Cybersecurity essentials / (Record no. 87296)

000 -LEADER
fixed length control field 13481cam a22004937a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240510164350.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field a||||fo||d| 00| 0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr aa aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240508b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119362395
Qualifying information (softcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119369141
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)on1007857746
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .B766 2018
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Brooks, Charles J.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity essentials /
Statement of responsibility, etc Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.
246 3# - VARYING FORM OF TITLE
Title proper/short title Cyber security essentials
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, Indiana :
Name of publisher, distributor, etc John Wiley & Sons Inc.,
Date of publication, distribution, etc [2018]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2018
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
336 ## - CONTENT TYPE
Content type term still image
Content type code sti
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - CONTENTS
Formatted contents note TABLE OF CONTENTS<br/>Introduction xix<br/><br/>PART I SECURING THE INFRASTRUCTURE 1<br/><br/>Chapter 1 Infrastructure Security in the Real World 3<br/><br/>Security Challenges 3<br/><br/>Infrastructure Security Scenario 1 4<br/><br/>Infrastructure Security Scenario 2 6<br/><br/>Summary 8<br/><br/>Chapter 2 Understanding Access-Control and Monitoring Systems 9<br/><br/>A Quick Primer on Infrastructure Security 9<br/><br/>Access Control 12<br/><br/>Security Policies 14<br/><br/>Physical Security Controls 15<br/><br/>Locks and Keys 16<br/><br/>Standard Key-Locking Deadbolts 17<br/><br/>Solenoid-Operated Deadbolt Locks 18<br/><br/>Cipher Locks 19<br/><br/>Access-Control Gates 20<br/><br/>Sliding Gates 20<br/><br/>Swinging Gates 21<br/><br/>Control Relays 21<br/><br/>Authentication Systems 23<br/><br/>Magnetic Stripe Readers 24<br/><br/>Smart Cards 25<br/><br/>RFID Badges 26<br/><br/>Biometric Scanners 27<br/><br/>Remote-Access Monitoring 29<br/><br/>Opened- and Closed-Condition Monitoring 30<br/><br/>Automated Access-Control Systems 32<br/><br/>Hands-On Exercises 33<br/><br/>Discussion 34<br/><br/>Procedure 35<br/><br/>Review Questions 43<br/><br/>Chapter 3 Understanding Video Surveillance Systems 45<br/><br/>Video Surveillance Systems 45<br/><br/>Cameras 46<br/><br/>Hands-On Exercises 60<br/><br/>Discussion 61<br/><br/>Procedure 61<br/><br/>Review Questions 69<br/><br/>Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71<br/><br/>Intrusion-Detection and Reporting Systems 71<br/><br/>Security Controllers 74<br/><br/>Sensors 77<br/><br/>Vehicle-Detection Sensors 82<br/><br/>Fire-Detection Sensors 85<br/><br/>Output Devices 87<br/><br/>Hands-On Exercises 90<br/><br/>Discussion 90<br/><br/>Procedure 92<br/><br/>Review Questions 94<br/><br/>Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97<br/><br/>Summary Points 97<br/><br/>Security Challenge Scenarios 101<br/><br/>Infrastructure Security Scenario 1 101<br/><br/>Infrastructure Security Scenario 2 102<br/><br/>Professional Feedback 102<br/><br/>Review Questions 107<br/><br/>Exam Questions 109<br/><br/>PART II SECURING LOCAL HOSTS 113<br/><br/>Chapter 6 Local Host Security in the Real World 115<br/><br/>Security Challenges 115<br/><br/>Computing Device Security Scenario 1 116<br/><br/>Computing Device Security Scenario 2 117<br/><br/>Summary 120<br/><br/>Chapter 7 Securing Devices 121<br/><br/>The Three Layers of Security 121<br/><br/>Securing Host Devices 123<br/><br/>Securing Outer-Perimeter Portals 124<br/><br/>Additional Inner-Perimeter Access Options 127<br/><br/>Hands-On Exercises 137<br/><br/>Objectives 137<br/><br/>Procedure 137<br/><br/>Review Questions 148<br/><br/>Chapter 8 Protecting the Inner Perimeter 149<br/><br/>The Inner Perimeter 149<br/><br/>Operating Systems 151<br/><br/>Operating System Security Choices 168<br/><br/>Common Operating System Security Tools 169<br/><br/>Using Local Administrative Tools 177<br/><br/>Implementing Data Encryption 182<br/><br/>Hands-On Exercises 188<br/><br/>Objectives 188<br/><br/>Resources 188<br/><br/>Discussion 189<br/><br/>Procedures 190<br/><br/>Tables 200<br/><br/>Lab Questions 201<br/><br/>Chapter 9 Protecting Remote Access 203<br/><br/>Protecting Local Computing Devices 203<br/><br/>Using a Secure Connection 204<br/><br/>Establishing and Using a Firewall 204<br/><br/>Installing and Using Anti-Malware Software 205<br/><br/>Removing Unnecessary Software 205<br/><br/>Disabling Nonessential Services 205<br/><br/>Disabling Unnecessary OS Default Features 205<br/><br/>Securing the Web Browser 205<br/><br/>Applying Updates and Patches 206<br/><br/>Requiring Strong Passwords 206<br/><br/>Implementing Local Protection Tools 206<br/><br/>Software-Based Local Firewalls 207<br/><br/>Using Local Intrusion-Detection Tools 209<br/><br/>Profile-Based Anomaly-Detection Systems 210<br/><br/>Threshold-Based Anomaly-Detection Systems 211<br/><br/>Configuring Browser Security Options 211<br/><br/>Configuring Security Levels 213<br/><br/>Configuring Script Support 214<br/><br/>Defending Against Malicious Software 218<br/><br/>Using Antivirus Programs 220<br/><br/>Using Antispyware 221<br/><br/>Hardening Operating Systems 222<br/><br/>Service Packs 222<br/><br/>Patches 222<br/><br/>Updates 223<br/><br/>Overseeing Application Software Security 223<br/><br/>Software Exploitation 223<br/><br/>Applying Software Updates and Patches 224<br/><br/>Hands-On Exercises 225<br/><br/>Objectives 225<br/><br/>Resources 225<br/><br/>Discussion 225<br/><br/>Procedures 226<br/><br/>Tables 241<br/><br/>Lab Questions 242<br/><br/>Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243<br/><br/>Summary Points 243<br/><br/>Security Challenge Scenarios 248<br/><br/>Computing Device Security Scenario 1 248<br/><br/>Computing Device Security Scenario 2 248<br/><br/>Professional Feedback 248<br/><br/>Review Questions 257<br/><br/>Exam Questions 259<br/><br/>PART III SECURING LOCAL NETWORKS 263<br/><br/>Chapter 11 Local Network Security in the Real World 265<br/><br/>Security Challenges 266<br/><br/>Local Network Security Scenario 1 266<br/><br/>Local Network Security Scenario 2 270<br/><br/>Summary 272<br/><br/>Chapter 12 Networking Basics 273<br/><br/>Understanding the Basics of Networking 273<br/><br/>Campus Area Networks or Corporate Area Networks (CANs) 274<br/><br/>Metropolitan Area Networks (MANs) 274<br/><br/>Wireless Local Area Networks (WLANs) 274<br/><br/>Storage Area Networks (SANs) 274<br/><br/>The OSI Networking Model 275<br/><br/>Layer 1: Physical 276<br/><br/>Layer 2: Data Link 276<br/><br/>Layer 3: Network 276<br/><br/>Layer 4: Transport 276<br/><br/>Layer 5: Session 276<br/><br/>Layer 6: Presentation 277<br/><br/>Layer 7: Application 277<br/><br/>Data Transmission Packets 277<br/><br/>OSI Layer Security 278<br/><br/>Network Topologies 280<br/><br/>Bus Topology 280<br/><br/>Ring Topology 280<br/><br/>Star Topology 281<br/><br/>Mesh Topology 282<br/><br/>Logical Topologies 282<br/><br/>Hands-On Exercises 283<br/><br/>Objectives 283<br/><br/>Resources 283<br/><br/>Discussion 283<br/><br/>Procedure 284<br/><br/>Lab Questions 295<br/><br/>Lab Answers 295<br/><br/>Chapter 13 Understanding Networking Protocols 297<br/><br/>The Basics of Networking Protocols 297<br/><br/>MAC Addresses 298<br/><br/>TCP/IP 299<br/><br/>Ethernet 309<br/><br/>Network Control Strategies 311<br/><br/>Hands-On Exercises 313<br/><br/>Objectives 313<br/><br/>Discussion 313<br/><br/>Procedures 314<br/><br/>Lab Questions 325<br/><br/>Lab Answers 326<br/><br/>Chapter 14 Understanding Network Servers 327<br/><br/>The Basics of Network Servers 327<br/><br/>Server Security 330<br/><br/>Network Administrators 331<br/><br/>Server Software Security 335<br/><br/>User Accounts 341<br/><br/>Network Authentication Options 347<br/><br/>Establishing Resource Controls 348<br/><br/>Maintaining Server Security 352<br/><br/>Vulnerability Scanning 358<br/><br/>Hands-On Exercises 361<br/><br/>Objectives 361<br/><br/>Resources 361<br/><br/>Discussion 362<br/><br/>Procedures 362<br/><br/>Lab Questions 382<br/><br/>Lab Answers 382<br/><br/>Chapter 15 Understanding Network Connectivity Devices 385<br/><br/>Network Switches 386<br/><br/>Routers 388<br/><br/>Gateways 390<br/><br/>Network Bridges 391<br/><br/>Wireless Network Connectivity 392<br/><br/>Network Connectivity Device Vulnerabilities 392<br/><br/>Network Connectivity Device Attacks 393<br/><br/>Network Connectivity Defense 397<br/><br/>Network Hardening 398<br/><br/>Hands-On Exercises 399<br/><br/>Objectives 399<br/><br/>Resources 399<br/><br/>Procedures 399<br/><br/>Lab Questions 404<br/><br/>Lab Answers 404<br/><br/>Chapter 16 Understanding Network Transmission Media Security 407<br/><br/>The Basics of Network Transmission Media 407<br/><br/>Copper Wire 408<br/><br/>Light Waves 410<br/><br/>Wireless Signals 412<br/><br/>Transmission Media Vulnerabilities 415<br/><br/>Securing Wireless Networks 415<br/><br/>Hands-On Exercises 417<br/><br/>Objectives 417<br/><br/>Resources 417<br/><br/>Procedure 417<br/><br/>Lab Questions 421<br/><br/>Lab Answers 421<br/><br/>Chapter 17 Local Network Security: Review Questions 423<br/><br/>Summary Points 423<br/><br/>Security Challenge Scenarios 432<br/><br/>Local Network Security Scenario 1 432<br/><br/>Local Network Security Scenario 2 432<br/><br/>Professional Feedback 432<br/><br/>Review Questions 443<br/><br/>PART IV SECURING THE PERIMETER 449<br/><br/>Chapter 18 Perimeter Security in the Real World 451<br/><br/>Security Challenges 451<br/><br/>Internet Security Scenario 1 451<br/><br/>Internet Security Scenario 2 454<br/><br/>Summary 455<br/><br/>Chapter 19 Understanding the Environment 457<br/><br/>The Basics of Internet Security 457<br/><br/>Understanding the Environment 460<br/><br/>Basic Internet Concepts 461<br/><br/>Internet Services 468<br/><br/>Standards and RFCs 470<br/><br/>Hands-On Exercises 471<br/><br/>Objectives 471<br/><br/>Resources 472<br/><br/>Discussion 472<br/><br/>Procedures 472<br/><br/>Lab Questions 486<br/><br/>Lab Answers 486<br/><br/>Chapter 20 Hiding the Private Network 487<br/><br/>Understanding Private Networks 487<br/><br/>Network Address Translation 488<br/><br/>Port Address Translation 489<br/><br/>Port Forwarding or Mapping 490<br/><br/>Network Segmentation 492<br/><br/>Software-Defined Networking 494<br/><br/>Hands-On Exercises 496<br/><br/>Objectives 496<br/><br/>Resources 496<br/><br/>Discussion 496<br/><br/>Procedure 497<br/><br/>Lab Questions 508<br/><br/>Lab Answers 509<br/><br/>Chapter 21 Protecting the Perimeter 511<br/><br/>Understanding the Perimeter 511<br/><br/>Firewalls 515<br/><br/>Firewall Considerations 517<br/><br/>Network Appliances 519<br/><br/>Proxy Servers 520<br/><br/>Demilitarized Zones (DMZs) 522<br/><br/>Single-Firewall DMZs 523<br/><br/>Dual-Firewall DMZs 524<br/><br/>Honeypots 525<br/><br/>Extranets 526<br/><br/>Hands-On Exercises 528<br/><br/>Objectives 528<br/><br/>Resources 528<br/><br/>Procedures 528<br/><br/>Lab Questions 534<br/><br/>Lab Answers 534<br/><br/>Chapter 22 Protecting Data Moving Through the Internet 535<br/><br/>Securing Data in Motion 535<br/><br/>Authentication 536<br/><br/>Encryption 542<br/><br/>Cryptography 543<br/><br/>Digital Certificates 545<br/><br/>Hash Tables 548<br/><br/>Cookies 548<br/><br/>CAPTCHAs 549<br/><br/>Virtual Private Networks 550<br/><br/>Hands-On Exercises 552<br/><br/>Objectives 552<br/><br/>Resources 552<br/><br/>Discussion 552<br/><br/>Procedures 552<br/><br/>Lab Questions 563<br/><br/>Lab Answers 563<br/><br/>Chapter 23 Tools and Utilities 565<br/><br/>Using Basic Tools 565<br/><br/>IFconfig/IPconfig 565<br/><br/>Whois 566<br/><br/>Nslookup 567<br/><br/>PING 567<br/><br/>Traceroute 568<br/><br/>Telnet 569<br/><br/>Secure Shell 570<br/><br/>Monitoring Tools and Software 570<br/><br/>Nagios 572<br/><br/>SolarWinds 572<br/><br/>Microsoft Network Monitor 572<br/><br/>Wireshark 572<br/><br/>Snort 573<br/><br/>Nmap 575<br/><br/>Nikto 575<br/><br/>OpenVAS 575<br/><br/>Metasploit 575<br/><br/>The Browser Exploitation Framework (BeEF) 576<br/><br/>Other Products 576<br/><br/>Hands-On Exercises 578<br/><br/>Objectives 578<br/><br/>Resources 578<br/><br/>Discussion 578<br/><br/>Procedures 579<br/><br/>Capturing a PING 583<br/><br/>Lab Questions 589<br/><br/>Lab Answers 589<br/><br/>Chapter 24 Identifying and Defending Against Vulnerabilities 591<br/><br/>Zero Day Vulnerabilities 591<br/><br/>Software Exploits 592<br/><br/>SQL Injection 594<br/><br/>Java 597<br/><br/>Other Software Exploits 599<br/><br/>Social Engineering Exploits 600<br/><br/>Phishing Attacks 600<br/><br/>Network Threats and Attacks 603<br/><br/>Broadcast Storms 603<br/><br/>Session-Hijacking Attacks 604<br/><br/>Dictionary Attacks 606<br/><br/>Denial of Service (DoS) Attacks 606<br/><br/>Tarpitting 611<br/><br/>Spam 612<br/><br/>Protecting Against Spam Exploits 613<br/><br/>Other Exploits 614<br/><br/>Transport Layer Security (TLS) Exploits 614<br/><br/>FREAK Exploits 615<br/><br/>Logjam Exploits 615<br/><br/>Hands-On Exercises 616<br/><br/>Objectives 616<br/><br/>Resources 616<br/><br/>Discussion 616<br/><br/>Procedures 616<br/><br/>Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627<br/><br/>Summary Points 627<br/><br/>Security Scenario Review 637<br/><br/>Network Security Scenario 1 637<br/><br/>Network Security Scenario 2 637<br/><br/>Professional Feedback 637<br/><br/>Review Questions 644<br/><br/>Exam Questions 647<br/><br/>Appendix A 651<br/><br/>Appendix B 703<br/><br/>Appendix C 715<br/><br/>Index 727
520 ## - SUMMARY, ETC.
Summary, etc "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note ABOUT THE AUTHOR<br/>CHARLES J. BROOKS is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company.<br/><br/>CHRISTOPHER GROW is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience.<br/><br/>PHILIP CRAIG is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas.<br/><br/>DONALD SHORT is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
Authority record control number (OCoLC)fst00872484
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Grow, Christopher,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Craig, Philip
Titles and other words associated with a name (Engineer),
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Short, Donald,
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119369141
Link text Full text is available at Wiley Online Library Click here to view
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2024-05-08 ALBASA Consortium 52170 005.8 B7913 2018 CL-52170 2024-05-08 2024-05-08 EBOOK