Security+ Guide to Network Security Fundamentals
by Ciampa, MarkBuy Used
Rent Textbook
New Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| Introduction to Security | |
| Challenges of Securing Information | |
| Today+s security attacks | |
| Difficulties in defending against attacks | |
| What Is Information Security? | |
| Defining information security | |
| Information security terminology | |
| Understanding the importance of information security | |
| Preventing data theft | |
| Thwarting Identity Theft | |
| Avoiding legal consequences | |
| Maintaining Productivity | |
| Foiling Cyberterrorism | |
| Who Are the Attackers? | |
| Hackers | |
| Script Kiddies | |
| Spies | |
| Employees | |
| Cybercriminals | |
| Cyberterrorists | |
| Attacks and Defenses | |
| Steps of an attack | |
| Defenses against attacks | |
| Layering | |
| Limiting | |
| Diversity | |
| Obscurity | |
| Simplicity | |
| Surveying Information Security Careers and the CompTIA Security+ Certification | |
| System Threats and Risks | |
| Software-Based Attacks {1.1) | |
| Infecting Malware | |
| Viruses (1.1) | |
| Worms (1.1) | |
| Concealing Malware | |
| Trojan Horses (1.1) | |
| Rootkits (1.1) | |
| Logic Bombs (1.1) | |
| Privilege escalation (1.1) | |
| Profiting Malware | |
| Spam (1.1) | |
| Spyware (1.1) | |
| Adware (1.1) | |
| Keyloggers | |
| Botnets (1.1) | |
| Hardware Attacks {1.2} | |
| BIOS (1.2) | |
| USB devices (1.2) | |
| Removable storage (1.2) | |
| Network attached storage (1.2) | |
| Cell phones (1.2) | |
| Attacks on Virtualized Systems (1.6) | |
| What is virtualization? | |
| Attacks on virtual systems | |
| Protecting Systems | |
| Hardening the Operating System {1.3} | |
| Managing operating system updates | |
| Hot fixes (1.3) | |
| Service packs (1.3) | |
| Patches (1.3) | |
| Patch management techniques (1.3) | |
| Protecting the operating system through procedures | |
| Group policies (1.3) | |
| Security templates (1.3) | |
| Configuration baselines (1.3) | |
| Managing Application Security | |
| Protecting the web browser (1.4) | |
| ActiveX (1.4) | |
| Java (1.4) | |
| Scripting (1.4) | |
| Cookies (1.4) | |
| Input validation (1.4) | |
| Cross-site scripting (1.4) | |
| Protecting communication applications | |
| Buffer overflows (1.4) | |
| SMTP open relays (1.4) | |
| Instant messaging (1.4) | |
| P2P (1.4) | |
| Applying System Security Applications | |
| Host Intrusion Detection Systems (HIDS) (1.5) | |
| Personal software firewalls (1.5) | |
| Antivirus (1.5) iv. Anti-Spam (1.5) v. Popup blockers (1.5) NETWORK SECURITY | |
| Network Vulnerabilities and Attacks | |
| Liabilities in Networks | |
| Media Liabilities | |
| Vampire taps (2.6) | |
| Cable placement | |
| Wireless Network Liabilities | |
| Data emanation (2.7) | |
| SSID broadcast (2.7) | |
| Weak encryption (2.7) | |
| Attacks on Networks | |
| Protocol-based attacks {2.1} | |
| Antiquated protocols (2.1) | |
| DNS poisoning (2.1) | |
| ARP Poisoning (2.1) | |
| Impersonation attacks | |
| TCP/IP hijacking (2.1) | |
| Spoofing (2.1) | |
| Man in the middle (2.1) | |
| Replay (2.1) | |
| Wireless attacks | |
| War driving (2.7) | |
| Blue jacking (2.7) | |
| Blue snarfing (2.7) | |
| Rogue access points (2.7) iv. Other attacks {2.1} | |
| Null sessions (2.1) | |
| DOS (2.1) | |
| DDOS (2.1) | |
| Kiting (2.1) | |
| Network Defenses | |
| Creating a Secure Network | |
| Security through network technologies | |
| Network Address Translation (NAT) (2.2) | |
| Network Access Control (NAC) (2.2) | |
| Security through network design | |
| Demilitarized zones (DMZ) (2.2) | |
| Virtual LAN (VLAN) (2.2) | |
| Virtual private network | |
| Subnetting (2.2) | |
| Network interconnections (2.2) | |
| Convergence [? CompTIA has +Telephony+] (2.2) | |
| Network Device Vulnerabilities {2.5} | |
| Privilege escalation (2.5) | |
| Weak passwords (2.5) | |
| Back doors (2.5) | |
| Def | |
| Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.