| Introduction |
|
xiii | |
|
Information Security Fundamentals |
|
|
1 | (28) |
|
Identifying the Challenges for Information Security |
|
|
2 | (3) |
|
Defining Information Security |
|
|
5 | (1) |
|
Understanding the Importance of Information Security |
|
|
6 | (5) |
|
|
|
6 | (2) |
|
Avoiding Legal Consequences |
|
|
8 | (1) |
|
|
|
9 | (1) |
|
|
|
10 | (1) |
|
|
|
11 | (1) |
|
Understanding Information Security Terminology |
|
|
11 | (2) |
|
Exploring the CompTIA Security+ Certification Exam |
|
|
13 | (1) |
|
Surveying Information Security Careers |
|
|
14 | (1) |
|
|
|
15 | (1) |
|
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
18 | (9) |
|
|
|
27 | (2) |
|
Attackers and Their Attacks |
|
|
29 | (40) |
|
Developing Attacker Profiles |
|
|
30 | (4) |
|
|
|
30 | (1) |
|
|
|
31 | (1) |
|
|
|
32 | (1) |
|
|
|
32 | (1) |
|
|
|
33 | (1) |
|
|
|
33 | (1) |
|
Understanding Basic Attacks |
|
|
34 | (8) |
|
|
|
35 | (1) |
|
|
|
36 | (4) |
|
|
|
40 | (1) |
|
|
|
41 | (1) |
|
|
|
41 | (1) |
|
Examining Identity Attacks |
|
|
42 | (4) |
|
Man-in-the-Middle Attacks |
|
|
42 | (1) |
|
|
|
43 | (1) |
|
|
|
44 | (2) |
|
Identifying Denial of Service Attacks |
|
|
46 | (2) |
|
Understanding Malicious Code (Malware) |
|
|
48 | (4) |
|
|
|
48 | (1) |
|
|
|
49 | (1) |
|
|
|
50 | (1) |
|
|
|
51 | (1) |
|
|
|
52 | (1) |
|
|
|
52 | (2) |
|
|
|
54 | (2) |
|
|
|
56 | (1) |
|
|
|
57 | (10) |
|
|
|
67 | (2) |
|
|
|
69 | (34) |
|
Identifying Who Is Responsible for Information Security |
|
|
70 | (2) |
|
Understanding Security Principles |
|
|
72 | (6) |
|
|
|
73 | (1) |
|
|
|
74 | (2) |
|
|
|
76 | (1) |
|
|
|
76 | (1) |
|
|
|
77 | (1) |
|
Using Effective Authentication Methods |
|
|
78 | (7) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
|
|
80 | (1) |
|
|
|
81 | (1) |
|
|
|
82 | (1) |
|
Challenge Handshake Authentication Protocol |
|
|
83 | (1) |
|
|
|
83 | (1) |
|
Multifactor Authentication |
|
|
84 | (1) |
|
Controlling Access to Computer Systems |
|
|
85 | (4) |
|
|
|
87 | (1) |
|
Role Based Access Control |
|
|
87 | (1) |
|
Discretionary Access Control |
|
|
88 | (1) |
|
Auditing Information Security Schemes |
|
|
89 | (1) |
|
|
|
90 | (1) |
|
|
|
91 | (1) |
|
|
|
92 | (1) |
|
|
|
93 | (8) |
|
|
|
101 | (2) |
|
|
|
103 | (36) |
|
Disabling Nonessential Systems |
|
|
104 | (5) |
|
Hardening Operating Systems |
|
|
109 | (5) |
|
|
|
109 | (3) |
|
|
|
112 | (2) |
|
|
|
114 | (7) |
|
|
|
115 | (5) |
|
Hardening Data Repositories |
|
|
120 | (1) |
|
|
|
121 | (3) |
|
|
|
121 | (1) |
|
|
|
122 | (2) |
|
|
|
124 | (1) |
|
|
|
125 | (2) |
|
|
|
127 | (1) |
|
|
|
128 | (8) |
|
|
|
136 | (3) |
|
Securing the Network Infrastructure |
|
|
139 | (50) |
|
Working with the Network Cable Plant |
|
|
140 | (7) |
|
|
|
140 | (2) |
|
|
|
142 | (2) |
|
|
|
144 | (2) |
|
|
|
146 | (1) |
|
|
|
147 | (4) |
|
|
|
148 | (1) |
|
|
|
148 | (1) |
|
|
|
149 | (2) |
|
Keeping Removable Media Secure |
|
|
151 | (1) |
|
Hardening Network Devices |
|
|
151 | (14) |
|
Hardening Standard Network Devices |
|
|
152 | (3) |
|
Hardening Communication Devices |
|
|
155 | (4) |
|
Hardening Network Security Devices |
|
|
159 | (6) |
|
Designing Network Topologies |
|
|
165 | (7) |
|
|
|
165 | (2) |
|
Network Address Translation (NAT) |
|
|
167 | (2) |
|
|
|
169 | (1) |
|
|
|
170 | (2) |
|
|
|
172 | (1) |
|
|
|
173 | (3) |
|
|
|
176 | (2) |
|
|
|
178 | (8) |
|
|
|
186 | (3) |
|
|
|
189 | (36) |
|
Protecting E-mail Systems |
|
|
190 | (10) |
|
|
|
190 | (3) |
|
|
|
193 | (4) |
|
|
|
197 | (3) |
|
Examining World Wide Web Vulnerabilities |
|
|
200 | (9) |
|
|
|
201 | (2) |
|
|
|
203 | (1) |
|
|
|
204 | (2) |
|
|
|
206 | (2) |
|
Common Gateway Interface (CGI) |
|
|
208 | (1) |
|
|
|
209 | (1) |
|
Securing Web Communications |
|
|
209 | (3) |
|
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) |
|
|
210 | (1) |
|
Secure Hypertext Transport Protocol (HTTPS) |
|
|
211 | (1) |
|
Securing Instant Messaging |
|
|
212 | (1) |
|
|
|
213 | (1) |
|
|
|
214 | (2) |
|
|
|
216 | (1) |
|
|
|
217 | (6) |
|
|
|
223 | (2) |
|
Protecting Advanced Communications |
|
|
225 | (46) |
|
Hardening File Transfer Protocol (FTP) |
|
|
226 | (4) |
|
|
|
230 | (11) |
|
|
|
230 | (2) |
|
Layer 2 Tunneling Protocol (L2TP) |
|
|
232 | (1) |
|
Authentication Technologies |
|
|
232 | (3) |
|
Secure Transmission Protocols |
|
|
235 | (5) |
|
Virtual Private Networks (VPNs) |
|
|
240 | (1) |
|
Protecting Directory Services |
|
|
241 | (1) |
|
Securing Digital Cellular Telephony |
|
|
242 | (3) |
|
Wireless Application Protocol (WAP) |
|
|
243 | (1) |
|
Wireless Transport Layer Security (WTLS) |
|
|
244 | (1) |
|
Hardening Wireless Local Area Networks (WLAN) |
|
|
245 | (11) |
|
|
|
246 | (2) |
|
|
|
248 | (1) |
|
|
|
249 | (4) |
|
|
|
253 | (3) |
|
|
|
256 | (1) |
|
|
|
257 | (3) |
|
|
|
260 | (2) |
|
|
|
262 | (6) |
|
|
|
268 | (3) |
|
Scrambling through Cryptography |
|
|
271 | (36) |
|
|
|
272 | (3) |
|
|
|
272 | (2) |
|
How Cryptography Protects |
|
|
274 | (1) |
|
Securing with Cryptography Hashing Algorithms |
|
|
275 | (4) |
|
|
|
275 | (2) |
|
|
|
277 | (1) |
|
Secure Hash Algorithm (SHA) |
|
|
278 | (1) |
|
Protecting with Symmetric Encryption Algorithms |
|
|
279 | (7) |
|
Data Encryption Standard (DES) |
|
|
282 | (1) |
|
Triple Data Encryption Standard (3DES) |
|
|
283 | (1) |
|
Advanced Encryption Standard (AES) |
|
|
284 | (1) |
|
|
|
285 | (1) |
|
International Data Encryption Algorithm (IDEA) |
|
|
285 | (1) |
|
|
|
286 | (1) |
|
Hardening with Asymmetric Encryption Algorithms |
|
|
286 | (3) |
|
|
|
288 | (1) |
|
|
|
288 | (1) |
|
Elliptic Curve Cryptography |
|
|
289 | (1) |
|
Understanding How to Use Cryptography |
|
|
289 | (6) |
|
|
|
289 | (1) |
|
|
|
290 | (1) |
|
Implementations of Cryptography |
|
|
291 | (4) |
|
|
|
295 | (1) |
|
|
|
296 | (2) |
|
|
|
298 | (1) |
|
|
|
299 | (6) |
|
|
|
305 | (2) |
|
|
|
307 | (34) |
|
Understanding Cryptography Strengths and Vulnerabilities |
|
|
308 | (7) |
|
Symmetric Cryptography Strengths and Weaknesses |
|
|
309 | (1) |
|
Asymmetric Cryptography Strengths and Vulnerabilities |
|
|
310 | (5) |
|
Understanding Public Key Infrastructure (PKI) |
|
|
315 | (7) |
|
|
|
315 | (2) |
|
|
|
317 | (1) |
|
PKI Standards and Protocols |
|
|
318 | (3) |
|
|
|
321 | (1) |
|
Managing Digital Certificates |
|
|
322 | (5) |
|
|
|
325 | (1) |
|
Certificate Practice Statement (CPS) |
|
|
325 | (1) |
|
|
|
326 | (1) |
|
|
|
327 | (3) |
|
Centralized and Decentralized Management |
|
|
327 | (1) |
|
|
|
327 | (1) |
|
|
|
328 | (1) |
|
|
|
328 | (2) |
|
|
|
330 | (1) |
|
|
|
331 | (1) |
|
|
|
332 | (2) |
|
|
|
334 | (4) |
|
|
|
338 | (3) |
|
|
|
341 | (40) |
|
Hardening Physical Security with Access Controls |
|
|
342 | (7) |
|
Controlling Access with Physical Barriers |
|
|
343 | (5) |
|
Controlling Access with Biometrics |
|
|
348 | (1) |
|
Minimizing Social Engineering |
|
|
349 | (1) |
|
Securing the Physical Environment |
|
|
349 | (8) |
|
Limiting Wireless Signal Range |
|
|
349 | (2) |
|
|
|
351 | (2) |
|
Reducing the Risk of Fires |
|
|
353 | (4) |
|
Understanding Business Continuity |
|
|
357 | (9) |
|
|
|
357 | (1) |
|
Establishing High Availability through Fault Tolerance |
|
|
358 | (5) |
|
Creating and Maintaining Backups |
|
|
363 | (3) |
|
Planning for Disaster Recovery |
|
|
366 | (3) |
|
Creating a Disaster Recovery Plan |
|
|
366 | (2) |
|
Identifying Secure Recovery |
|
|
368 | (1) |
|
|
|
369 | (1) |
|
|
|
369 | (1) |
|
|
|
370 | (2) |
|
|
|
372 | (2) |
|
|
|
374 | (5) |
|
|
|
379 | (2) |
|
|
|
381 | (36) |
|
Understanding the Security Policy Cycle |
|
|
382 | (2) |
|
Reviewing Risk Identification |
|
|
384 | (8) |
|
|
|
385 | (2) |
|
|
|
387 | (2) |
|
|
|
389 | (1) |
|
|
|
390 | (2) |
|
Designing the Security Policy |
|
|
392 | (6) |
|
Security Policy Development |
|
|
392 | (1) |
|
Elements of a Security Policy |
|
|
392 | (6) |
|
Types of Security Policies |
|
|
398 | (6) |
|
Understanding Compliance Monitoring and Evaluation |
|
|
404 | (2) |
|
Incidence Response Policy |
|
|
404 | (2) |
|
|
|
406 | (1) |
|
|
|
406 | (1) |
|
|
|
407 | (1) |
|
|
|
408 | (2) |
|
|
|
410 | (6) |
|
|
|
416 | (1) |
|
|
|
417 | (28) |
|
Understanding Identity Management |
|
|
418 | (3) |
|
Hardening Systems through Privilege Management |
|
|
421 | (5) |
|
|
|
421 | (1) |
|
|
|
422 | (2) |
|
|
|
424 | (2) |
|
Planning for Change Management |
|
|
426 | (4) |
|
Change Management Procedures |
|
|
426 | (2) |
|
Changes That Should Be Documented |
|
|
428 | (2) |
|
|
|
430 | (1) |
|
Understanding Digital Rights Management |
|
|
430 | (3) |
|
|
|
430 | (2) |
|
Enterprise Document Protection |
|
|
432 | (1) |
|
Acquiring Effective Training and Education |
|
|
433 | (3) |
|
|
|
434 | (1) |
|
|
|
435 | (1) |
|
|
|
436 | (1) |
|
|
|
436 | (1) |
|
|
|
437 | (2) |
|
|
|
439 | (4) |
|
|
|
443 | (2) |
|
Advanced Security and Beyond |
|
|
445 | (30) |
|
Understanding Computer Forensics |
|
|
446 | (4) |
|
Forensics Opportunities and Challenges |
|
|
447 | (3) |
|
Responding to a Computer Forensics Incident |
|
|
450 | (7) |
|
|
|
451 | (1) |
|
|
|
451 | (2) |
|
Establishing the Chain of Custody |
|
|
453 | (1) |
|
Examining Data for Evidence |
|
|
453 | (4) |
|
Hardening Security through New Solutions |
|
|
457 | (2) |
|
Exploring Information Security Jobs and Skills |
|
|
459 | (3) |
|
|
|
459 | (1) |
|
|
|
460 | (1) |
|
|
|
460 | (2) |
|
|
|
462 | (1) |
|
|
|
463 | (1) |
|
|
|
464 | (1) |
|
|
|
465 | (9) |
|
|
|
474 | (1) |
|
APPENDIX A CompTIA Security+ Examination Objectives |
|
|
475 | (10) |
|
APPENDIX B Linux and Windows Security |
|
|
485 | (10) |
|
|
|
486 | (3) |
|
Controlling File Permissions and Attributes |
|
|
486 | (1) |
|
|
|
487 | (1) |
|
Disabling Unnecessary Services |
|
|
487 | (1) |
|
|
|
488 | (1) |
|
Controlling User Accounts |
|
|
488 | (1) |
|
|
|
489 | (1) |
|
|
|
489 | (6) |
|
|
|
489 | (3) |
|
Intermediate Windows Security |
|
|
492 | (1) |
|
Advanced Windows Security |
|
|
493 | (2) |
|
APPENDIX C Common TCP/IP Ports and Their Threats |
|
|
495 | (4) |
|
APPENDIX D Sample Acceptable Use Policy |
|
|
499 | (6) |
|
Organization ABC Acceptable Use Policy |
|
|
500 | (1) |
|
|
|
500 | (1) |
|
|
|
500 | (1) |
|
|
|
500 | (1) |
|
|
|
500 | (3) |
|
General Use and Ownership |
|
|
500 | (1) |
|
Security and Proprietary Information |
|
|
501 | (1) |
|
|
|
501 | (2) |
|
|
|
503 | (1) |
|
|
|
503 | (1) |
|
|
|
503 | (2) |
| Glossary |
|
505 | |