Introduction |
|
xv | |
Assessment Test |
|
xxix | |
|
General Security Concepts |
|
|
1 | (50) |
|
Understanding Information Security |
|
|
4 | (9) |
|
Securing the Physical Environment |
|
|
5 | (2) |
|
Examining Operational Security |
|
|
7 | (2) |
|
Working with Management and Policies |
|
|
9 | (4) |
|
Understanding the Goals of Information Security |
|
|
13 | (1) |
|
Comprehending the Security Process |
|
|
14 | (10) |
|
Appreciating Antivirus Software |
|
|
14 | (1) |
|
Implementing Access Control |
|
|
14 | (2) |
|
Understanding Authentication |
|
|
16 | (6) |
|
Understanding Networking Services and Protocols |
|
|
22 | (2) |
|
Distinguishing Between Security Topologies |
|
|
24 | (15) |
|
|
25 | (2) |
|
|
27 | (4) |
|
Working with Newer Technologies |
|
|
31 | (3) |
|
Business Concerns to Be Aware Of |
|
|
34 | (5) |
|
|
39 | (1) |
|
|
40 | (3) |
|
|
43 | (1) |
|
Lab 1.1: Update a Linux System |
|
|
43 | (1) |
|
Lab 1.2: Update a Windows-Based System |
|
|
43 | (1) |
|
|
44 | (4) |
|
Answers to Review Questions |
|
|
48 | (3) |
|
Identifying Potential Risks |
|
|
51 | (52) |
|
Calculating Attack Strategies |
|
|
52 | (5) |
|
|
53 | (2) |
|
Recognizing Modification and Repudiation Attacks |
|
|
55 | (1) |
|
Identifying Denial-of-Service (DoS) and Distributed DoS (DDoS) Attacks |
|
|
55 | (2) |
|
Recognizing Common Attacks |
|
|
57 | (4) |
|
|
57 | (1) |
|
|
58 | (1) |
|
Man-in-the-Middle Attacks |
|
|
59 | (1) |
|
|
60 | (1) |
|
Password-Guessing Attacks |
|
|
61 | (1) |
|
Identifying TCP/IP Security Concerns |
|
|
61 | (15) |
|
Working with the TCP/IP Protocol Suite |
|
|
63 | (3) |
|
|
66 | (1) |
|
Working with Protocols and Services |
|
|
67 | (3) |
|
Recognizing TCP/IP Attacks |
|
|
70 | (6) |
|
Understanding Software Exploitation |
|
|
76 | (2) |
|
|
78 | (10) |
|
|
78 | (7) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
Understanding Social Engineering |
|
|
88 | (2) |
|
An Introduction to Auditing Processes and Files |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (3) |
|
|
95 | (2) |
|
Lab 2.1: Identify Running Processes on a Windows-Based Machine |
|
|
95 | (1) |
|
Lab 2.2: Identify Running Processes on a Linux-Based Machine |
|
|
95 | (2) |
|
|
97 | (4) |
|
Answers to Review Questions |
|
|
101 | (2) |
|
Infrastructure and Connectivity |
|
|
103 | (62) |
|
Understanding Infrastructure Security |
|
|
105 | (4) |
|
Working with Hardware Components |
|
|
106 | (2) |
|
Working with Software Components |
|
|
108 | (1) |
|
Understanding the Different Network Infrastructure Devices |
|
|
109 | (14) |
|
|
109 | (5) |
|
|
114 | (1) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (2) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
Monitoring and Diagnosing Networks |
|
|
123 | (2) |
|
|
123 | (2) |
|
Securing Workstations and Servers |
|
|
125 | (2) |
|
Understanding Mobile Devices |
|
|
127 | (1) |
|
Understanding Remote Access |
|
|
128 | (4) |
|
Using the Point-to-Point Protocol |
|
|
128 | (1) |
|
|
129 | (1) |
|
802.1x Wireless Protocols |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Securing Internet Connections |
|
|
132 | (9) |
|
Working with Ports and Sockets |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (5) |
|
Working with the File Transfer Protocol |
|
|
139 | (2) |
|
Understanding SNMP and Other TCP/IP Protocols |
|
|
141 | (1) |
|
The Basics of Cabling, Wires, and Communications |
|
|
142 | (9) |
|
|
142 | (4) |
|
Unshielded Twisted Pair and Shielded Twisted Pair |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (2) |
|
Employing Removable Media |
|
|
151 | (3) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (1) |
|
Lab 3.1: Examine the Windows Routing Table |
|
|
157 | (1) |
|
Lab 3.2: Examine the Linux Routing Table |
|
|
157 | (1) |
|
|
158 | (4) |
|
Answers to Review Questions |
|
|
162 | (3) |
|
Monitoring Activity and Intrusion Detection |
|
|
165 | (46) |
|
|
167 | (7) |
|
Recognizing the Different Types of Network Traffic |
|
|
168 | (5) |
|
Monitoring Network Systems |
|
|
173 | (1) |
|
Understanding Intrusion Detection Systems |
|
|
174 | (17) |
|
Working with a Network-Based IDS |
|
|
178 | (5) |
|
Working with a Host-Based IDS |
|
|
183 | (1) |
|
|
184 | (2) |
|
Understanding Incident Response |
|
|
186 | (5) |
|
Working with Wireless Systems |
|
|
191 | (3) |
|
Wireless Transport Layer Security |
|
|
191 | (1) |
|
IEEE 802.11x Wireless Protocols |
|
|
192 | (1) |
|
|
192 | (1) |
|
Wireless Vulnerabilities to Know |
|
|
193 | (1) |
|
Understanding Instant Messaging's Features |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
Working with 8.3 File Naming |
|
|
195 | (1) |
|
Understanding Packet Sniffing |
|
|
196 | (1) |
|
Understanding Signal Analysis and Intelligence |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
|
|
201 | (3) |
|
Lab 4.1: View the Active TCP and UDP Ports |
|
|
201 | (1) |
|
Lab 4.2: Run Windows Network Monitor |
|
|
201 | (1) |
|
Lab 4.3: Install snort in Linux |
|
|
202 | (1) |
|
Lab 4.4: Make File Extensions Visible in Windows XP |
|
|
202 | (1) |
|
Lab 4.5: Monitor Network Traffic in Linux |
|
|
202 | (2) |
|
|
204 | (4) |
|
Answers to Review Questions |
|
|
208 | (3) |
|
Implementing and Maintaining a Secure Network |
|
|
211 | (42) |
|
Overview of Network Security Threats |
|
|
213 | (2) |
|
Defining Security Baselines |
|
|
215 | (2) |
|
|
217 | (12) |
|
Configuring Network Protocols |
|
|
218 | (2) |
|
Hardening Microsoft Windows 2000 |
|
|
220 | (2) |
|
Hardening Microsoft Windows XP |
|
|
222 | (1) |
|
Hardening Windows Server 2003 |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
Hardening Apple Macintosh |
|
|
225 | (1) |
|
|
225 | (3) |
|
Updating Your Operating System |
|
|
228 | (1) |
|
Hardening Network Devices |
|
|
229 | (2) |
|
|
230 | (1) |
|
Configuring Routers and Firewalls |
|
|
230 | (1) |
|
|
231 | (10) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Hardening File and Print Servers and Services |
|
|
236 | (1) |
|
|
237 | (1) |
|
Working with Data Repositories |
|
|
238 | (3) |
|
|
241 | (2) |
|
|
243 | (1) |
|
|
244 | (2) |
|
Lab 5.1: Install OpenLDAP on a SuSE Server |
|
|
244 | (1) |
|
Lab 5.2: Work with Performance Monitor and Windows |
|
|
244 | (1) |
|
Lab 5.3: Work with Unix/Linux Networking |
|
|
245 | (1) |
|
Lab 5.4: Install and Configure the E-mail Service on a SuSE Server |
|
|
245 | (1) |
|
|
246 | (4) |
|
Answers to Review Questions |
|
|
250 | (3) |
|
Securing the Network and Environment |
|
|
253 | (48) |
|
Understanding Physical and Network Security |
|
|
254 | (17) |
|
Implementing Access Control |
|
|
254 | (7) |
|
Understanding Social Engineering |
|
|
261 | (3) |
|
|
264 | (7) |
|
Understanding Business Continuity Planning |
|
|
271 | (4) |
|
Undertaking Business Impact Analysis |
|
|
272 | (1) |
|
|
273 | (2) |
|
Developing Policies, Standards, and Guidelines |
|
|
275 | (4) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
Working with Security Standards and ISO 17799 |
|
|
279 | (1) |
|
|
280 | (9) |
|
|
281 | (1) |
|
|
282 | (2) |
|
Roles in the Security Process |
|
|
284 | (1) |
|
Information Access Controls |
|
|
285 | (4) |
|
|
289 | (2) |
|
|
291 | (2) |
|
|
293 | (1) |
|
Lab 6.1: Test Social Engineering |
|
|
293 | (1) |
|
|
294 | (4) |
|
Answers to Review Questions |
|
|
298 | (3) |
|
Cryptography Basics, Methods, and Standards |
|
|
301 | (68) |
|
An Overview of Cryptography |
|
|
303 | (7) |
|
Understanding Physical Cryptography |
|
|
304 | (2) |
|
Understanding Mathematical Cryptography |
|
|
306 | (2) |
|
Understanding Quantum Cryptography |
|
|
308 | (1) |
|
Uncovering the Myth of Unbreakable Codes |
|
|
309 | (1) |
|
Understanding Cryptographic Algorithms |
|
|
310 | (5) |
|
|
310 | (2) |
|
Working with Symmetric Algorithms |
|
|
312 | (1) |
|
Working with Asymmetric Algorithms |
|
|
313 | (2) |
|
Using Cryptographic Systems |
|
|
315 | (5) |
|
|
315 | (1) |
|
|
315 | (3) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
Using Public Key Infrastructure |
|
|
320 | (10) |
|
Using a Certificate Authority |
|
|
321 | (1) |
|
Working with Registration Authorities and Local Registration Authorities |
|
|
322 | (2) |
|
Implementing Certificates |
|
|
324 | (1) |
|
Understanding Certificate Revocation |
|
|
325 | (1) |
|
Implementing Trust Models |
|
|
326 | (4) |
|
Preparing for Cryptographic Attacks |
|
|
330 | (2) |
|
Understanding Cryptography Standards and Protocols |
|
|
332 | (14) |
|
The Origins of Encryption Standards |
|
|
332 | (4) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (3) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
Understanding Key Management and the Key Life Cycle |
|
|
346 | (10) |
|
Comparing Centralized and Decentralized Key Generation |
|
|
346 | (2) |
|
Storing and Distributing Keys |
|
|
348 | (2) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
Recovering and Archiving Keys |
|
|
352 | (2) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (2) |
|
|
358 | (3) |
|
|
361 | (2) |
|
Lab 7.1: Hash Rules in Windows Server 2003 |
|
|
361 | (1) |
|
Lab 7.2: SSL Settings in Windows Server 2003 |
|
|
361 | (1) |
|
Lab 7.3: Encrypting a File System in Linux |
|
|
362 | (1) |
|
Lab 7.4: Look for Errors in IPSec Performance Statistics |
|
|
362 | (1) |
|
|
363 | (4) |
|
Answers to Review Questions |
|
|
367 | (2) |
|
Security Policies and Procedures |
|
|
369 | (50) |
|
Understanding Business Continuity |
|
|
371 | (19) |
|
|
371 | (1) |
|
|
372 | (6) |
|
|
378 | (12) |
|
Reinforcing Vendor Support |
|
|
390 | (3) |
|
Service-Level Agreements (SLAs) |
|
|
390 | (2) |
|
|
392 | (1) |
|
Generating Policies and Procedures |
|
|
393 | (8) |
|
|
393 | (4) |
|
|
397 | (1) |
|
|
398 | (2) |
|
Incident-Response Policies |
|
|
400 | (1) |
|
Enforcing Privilege Management |
|
|
401 | (7) |
|
User and Group Role Management |
|
|
401 | (2) |
|
|
403 | (1) |
|
|
403 | (1) |
|
Privilege Decision Making |
|
|
404 | (1) |
|
|
405 | (2) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
409 | (2) |
|
|
411 | (2) |
|
Lab 8.1: Use Automated System Recovery in Windows Server 2003 |
|
|
411 | (1) |
|
Lab 8.2: Create a Rescue Disk in Linux |
|
|
411 | (1) |
|
Lab 8.3: Create a Backup with SuSE Linux |
|
|
411 | (2) |
|
|
413 | (4) |
|
Answers to Review Questions |
|
|
417 | (2) |
|
|
419 | (36) |
|
Understanding Computer Forensics |
|
|
420 | (6) |
|
Methodology of a Forensic Investigation |
|
|
421 | (2) |
|
Enforcing the Chain of Custody |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Understanding Security Management |
|
|
426 | (7) |
|
Drafting Best Practices and Documentation |
|
|
426 | (7) |
|
Understanding Security Awareness and Education |
|
|
433 | (3) |
|
Using Communication and Awareness |
|
|
433 | (1) |
|
|
433 | (3) |
|
Staying on Top of Security |
|
|
436 | (4) |
|
|
437 | (1) |
|
|
438 | (2) |
|
Regulating Privacy and Security |
|
|
440 | (4) |
|
Health Insurance Portability and Accountability Act |
|
|
440 | (1) |
|
Gramm-Leach-Bliley Act of 1999 |
|
|
440 | (1) |
|
Computer Fraud and Abuse Act |
|
|
441 | (1) |
|
Family Educational Rights and Privacy Act |
|
|
441 | (1) |
|
Computer Security Act of 1987 |
|
|
442 | (1) |
|
Cyberspace Electronic Security Act |
|
|
442 | (1) |
|
Cyber Security Enhancement Act |
|
|
442 | (1) |
|
|
442 | (1) |
|
Familiarizing Yourself with International Efforts |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
445 | (2) |
|
|
447 | (1) |
|
Lab 9.1: Configure Windows Automatic Updates |
|
|
447 | (1) |
|
Lab 9.2: Configure Linux Automatic Updates |
|
|
447 | (1) |
|
|
448 | (4) |
|
Answers to Review Questions |
|
|
452 | (3) |
Glossary |
|
455 | (40) |
Index |
|
495 | |