Cybersecurity essentials / Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.

By: Brooks, Charles J [author.]
Contributor(s): Grow, Christopher [author.] | Craig, Philip (Engineer) [author.] | Short, Donald [author.]
Language: English Publisher: Indianapolis, Indiana : John Wiley & Sons Inc., [2018]Copyright date: ©2018Description: 1 online resourceContent type: text | still image Media type: computer Carrier type: online resourceISBN: 9781119362395; 9781119369141Other title: Cyber security essentialsSubject(s): Computer networks -- Security measures | Computer security | Computer networks -- Security measures | Computer securityGenre/Form: Electronic books.DDC classification: 005.8 LOC classification: TK5105.59 | .B766 2018Online resources: Full text is available at Wiley Online Library Click here to view
Contents:
TABLE OF CONTENTS Introduction xix PART I SECURING THE INFRASTRUCTURE 1 Chapter 1 Infrastructure Security in the Real World 3 Security Challenges 3 Infrastructure Security Scenario 1 4 Infrastructure Security Scenario 2 6 Summary 8 Chapter 2 Understanding Access-Control and Monitoring Systems 9 A Quick Primer on Infrastructure Security 9 Access Control 12 Security Policies 14 Physical Security Controls 15 Locks and Keys 16 Standard Key-Locking Deadbolts 17 Solenoid-Operated Deadbolt Locks 18 Cipher Locks 19 Access-Control Gates 20 Sliding Gates 20 Swinging Gates 21 Control Relays 21 Authentication Systems 23 Magnetic Stripe Readers 24 Smart Cards 25 RFID Badges 26 Biometric Scanners 27 Remote-Access Monitoring 29 Opened- and Closed-Condition Monitoring 30 Automated Access-Control Systems 32 Hands-On Exercises 33 Discussion 34 Procedure 35 Review Questions 43 Chapter 3 Understanding Video Surveillance Systems 45 Video Surveillance Systems 45 Cameras 46 Hands-On Exercises 60 Discussion 61 Procedure 61 Review Questions 69 Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71 Intrusion-Detection and Reporting Systems 71 Security Controllers 74 Sensors 77 Vehicle-Detection Sensors 82 Fire-Detection Sensors 85 Output Devices 87 Hands-On Exercises 90 Discussion 90 Procedure 92 Review Questions 94 Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97 Summary Points 97 Security Challenge Scenarios 101 Infrastructure Security Scenario 1 101 Infrastructure Security Scenario 2 102 Professional Feedback 102 Review Questions 107 Exam Questions 109 PART II SECURING LOCAL HOSTS 113 Chapter 6 Local Host Security in the Real World 115 Security Challenges 115 Computing Device Security Scenario 1 116 Computing Device Security Scenario 2 117 Summary 120 Chapter 7 Securing Devices 121 The Three Layers of Security 121 Securing Host Devices 123 Securing Outer-Perimeter Portals 124 Additional Inner-Perimeter Access Options 127 Hands-On Exercises 137 Objectives 137 Procedure 137 Review Questions 148 Chapter 8 Protecting the Inner Perimeter 149 The Inner Perimeter 149 Operating Systems 151 Operating System Security Choices 168 Common Operating System Security Tools 169 Using Local Administrative Tools 177 Implementing Data Encryption 182 Hands-On Exercises 188 Objectives 188 Resources 188 Discussion 189 Procedures 190 Tables 200 Lab Questions 201 Chapter 9 Protecting Remote Access 203 Protecting Local Computing Devices 203 Using a Secure Connection 204 Establishing and Using a Firewall 204 Installing and Using Anti-Malware Software 205 Removing Unnecessary Software 205 Disabling Nonessential Services 205 Disabling Unnecessary OS Default Features 205 Securing the Web Browser 205 Applying Updates and Patches 206 Requiring Strong Passwords 206 Implementing Local Protection Tools 206 Software-Based Local Firewalls 207 Using Local Intrusion-Detection Tools 209 Profile-Based Anomaly-Detection Systems 210 Threshold-Based Anomaly-Detection Systems 211 Configuring Browser Security Options 211 Configuring Security Levels 213 Configuring Script Support 214 Defending Against Malicious Software 218 Using Antivirus Programs 220 Using Antispyware 221 Hardening Operating Systems 222 Service Packs 222 Patches 222 Updates 223 Overseeing Application Software Security 223 Software Exploitation 223 Applying Software Updates and Patches 224 Hands-On Exercises 225 Objectives 225 Resources 225 Discussion 225 Procedures 226 Tables 241 Lab Questions 242 Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243 Summary Points 243 Security Challenge Scenarios 248 Computing Device Security Scenario 1 248 Computing Device Security Scenario 2 248 Professional Feedback 248 Review Questions 257 Exam Questions 259 PART III SECURING LOCAL NETWORKS 263 Chapter 11 Local Network Security in the Real World 265 Security Challenges 266 Local Network Security Scenario 1 266 Local Network Security Scenario 2 270 Summary 272 Chapter 12 Networking Basics 273 Understanding the Basics of Networking 273 Campus Area Networks or Corporate Area Networks (CANs) 274 Metropolitan Area Networks (MANs) 274 Wireless Local Area Networks (WLANs) 274 Storage Area Networks (SANs) 274 The OSI Networking Model 275 Layer 1: Physical 276 Layer 2: Data Link 276 Layer 3: Network 276 Layer 4: Transport 276 Layer 5: Session 276 Layer 6: Presentation 277 Layer 7: Application 277 Data Transmission Packets 277 OSI Layer Security 278 Network Topologies 280 Bus Topology 280 Ring Topology 280 Star Topology 281 Mesh Topology 282 Logical Topologies 282 Hands-On Exercises 283 Objectives 283 Resources 283 Discussion 283 Procedure 284 Lab Questions 295 Lab Answers 295 Chapter 13 Understanding Networking Protocols 297 The Basics of Networking Protocols 297 MAC Addresses 298 TCP/IP 299 Ethernet 309 Network Control Strategies 311 Hands-On Exercises 313 Objectives 313 Discussion 313 Procedures 314 Lab Questions 325 Lab Answers 326 Chapter 14 Understanding Network Servers 327 The Basics of Network Servers 327 Server Security 330 Network Administrators 331 Server Software Security 335 User Accounts 341 Network Authentication Options 347 Establishing Resource Controls 348 Maintaining Server Security 352 Vulnerability Scanning 358 Hands-On Exercises 361 Objectives 361 Resources 361 Discussion 362 Procedures 362 Lab Questions 382 Lab Answers 382 Chapter 15 Understanding Network Connectivity Devices 385 Network Switches 386 Routers 388 Gateways 390 Network Bridges 391 Wireless Network Connectivity 392 Network Connectivity Device Vulnerabilities 392 Network Connectivity Device Attacks 393 Network Connectivity Defense 397 Network Hardening 398 Hands-On Exercises 399 Objectives 399 Resources 399 Procedures 399 Lab Questions 404 Lab Answers 404 Chapter 16 Understanding Network Transmission Media Security 407 The Basics of Network Transmission Media 407 Copper Wire 408 Light Waves 410 Wireless Signals 412 Transmission Media Vulnerabilities 415 Securing Wireless Networks 415 Hands-On Exercises 417 Objectives 417 Resources 417 Procedure 417 Lab Questions 421 Lab Answers 421 Chapter 17 Local Network Security: Review Questions 423 Summary Points 423 Security Challenge Scenarios 432 Local Network Security Scenario 1 432 Local Network Security Scenario 2 432 Professional Feedback 432 Review Questions 443 PART IV SECURING THE PERIMETER 449 Chapter 18 Perimeter Security in the Real World 451 Security Challenges 451 Internet Security Scenario 1 451 Internet Security Scenario 2 454 Summary 455 Chapter 19 Understanding the Environment 457 The Basics of Internet Security 457 Understanding the Environment 460 Basic Internet Concepts 461 Internet Services 468 Standards and RFCs 470 Hands-On Exercises 471 Objectives 471 Resources 472 Discussion 472 Procedures 472 Lab Questions 486 Lab Answers 486 Chapter 20 Hiding the Private Network 487 Understanding Private Networks 487 Network Address Translation 488 Port Address Translation 489 Port Forwarding or Mapping 490 Network Segmentation 492 Software-Defined Networking 494 Hands-On Exercises 496 Objectives 496 Resources 496 Discussion 496 Procedure 497 Lab Questions 508 Lab Answers 509 Chapter 21 Protecting the Perimeter 511 Understanding the Perimeter 511 Firewalls 515 Firewall Considerations 517 Network Appliances 519 Proxy Servers 520 Demilitarized Zones (DMZs) 522 Single-Firewall DMZs 523 Dual-Firewall DMZs 524 Honeypots 525 Extranets 526 Hands-On Exercises 528 Objectives 528 Resources 528 Procedures 528 Lab Questions 534 Lab Answers 534 Chapter 22 Protecting Data Moving Through the Internet 535 Securing Data in Motion 535 Authentication 536 Encryption 542 Cryptography 543 Digital Certificates 545 Hash Tables 548 Cookies 548 CAPTCHAs 549 Virtual Private Networks 550 Hands-On Exercises 552 Objectives 552 Resources 552 Discussion 552 Procedures 552 Lab Questions 563 Lab Answers 563 Chapter 23 Tools and Utilities 565 Using Basic Tools 565 IFconfig/IPconfig 565 Whois 566 Nslookup 567 PING 567 Traceroute 568 Telnet 569 Secure Shell 570 Monitoring Tools and Software 570 Nagios 572 SolarWinds 572 Microsoft Network Monitor 572 Wireshark 572 Snort 573 Nmap 575 Nikto 575 OpenVAS 575 Metasploit 575 The Browser Exploitation Framework (BeEF) 576 Other Products 576 Hands-On Exercises 578 Objectives 578 Resources 578 Discussion 578 Procedures 579 Capturing a PING 583 Lab Questions 589 Lab Answers 589 Chapter 24 Identifying and Defending Against Vulnerabilities 591 Zero Day Vulnerabilities 591 Software Exploits 592 SQL Injection 594 Java 597 Other Software Exploits 599 Social Engineering Exploits 600 Phishing Attacks 600 Network Threats and Attacks 603 Broadcast Storms 603 Session-Hijacking Attacks 604 Dictionary Attacks 606 Denial of Service (DoS) Attacks 606 Tarpitting 611 Spam 612 Protecting Against Spam Exploits 613 Other Exploits 614 Transport Layer Security (TLS) Exploits 614 FREAK Exploits 615 Logjam Exploits 615 Hands-On Exercises 616 Objectives 616 Resources 616 Discussion 616 Procedures 616 Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627 Summary Points 627 Security Scenario Review 637 Network Security Scenario 1 637 Network Security Scenario 2 637 Professional Feedback 637 Review Questions 644 Exam Questions 647 Appendix A 651 Appendix B 703 Appendix C 715 Index 727
Summary: "Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
EBOOK EBOOK COLLEGE LIBRARY
COLLEGE LIBRARY
005.8 B7913 2018 (Browse shelf) Available CL-52170
Total holds: 0

Includes index.

TABLE OF CONTENTS
Introduction xix

PART I SECURING THE INFRASTRUCTURE 1

Chapter 1 Infrastructure Security in the Real World 3

Security Challenges 3

Infrastructure Security Scenario 1 4

Infrastructure Security Scenario 2 6

Summary 8

Chapter 2 Understanding Access-Control and Monitoring Systems 9

A Quick Primer on Infrastructure Security 9

Access Control 12

Security Policies 14

Physical Security Controls 15

Locks and Keys 16

Standard Key-Locking Deadbolts 17

Solenoid-Operated Deadbolt Locks 18

Cipher Locks 19

Access-Control Gates 20

Sliding Gates 20

Swinging Gates 21

Control Relays 21

Authentication Systems 23

Magnetic Stripe Readers 24

Smart Cards 25

RFID Badges 26

Biometric Scanners 27

Remote-Access Monitoring 29

Opened- and Closed-Condition Monitoring 30

Automated Access-Control Systems 32

Hands-On Exercises 33

Discussion 34

Procedure 35

Review Questions 43

Chapter 3 Understanding Video Surveillance Systems 45

Video Surveillance Systems 45

Cameras 46

Hands-On Exercises 60

Discussion 61

Procedure 61

Review Questions 69

Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71

Intrusion-Detection and Reporting Systems 71

Security Controllers 74

Sensors 77

Vehicle-Detection Sensors 82

Fire-Detection Sensors 85

Output Devices 87

Hands-On Exercises 90

Discussion 90

Procedure 92

Review Questions 94

Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97

Summary Points 97

Security Challenge Scenarios 101

Infrastructure Security Scenario 1 101

Infrastructure Security Scenario 2 102

Professional Feedback 102

Review Questions 107

Exam Questions 109

PART II SECURING LOCAL HOSTS 113

Chapter 6 Local Host Security in the Real World 115

Security Challenges 115

Computing Device Security Scenario 1 116

Computing Device Security Scenario 2 117

Summary 120

Chapter 7 Securing Devices 121

The Three Layers of Security 121

Securing Host Devices 123

Securing Outer-Perimeter Portals 124

Additional Inner-Perimeter Access Options 127

Hands-On Exercises 137

Objectives 137

Procedure 137

Review Questions 148

Chapter 8 Protecting the Inner Perimeter 149

The Inner Perimeter 149

Operating Systems 151

Operating System Security Choices 168

Common Operating System Security Tools 169

Using Local Administrative Tools 177

Implementing Data Encryption 182

Hands-On Exercises 188

Objectives 188

Resources 188

Discussion 189

Procedures 190

Tables 200

Lab Questions 201

Chapter 9 Protecting Remote Access 203

Protecting Local Computing Devices 203

Using a Secure Connection 204

Establishing and Using a Firewall 204

Installing and Using Anti-Malware Software 205

Removing Unnecessary Software 205

Disabling Nonessential Services 205

Disabling Unnecessary OS Default Features 205

Securing the Web Browser 205

Applying Updates and Patches 206

Requiring Strong Passwords 206

Implementing Local Protection Tools 206

Software-Based Local Firewalls 207

Using Local Intrusion-Detection Tools 209

Profile-Based Anomaly-Detection Systems 210

Threshold-Based Anomaly-Detection Systems 211

Configuring Browser Security Options 211

Configuring Security Levels 213

Configuring Script Support 214

Defending Against Malicious Software 218

Using Antivirus Programs 220

Using Antispyware 221

Hardening Operating Systems 222

Service Packs 222

Patches 222

Updates 223

Overseeing Application Software Security 223

Software Exploitation 223

Applying Software Updates and Patches 224

Hands-On Exercises 225

Objectives 225

Resources 225

Discussion 225

Procedures 226

Tables 241

Lab Questions 242

Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243

Summary Points 243

Security Challenge Scenarios 248

Computing Device Security Scenario 1 248

Computing Device Security Scenario 2 248

Professional Feedback 248

Review Questions 257

Exam Questions 259

PART III SECURING LOCAL NETWORKS 263

Chapter 11 Local Network Security in the Real World 265

Security Challenges 266

Local Network Security Scenario 1 266

Local Network Security Scenario 2 270

Summary 272

Chapter 12 Networking Basics 273

Understanding the Basics of Networking 273

Campus Area Networks or Corporate Area Networks (CANs) 274

Metropolitan Area Networks (MANs) 274

Wireless Local Area Networks (WLANs) 274

Storage Area Networks (SANs) 274

The OSI Networking Model 275

Layer 1: Physical 276

Layer 2: Data Link 276

Layer 3: Network 276

Layer 4: Transport 276

Layer 5: Session 276

Layer 6: Presentation 277

Layer 7: Application 277

Data Transmission Packets 277

OSI Layer Security 278

Network Topologies 280

Bus Topology 280

Ring Topology 280

Star Topology 281

Mesh Topology 282

Logical Topologies 282

Hands-On Exercises 283

Objectives 283

Resources 283

Discussion 283

Procedure 284

Lab Questions 295

Lab Answers 295

Chapter 13 Understanding Networking Protocols 297

The Basics of Networking Protocols 297

MAC Addresses 298

TCP/IP 299

Ethernet 309

Network Control Strategies 311

Hands-On Exercises 313

Objectives 313

Discussion 313

Procedures 314

Lab Questions 325

Lab Answers 326

Chapter 14 Understanding Network Servers 327

The Basics of Network Servers 327

Server Security 330

Network Administrators 331

Server Software Security 335

User Accounts 341

Network Authentication Options 347

Establishing Resource Controls 348

Maintaining Server Security 352

Vulnerability Scanning 358

Hands-On Exercises 361

Objectives 361

Resources 361

Discussion 362

Procedures 362

Lab Questions 382

Lab Answers 382

Chapter 15 Understanding Network Connectivity Devices 385

Network Switches 386

Routers 388

Gateways 390

Network Bridges 391

Wireless Network Connectivity 392

Network Connectivity Device Vulnerabilities 392

Network Connectivity Device Attacks 393

Network Connectivity Defense 397

Network Hardening 398

Hands-On Exercises 399

Objectives 399

Resources 399

Procedures 399

Lab Questions 404

Lab Answers 404

Chapter 16 Understanding Network Transmission Media Security 407

The Basics of Network Transmission Media 407

Copper Wire 408

Light Waves 410

Wireless Signals 412

Transmission Media Vulnerabilities 415

Securing Wireless Networks 415

Hands-On Exercises 417

Objectives 417

Resources 417

Procedure 417

Lab Questions 421

Lab Answers 421

Chapter 17 Local Network Security: Review Questions 423

Summary Points 423

Security Challenge Scenarios 432

Local Network Security Scenario 1 432

Local Network Security Scenario 2 432

Professional Feedback 432

Review Questions 443

PART IV SECURING THE PERIMETER 449

Chapter 18 Perimeter Security in the Real World 451

Security Challenges 451

Internet Security Scenario 1 451

Internet Security Scenario 2 454

Summary 455

Chapter 19 Understanding the Environment 457

The Basics of Internet Security 457

Understanding the Environment 460

Basic Internet Concepts 461

Internet Services 468

Standards and RFCs 470

Hands-On Exercises 471

Objectives 471

Resources 472

Discussion 472

Procedures 472

Lab Questions 486

Lab Answers 486

Chapter 20 Hiding the Private Network 487

Understanding Private Networks 487

Network Address Translation 488

Port Address Translation 489

Port Forwarding or Mapping 490

Network Segmentation 492

Software-Defined Networking 494

Hands-On Exercises 496

Objectives 496

Resources 496

Discussion 496

Procedure 497

Lab Questions 508

Lab Answers 509

Chapter 21 Protecting the Perimeter 511

Understanding the Perimeter 511

Firewalls 515

Firewall Considerations 517

Network Appliances 519

Proxy Servers 520

Demilitarized Zones (DMZs) 522

Single-Firewall DMZs 523

Dual-Firewall DMZs 524

Honeypots 525

Extranets 526

Hands-On Exercises 528

Objectives 528

Resources 528

Procedures 528

Lab Questions 534

Lab Answers 534

Chapter 22 Protecting Data Moving Through the Internet 535

Securing Data in Motion 535

Authentication 536

Encryption 542

Cryptography 543

Digital Certificates 545

Hash Tables 548

Cookies 548

CAPTCHAs 549

Virtual Private Networks 550

Hands-On Exercises 552

Objectives 552

Resources 552

Discussion 552

Procedures 552

Lab Questions 563

Lab Answers 563

Chapter 23 Tools and Utilities 565

Using Basic Tools 565

IFconfig/IPconfig 565

Whois 566

Nslookup 567

PING 567

Traceroute 568

Telnet 569

Secure Shell 570

Monitoring Tools and Software 570

Nagios 572

SolarWinds 572

Microsoft Network Monitor 572

Wireshark 572

Snort 573

Nmap 575

Nikto 575

OpenVAS 575

Metasploit 575

The Browser Exploitation Framework (BeEF) 576

Other Products 576

Hands-On Exercises 578

Objectives 578

Resources 578

Discussion 578

Procedures 579

Capturing a PING 583

Lab Questions 589

Lab Answers 589

Chapter 24 Identifying and Defending Against Vulnerabilities 591

Zero Day Vulnerabilities 591

Software Exploits 592

SQL Injection 594

Java 597

Other Software Exploits 599

Social Engineering Exploits 600

Phishing Attacks 600

Network Threats and Attacks 603

Broadcast Storms 603

Session-Hijacking Attacks 604

Dictionary Attacks 606

Denial of Service (DoS) Attacks 606

Tarpitting 611

Spam 612

Protecting Against Spam Exploits 613

Other Exploits 614

Transport Layer Security (TLS) Exploits 614

FREAK Exploits 615

Logjam Exploits 615

Hands-On Exercises 616

Objectives 616

Resources 616

Discussion 616

Procedures 616

Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627

Summary Points 627

Security Scenario Review 637

Network Security Scenario 1 637

Network Security Scenario 2 637

Professional Feedback 637

Review Questions 644

Exam Questions 647

Appendix A 651

Appendix B 703

Appendix C 715

Index 727

"Cybersecurity Essentials" provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certificates. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authors summarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts. -- From publisher's description.

ABOUT THE AUTHOR
CHARLES J. BROOKS is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company.

CHRISTOPHER GROW is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience.

PHILIP CRAIG is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas.

DONALD SHORT is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick.

There are no comments for this item.

to post a comment.