<br/><br/>Additional Inner-Perimeter Access Options 127<br/><br/>Hands-On Exercises 137<br/><br/>Objectives 137<br/><br/>Procedure 137<br/><br/>Review Questions 148<br/><br/>Chapter 8 Protecting the Inner Perimeter 149<br/><br/>The Inner Perimeter 149<br/><br/>Operating Systems 151<br/><br/>Operating System Security Choices 168<br/><br/>Common Operating System Security Tools 169<br/><br/>Using Local Administrative Tools 177<br/><br/>Implementing Data Encryption 182<br/><br/>Hands-On Exercises 188<br/><br/>Objectives 188<br/><br/>Resources 188<br/><br/>Discussion 189<br/><br/>Procedures 190<br/><br/>Tables 200<br/><br/>Lab Questions 201<br/><br/>Chapter 9 Protecting Remote Access 203<br/><br/>Protecting Local Computing Devices 203<br/><br/>Using a Secure Connection 204<br/><br/>Establishing and Using a Firewall 204<br/><br/>Installing and Using Anti-Malware Software 205<br/><br/>Removing Unnecessary Software 205<br/><br/>Disabling Nonessential Services 205<br/><br/>Disabling Unnecessary OS Default Features 205<br/><br/>Securing the Web Browser 205<br/><br/>Applying Updates and Patches 206<br/><br/>Requiring Strong Passwords 206<br/><br/>Implementing Local Protection Tools 206<br/><br/>Software-Based Local Firewalls 207<br/><br/>Using Local Intrusion-Detection Tools 209<br/><br/>Profile-Based Anomaly-Detection Systems 210<br/><br/>Threshold-Based Anomaly-Detection Systems 211<br/><br/>Configuring Browser Security Options 211<br/><br/>Configuring Security Levels 213<br/><br/>Configuring Script Support 214<br/><br/>Defending Against Malicious Software 218<br/><br/>Using Antivirus Programs 220<br/><br/>Using Antispyware 221<br/><br/>Hardening Operating Systems 222<br/><br/>Service Packs 222<br/><br/>Patches 222<br/><br/>Updates 223<br/><br/>Overseeing Application Software Security 223<br/><br/>Software Exploitation 223<br/><br/>Applying Software Updates and Patches 224<br/><br/>Hands-On Exercises 225<br/><br/>Objectives 225<br/><br/>Resources 225<br/><br/>Discussion 225<br/><br/>Procedures 226<br/><br/>Tables 241<br/><br/>Lab Questions 242<br/><br/>Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243<br/><br/>Summary Points 243<br/><br/>Security Challenge Scenarios 248<br/><br/>Computing Device Security Scenario 1 248<br/><br/>Computing Device Security Scenario 2 248<br/><br/>Professional Feedback 248<br/><br/>Review Questions 257<br/><br/>Exam Questions 259<br/><br/>PART III SECURING LOCAL NETWORKS 263<br/><br/>Chapter 11 Local Network Security in the Real World 265<br/><br/>Security Challenges 266<br/><br/>Local Network Security Scenario 1 266<br/><br/>Local Network Security Scenario 2 270<br/><br/>Summary 272<br/><br/>Chapter 12 Networking Basics 273<br/><br/>Understanding the Basics of Networking 273<br/><br/>Campus Area Networks or Corporate Area Networks (CANs) 274<br/><br/>Metropolitan Area Networks (MANs) 274<br/><br/>Wireless Local Area Networks (WLANs) 274<br/><br/>Storage Area Networks (SANs) 274<br/><br/>The OSI Networking Model 275<br/><br/>Layer 1: Physical 276<br/><br/>Layer 2: Data Link 276<br/><br/>Layer 3: Network 276<br/><br/>Layer 4: Transport 276<br/><br/>Layer 5: Session 276<br/><br/>Layer 6: Presentation 277<br/><br/>Layer 7: Application 277<br/><br/>Data Transmission Packets 277<br/><br/>OSI Layer Security 278<br/><br/>Network Topologies 280<br/><br/>Bus Topology 280<br/><br/>Ring Topology 280<br/><br/>Star Topology 281<br/><br/>Mesh Topology 282<br/><br/>Logical Topologies 282<br/><br/>Hands-On Exercises 283<br/><br/>Objectives 283<br/><br/>Resources 283<br/><br/>Discussion 283<br/><br/>Procedure 284<br/><br/>Lab Questions 295<br/><br/>Lab Answers 295<br/><br/>Chapter 13 Understanding Networking Protocols 297<br/><br/>The Basics of Networking Protocols 297<br/><br/>MAC Addresses 298<br/><br/>TCP/IP 299<br/><br/>Ethernet 309<br/><br/>Network Control Strategies 311<br/><br/>Hands-On Exercises 313<br/><br/>Objectives 313<br/><br/>Discussion 313<br/><br/>Procedures 314<br/><br/>Lab Questions 325<br/><br/>Lab Answers 326<br/><br/>Chapter 14 Understanding Network Servers 327<br/><br/>The Basics of Network Servers 327<br/><br/>Server Security 330<br/><br/>Network Administrators 331<br/><br/>Server Software Security 335<br/><br/>User Accounts 341<br/><br/>Network Authentication Options 347<br/><br/>Establishing Resource Controls 348<br/><br/>Maintaining Server Security 352<br/><br/>Vulnerability Scanning 358<br/><br/>Hands-On Exercises 361<br/><br/>Objectives 361<br/><br/>Resources 361<br/><br/>Discussion 362<br/><br/>Procedures 362<br/><br/>Lab Questions 382<br/><br/>Lab Answers 382<br/><br/>Chapter 15 Understanding Network Connectivity Devices 385<br/><br/>Network Switches 386<br/><br/>Routers 388<br/><br/>Gateways 390<br/><br/>Network Bridges 391<br/><br/>Wireless Network Connectivity 392<br/><br/>Network Connectivity Device Vulnerabilities 392<br/><br/>Network Connectivity Device Attacks 393<br/><br/>Network Connectivity Defense 397<br/><br/>Network Hardening 398<br/><br/>Hands-On Exercises 399<br/><br/>Objectives 399<br/><br/>Resources 399<br/><br/>Procedures 399<br/><br/>Lab Questions 404<br/><br/>Lab Answers 404<br/><br/>Chapter 16 Understanding Network Transmission Media Security 407<br/><br/>The Basics of Network Transmission Media 407<br/><br/>Copper Wire 408<br/><br/>Light Waves 410<br/><br/>Wireless Signals 412<br/><br/>Transmission Media Vulnerabilities 415<br/><br/>Securing Wireless Networks 415<br/><br/>Hands-On Exercises 417<br/><br/>Objectives 417<br/><br/>Resources 417<br/><br/>Procedure 417<br/><br/>Lab Questions 421<br/><br/>Lab Answers 421<br/><br/>Chapter 17 Local Network Security: Review Questions 423<br/><br/>Summary Points 423<br/><br/>Security Challenge Scenarios 432<br/><br/>Local Network Security Scenario 1 432<br/><br/>Local Network Security Scenario 2 432<br/><br/>Professional Feedback 432<br/><br/>Review Questions 443<br/><br/>PART IV SECURING THE PERIMETER 449<br/><br/>Chapter 18 Perimeter Security in the Real World 451<br/><br/>Security Challenges 451<br/><br/>Internet Security Scenario 1 451<br/><br/>Internet Security Scenario 2 454<br/><br/>Summary 455<br/><br/>Chapter 19 Understanding the Environment 457<br/><br/>The Basics of Internet Security 457<br/><br/>Understanding the Environment 460<br/><br/>Basic Internet Concepts 461<br/><br/>Internet Services 468<br/><br/>Standards and RFCs 470<br/><br/>Hands-On Exercises 471<br/><br/>Objectives 471<br/><br/>Resources 472<br/><br/>Discussion 472<br/><br/>Procedures 472<br/><br/>Lab Questions 486<br/><br/>Lab Answers 486<br/><br/>Chapter 20 Hiding the Private Network 487<br/><br/>Understanding Private Networks 487<br/><br/>Network Address Translation 488<br/><br/>Port Address Translation 489<br/><br/>Port Forwarding or Mapping 490<br/><br/>Network Segmentation 492<br/><br/>Software-Defined Networking 494<br/><br/>Hands-On Exercises 496<br/><br/>Objectives 496<br/><br/>Resources 496<br/><br/>Discussion 496<br/><br/>Procedure 497<br/><br/>Lab Questions 508<br/><br/>Lab Answers 509<br/><br/>Chapter 21 Protecting the Perimeter 511<br/><br/>Understanding the Perimeter 511<br/><br/>Firewalls 515<br/><br/>Firewall Considerations 517<br/><br/>Network Appliances 519<br/><br/>Proxy Servers 520<br/><br/>Demilitarized Zones (DMZs) 522<br/><br/>Single-Firewall DMZs 523<br/><br/>Dual-Firewall DMZs 524<br/><br/>Honeypots 525<br/><br/>Extranets 526<br/><br/>Hands-On Exercises 528<br/><br/>Objectives 528<br/><br/>Resources 528<br/><br/>Procedures 528<br/><br/>Lab Questions 534<br/><br/>Lab Answers 534<br/><br/>Chapter 22 Protecting Data Moving Through the Internet 535<br/><br/>Securing Data in Motion 535<br/><br/>Authentication 536<br/><br/>Encryption 542<br/><br/>Cryptography 543<br/><br/>Digital Certificates 545<br/><br/>Hash Tables 548<br/><br/>Cookies 548<br/><br/>CAPTCHAs 549<br/><br/>Virtual Private Networks 550<br/><br/>Hands-On Exercises 552<br/><br/>Objectives 552<br/><br/>Resources 552<br/><br/>Discussion 552<br/><br/>Procedures 552<br/><br/>Lab Questions 563<br/><br/>Lab Answers 563<br/><br/>Chapter 23 Tools and Utilities 565<br/><br/>Using Basic Tools 565<br/><br/>IFconfig/IPconfig 565<br/><br/>Whois 566<br/><br/>Nslookup 567<br/><br/>PING 567<br/><br/>Traceroute 568<br/><br/>Telnet 569<br/><br/>Secure Shell 570<br/><br/>Monitoring Tools and Software 570<br/><br/>Nagios 572<br/><br/>SolarWinds 572<br/><br/>Microsoft Network Monitor 572<br/><br/>Wireshark 572<br/><br/>Snort 573<br/><br/>Nmap 575<br/><br/>Nikto 575<br/><br/>OpenVAS 575<br/><br/>Metasploit 575<br/><br/>The Browser Exploitation Framework (BeEF) 576<br/><br/>Other Products 576<br/><br/>Hands-On Exercises 578<br/><br/>Objectives 578<br/><br/>Resources 578<br/><br/>Discussion 578<br/><br/>Procedures 579<br/><br/>Capturing a PING 583<br/><br/>Lab Questions 589<br/><br/>Lab Answers 589<br/><br/>Chapter 24 Identifying and Defending Against Vulnerabilities 591<br/><br/>Zero Day Vulnerabilities 591<br/><br/>Software Exploits 592<br/><br/>SQL Injection 594<br/><br/>Java 597<br/><br/>Other Software Exploits 599<br/><br/>Social Engineering Exploits 600<br/><br/>Phishing Attacks 600<br/><br/>Network Threats and Attacks 603<br/><br/>Broadcast Storms 603<br/><br/>Session-Hijacking Attacks 604<br/><br/>Dictionary Attacks 606<br/><br/>Denial of Service (DoS) Attacks 606<br/><br/>Tarpitting 611<br/><br/>Spam 612<br/><br/>Protecting Against Spam Exploits 613<br/><br/>Other Exploits 614<br/><br/>Transport Layer Security (TLS) Exploits 614<br/><br/>FREAK Exploits 615<br/><br/>Logjam Exploits 615<br/><br/>Hands-On Exercises 616<br/><br/>Objectives 616<br/><br/>Resources 616<br/><br/>Discussion 616<br/><br/>Procedures 616<br/><br/>Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627<br/><br/>Summary Points 627<br/><br/>Security Scenario Review 637<br/><br/>Network Security Scenario 1 637<br/><br/>Network Security Scenario 2 637<br/><br/>Professional Feedback 637<br/><br/>Review Questions 644<br/><br/>Exam Questions 647<br/><br/>Appendix A 651<br/><br/>Appendix B 703<br/><br/>Appendix C 715<br/><br/>Index 727 |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description. |
545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
Biographical or historical note |
ABOUT THE AUTHOR<br/>CHARLES J. BROOKS is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company.<br/><br/>CHRISTOPHER GROW is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience.<br/><br/>PHILIP CRAIG is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas.<br/><br/>DONALD SHORT is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
fast |
Authority record control number |
(OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
Source of heading or term |
fast |
Authority record control number |
(OCoLC)fst00872484 |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Grow, Christopher, |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Craig, Philip |
Titles and other words associated with a name |
(Engineer), |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Short, Donald, |
Relator term |
author. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141 |
Link text |
Full text is available at Wiley Online Library Click here to view |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |