Computer Security Fundamentals, 4th Edition

Book description

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today’s latest attacks and countermeasures

The perfect beginner’s guide for anyone interested in a computer security career

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.

LEARN HOW TO

  • Identify and prioritize potential threats to your network

  • Use basic networking knowledge to improve security

  • Get inside the minds of hackers, so you can deter their attacks

  • Implement a proven layered approach to network security

  • Resist modern social engineering attacks

  • Defend against today’s most common Denial of Service (DoS) attacks

  • Halt viruses, spyware, worms, Trojans, and other malware

  • Prevent problems arising from malfeasance or ignorance

  • Choose the best encryption methods for your organization

  • Compare security technologies, including the latest security appliances

  • Implement security policies that will work in your environment

  • Scan your network for vulnerabilities

  • Evaluate potential security consultants

  • Master basic computer forensics and know what to do if you’re attacked

  • Learn how cyberterrorism and information warfare are evolving

Table of contents

  1. Cover Page
  2. About This eBook
  3. Title Page
  4. Copyright Page
  5. Credits
  6. Contents at a Glance
  7. Table of Contents
  8. About the Author
  9. About the Technical Reviewer
  10. Dedication
  11. Acknowledgments
  12. We Want to Hear from You!
  13. Reader Services
  14. Introduction
  15. Chapter 1. Introduction to Computer Security
    1. Introduction
    2. How Seriously Should You Take Threats to Network Security?
    3. Identifying Types of Threats
    4. Assessing the Likelihood of an Attack on Your Network
    5. Basic Security Terminology
    6. Concepts and Approaches
    7. How Do Legal Issues Impact Network Security?
    8. Online Security Resources
    9. Summary
    10. Test Your Skills
  16. Chapter 2. Networks and the Internet
    1. Introduction
    2. Network Basics
    3. How the Internet Works
    4. History of the Internet
    5. Basic Network Utilities
    6. Other Network Devices
    7. Advanced Network Communications Topics
    8. Summary
    9. Test Your Skills
  17. Chapter 3. Cyber Stalking, Fraud, and Abuse
    1. Introduction
    2. How Internet Fraud Works
    3. Identity Theft
    4. Cyber Stalking
    5. Protecting Yourself Against Cybercrime
    6. Summary
    7. Test Your Skills
  18. Chapter 4. Denial of Service Attacks
    1. Introduction
    2. DoS Attacks
    3. Illustrating an Attack
    4. Common Tools Used for DoS Attacks
    5. DoS Weaknesses
    6. Specific DoS Attacks
    7. Real-World Examples of DoS Attacks
    8. How to Defend Against DoS Attacks
    9. Summary
    10. Test Your Skills
  19. Chapter 5. Malware
    1. Introduction
    2. Viruses
    3. Trojan Horses
    4. The Buffer-Overflow Attack
    5. Spyware
    6. Other Forms of Malware
    7. Detecting and Eliminating Viruses and Spyware
    8. Summary
    9. Test Your Skills
  20. Chapter 6. Techniques Used by Hackers
    1. Introduction
    2. Basic Terminology
    3. The Reconnaissance Phase
    4. Actual Attacks
    5. Malware Creation
    6. Penetration Testing
    7. The Dark Web
    8. Summary
    9. Test Your Skills
  21. Chapter 7. Industrial Espionage in Cyberspace
    1. Introduction
    2. What Is Industrial Espionage?
    3. Information as an Asset
    4. Real-World Examples of Industrial Espionage
    5. How Does Espionage Occur?
    6. Protecting Against Industrial Espionage
    7. The Industrial Espionage Act
    8. Spear Phishing
    9. Summary
    10. Test Your Skills
  22. Chapter 8. Encryption
    1. Introduction
    2. Cryptography Basics
    3. History of Encryption
    4. Modern Cryptography Methods
    5. Public Key (Asymmetric) Encryption
    6. PGP
    7. Legitimate Versus Fraudulent Encryption Methods
    8. Digital Signatures
    9. Hashing
    10. MAC and HMAC
    11. Steganography
    12. Cryptanalysis
    13. Cryptography Used on the Internet
    14. Quantum Computing Cryptography
    15. Summary
    16. Test Your Skills
  23. Chapter 9. Computer Security Technology
    1. Introduction
    2. Virus Scanners
    3. Firewalls
    4. Antispyware
    5. IDSs
    6. Digital Certificates
    7. SSL/TLS
    8. Virtual Private Networks
    9. Wi-Fi Security
    10. Summary
    11. Test Your Skills
  24. Chapter 10. Security Policies
    1. Introduction
    2. What Is a Policy?
    3. Defining User Policies
    4. Defining System Administration Policies
    5. Defining Access Control
    6. Development Policies
    7. Standards, Guidelines, and Procedures
    8. Disaster Recovery
    9. Important Laws
    10. Summary
    11. Test Your Skills
  25. Chapter 11. Network Scanning and Vulnerability Scanning
    1. Introduction
    2. Basics of Assessing a System
    3. Securing Computer Systems
    4. Scanning Your Network
    5. Getting Professional Help
    6. Summary
    7. Test Your Skills
  26. Chapter 12. Cyber Terrorism and Information Warfare
    1. Introduction
    2. Actual Cases of Cyber Terrorism
    3. Weapons of Cyber Warfare
    4. Economic Attacks
    5. Military Operations Attacks
    6. General Attacks
    7. Supervisory Control and Data Acquisitions (SCADA)
    8. Information Warfare
    9. Actual Cases
    10. Future Trends
    11. Defense Against Cyber Terrorism
    12. Terrorist Recruiting and Communication
    13. TOR and the Dark Web
    14. Summary
    15. Test Your Skills
  27. Chapter 13. Cyber Detective
    1. Introduction
    2. General Searches
    3. Court Records and Criminal Checks
    4. Usenet
    5. Summary
    6. Test Your Skills
  28. Chapter 14. Introduction to Forensics
    1. Introduction
    2. General Guidelines
    3. Finding Evidence on the PC
    4. Finding Evidence in System Logs
    5. Getting Back Deleted Files
    6. Operating System Utilities
    7. The Windows Registry
    8. Mobile Forensics: Cell Phone Concepts
    9. The Need for Forensic Certification
    10. Expert Witnesses
    11. Additional Types of Forensics
    12. Summary
    13. Test Your Skills
  29. Chapter 15. Cybersecurity Engineering
    1. Introduction
    2. Defining Cybersecurity Engineering
    3. SecML
    4. Summary
    5. Test Your Skills
  30. Glossary
  31. Appendix A. Resources
    1. General Computer Crime and Cyber Terrorism
    2. General Knowledge
    3. Cyber Stalking
    4. Identity Theft
    5. Port Scanners and Sniffers
    6. Password Crackers
    7. Countermeasures
    8. Cyber Investigation Tools
    9. General Tools
    10. Virus Research
  32. Appendix B. Answers to the Multiple Choice Questions
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11
    12. Chapter 12
    13. Chapter 13
    14. Chapter 14
    15. Chapter 15
  33. Index
  34. Code Snippets

Product information

  • Title: Computer Security Fundamentals, 4th Edition
  • Author(s): Chuck Easttom
  • Release date: October 2019
  • Publisher(s): Pearson IT Certification
  • ISBN: 9780135774854