Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Computer Security Fundamentals
Taschenbuch von William Easttom (u. a.)
Sprache: Englisch

62,25 €*

-24 % UVP 82,38 €
inkl. MwSt.

Versandkostenfrei per Post / DHL

auf Lager, Lieferzeit 1-2 Werktage

Produkt Anzahl: Gib den gewünschten Wert ein oder benutze die Schaltflächen um die Anzahl zu erhöhen oder zu reduzieren.
Kategorien:
Beschreibung

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today's latest attacks and countermeasures

The perfect beginner's guide for anyone interested in a computer security career

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned.

LEARN HOW TO

  • Identify and prioritize potential threats to your network
  • Use basic networking knowledge to improve security
  • Get inside the minds of hackers, so you can deter their attacks
  • Implement a proven layered approach to network security
  • Resist modern social engineering attacks
  • Defend against today's most common Denial of Service (DoS) attacks
  • Halt viruses, spyware, worms, Trojans, and other malware
  • Prevent problems arising from malfeasance or ignorance
  • Choose the best encryption methods for your organization
  • Compare security technologies, including the latest security appliances
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Master basic computer forensics and know what to do if you're attacked
  • Learn how cyberterrorism and information warfare are evolving

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

Clearly explains core concepts, terminology, challenges, technologies, and skills

Covers today's latest attacks and countermeasures

The perfect beginner's guide for anyone interested in a computer security career

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned.

LEARN HOW TO

  • Identify and prioritize potential threats to your network
  • Use basic networking knowledge to improve security
  • Get inside the minds of hackers, so you can deter their attacks
  • Implement a proven layered approach to network security
  • Resist modern social engineering attacks
  • Defend against today's most common Denial of Service (DoS) attacks
  • Halt viruses, spyware, worms, Trojans, and other malware
  • Prevent problems arising from malfeasance or ignorance
  • Choose the best encryption methods for your organization
  • Compare security technologies, including the latest security appliances
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Master basic computer forensics and know what to do if you're attacked
  • Learn how cyberterrorism and information warfare are evolving
Über den Autor
Chuck Easttom is a computer scientist, author, and inventor. He has authored 25 other books on programming, Web development, security, and Linux. He has also authored dozens of research papers on a wide range of computer science and cyber security topics. He is an inventor with 13 computer science patents. Chuck holds more than 40 different industry certifications. He also is a frequent presenter/speaker at computer and cyber security conferences such as Defcon, ISC2 Security Congress, Secure World, IEEE workshops, and more. You can reach Chuck at his website ([...] or by e-mail at [...]
Inhaltsverzeichnis

Introduction xxix

Chapter 1: Introduction to Computer Security 2

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

How Seriously Should You Take Threats to Network Security?. . . . . . . . . . 4

Identifying Types of Threats.. . . . . . . . . . . . . . . . . . . . . . . . 7

Assessing the Likelihood of an Attack on Your Network.. . . . . . . . . . . . 17

Basic Security Terminology. . . . . . . . . . . . . . . . . . . . . . . . 18

Concepts and Approaches.. . . . . . . . . . . . . . . . . . . . . . . . 21

How Do Legal Issues Impact Network Security?.. . . . . . . . . . . . . . . 24

Online Security Resources.. . . . . . . . . . . . . . . . . . . . . . . . 25

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Chapter 2: Networks and the Internet 34

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Network Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

How the Internet Works. . . . . . . . . . . . . . . . . . . . . . . . . 43

History of the Internet.. . . . . . . . . . . . . . . . . . . . . . . . . . 50

Basic Network Utilities.. . . . . . . . . . . . . . . . . . . . . . . . . 52

Other Network Devices.. . . . . . . . . . . . . . . . . . . . . . . . . 59

Advanced Network Communications Topics.. . . . . . . . . . . . . . . . 60

Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Chapter 3: Cyber Stalking, Fraud, and Abuse 74

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

How Internet Fraud Works.. . . . . . . . . . . . . . . . . . . . . . . . 75

Identity Theft.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Cyber Stalking.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Protecting Yourself Against Cybercrime.. . . . . . . . . . . . . . . . . . 91

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Chapter 4: Denial of Service Attacks 106

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

DoS Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Illustrating an Attack.. . . . . . . . . . . . . . . . . . . . . . . . . . 107

Common Tools Used for DoS Attacks.. . . . . . . . . . . . . . . . . . . 109

DoS Weaknesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Specific DoS Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . 112

Real-World Examples of DoS Attacks.. . . . . . . . . . . . . . . . . . . 120

How to Defend Against DoS Attacks.. . . . . . . . . . . . . . . . . . . 121

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Chapter 5: Malware 130

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Viruses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

Trojan Horses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

The Buffer-Overflow Attack. . . . . . . . . . . . . . . . . . . . . . . 145

Spyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Other Forms of Malware.. . . . . . . . . . . . . . . . . . . . . . . . 149

Detecting and Eliminating Viruses and Spyware. . . . . . . . . . . . . . . 153

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

Chapter 6: Techniques Used by Hackers 166

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

Basic Terminology.. . . . . . . . . . . . . . . . . . . . . . . . . . . 167

The Reconnaissance Phase.. . . . . . . . . . . . . . . . . . . . . . . 167

Actual Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

Malware Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . 184

Penetration Testing.. . . . . . . . . . . . . . . . . . . . . . . . . . 187

The Dark Web. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Chapter 7: Industrial Espionage in Cyberspace 200

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

What Is Industrial Espionage?.. . . . . . . . . . . . . . . . . . . . . . 202

Information as an Asset. . . . . . . . . . . . . . . . . . . . . . . . . 203

Real-World Examples of Industrial Espionage.. . . . . . . . . . . . . . . 205

How Does Espionage Occur?. . . . . . . . . . . . . . . . . . . . . . 207

Protecting Against Industrial Espionage.. . . . . . . . . . . . . . . . . . 212

Trade Secrets.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

The Industrial Espionage Act.. . . . . . . . . . . . . . . . . . . . . . 218

Spear Phishing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220

Chapter 8: Encryption 226

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

Cryptography Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 227

History of Encryption.. . . . . . . . . . . . . . . . . . . . . . . . . . 228

Modern Cryptography Methods.. . . . . . . . . . . . . . . . . . . . . 236

Public Key (Asymmetric) Encryption.. . . . . . . . . . . . . . . . . . . 245

PGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

Legitimate Versus Fraudulent Encryption Methods.. . . . . . . . . . . . . 251

Digital Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . . 252

Hashing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

MAC and HMAC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 254

Steganography. . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

Cryptanalysis.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Cryptography Used on the Internet.. . . . . . . . . . . . . . . . . . . . 259

Quantum Computing Cryptography. . . . . . . . . . . . . . . . . . . . 259

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Chapter 9: Computer Security Technology 268

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

Virus Scanners.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

Firewalls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Antispyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

IDSs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

Digital Certificates.. . . . . . . . . . . . . . . . . . . . . . . . . . . 292

SSL/TLS.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Virtual Private Networks.. . . . . . . . . . . . . . . . . . . . . . . . 296

Wi-Fi Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

Chapter 10: Security Policies 304

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304

What Is a Policy?.. . . . . . . . . . . . . . . . . . . . . . . . . . . 305

Important Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . 305

Defining User Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 308

Defining System Administration Policies.. . . . . . . . . . . . . . . . . . 316

Security Breaches.. . . . . . . . . . . . . . . . . . . . . . . . . . . 319

Defining Access Control.. . . . . . . . . . . . . . . . . . . . . . . . 321

Development Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 322

Standards, Guidelines, and Procedures.. . . . . . . . . . . . . . . . . . 323

Disaster Recovery.. . . . . . . . . . . . . . . . . . . . . . . . . . . 324

Zero Trust.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

Important Laws.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

Chapter 11: Network Scanning and Vulnerability Scanning 336

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

Basics of Assessing a System.. . . . . . . . . . . . . . . . . . . . . . 337

Securing Computer Systems.. . . . . . . . . . . . . . . . . . . . . . 346

Scanning Your Network. . . . . . . . . . . . . . . . . . . . . . . . . 352

Testing and Scanning Standards.. . . . . . . . . . . . . . . . . . . . . 363

Getting Professional Help.. . . . . . . . . . . . . . . . . . . . . . . . 366

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

Chapter 12: Cyber Terrorism and Information Warfare 378

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

Actual Cases of Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 379

Weapons of Cyber Warfare.. . . . . . . . . . . . . . . . . . . . . . . 382

Economic Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . 384

Military Operations Attacks. . . . . . . . . . . . . . . . . . . . . . . 386

General Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Supervisory Control and Data Acquisitions (SCADA).. . . . . . . . . . . . . 387

Information Warfare.. . . . . . . . . . . . . . . . . . . . . . . . . . 388

Actual Cases of Cyber...

Details
Erscheinungsjahr: 2022
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780137984787
ISBN-10: 0137984782
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Easttom, William
Easttom, William Chuck
Auflage: 5. Auflage
Hersteller: Pearson International
Pearson IT Certification
Pearson Education Limited
Verantwortliche Person für die EU: Pearson, St.-Martin-Str. 82, D-81541 München, salesde@pearson.com
Maße: 232 x 178 x 31 mm
Von/Mit: William Easttom (u. a.)
Erscheinungsdatum: 23.12.2022
Gewicht: 0,976 kg
Artikel-ID: 123890824
Über den Autor
Chuck Easttom is a computer scientist, author, and inventor. He has authored 25 other books on programming, Web development, security, and Linux. He has also authored dozens of research papers on a wide range of computer science and cyber security topics. He is an inventor with 13 computer science patents. Chuck holds more than 40 different industry certifications. He also is a frequent presenter/speaker at computer and cyber security conferences such as Defcon, ISC2 Security Congress, Secure World, IEEE workshops, and more. You can reach Chuck at his website ([...] or by e-mail at [...]
Inhaltsverzeichnis

Introduction xxix

Chapter 1: Introduction to Computer Security 2

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

How Seriously Should You Take Threats to Network Security?. . . . . . . . . . 4

Identifying Types of Threats.. . . . . . . . . . . . . . . . . . . . . . . . 7

Assessing the Likelihood of an Attack on Your Network.. . . . . . . . . . . . 17

Basic Security Terminology. . . . . . . . . . . . . . . . . . . . . . . . 18

Concepts and Approaches.. . . . . . . . . . . . . . . . . . . . . . . . 21

How Do Legal Issues Impact Network Security?.. . . . . . . . . . . . . . . 24

Online Security Resources.. . . . . . . . . . . . . . . . . . . . . . . . 25

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Chapter 2: Networks and the Internet 34

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Network Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

How the Internet Works. . . . . . . . . . . . . . . . . . . . . . . . . 43

History of the Internet.. . . . . . . . . . . . . . . . . . . . . . . . . . 50

Basic Network Utilities.. . . . . . . . . . . . . . . . . . . . . . . . . 52

Other Network Devices.. . . . . . . . . . . . . . . . . . . . . . . . . 59

Advanced Network Communications Topics.. . . . . . . . . . . . . . . . 60

Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Chapter 3: Cyber Stalking, Fraud, and Abuse 74

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

How Internet Fraud Works.. . . . . . . . . . . . . . . . . . . . . . . . 75

Identity Theft.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Cyber Stalking.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Protecting Yourself Against Cybercrime.. . . . . . . . . . . . . . . . . . 91

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Chapter 4: Denial of Service Attacks 106

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

DoS Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Illustrating an Attack.. . . . . . . . . . . . . . . . . . . . . . . . . . 107

Common Tools Used for DoS Attacks.. . . . . . . . . . . . . . . . . . . 109

DoS Weaknesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 112

Specific DoS Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . 112

Real-World Examples of DoS Attacks.. . . . . . . . . . . . . . . . . . . 120

How to Defend Against DoS Attacks.. . . . . . . . . . . . . . . . . . . 121

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Chapter 5: Malware 130

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Viruses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

Trojan Horses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

The Buffer-Overflow Attack. . . . . . . . . . . . . . . . . . . . . . . 145

Spyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Other Forms of Malware.. . . . . . . . . . . . . . . . . . . . . . . . 149

Detecting and Eliminating Viruses and Spyware. . . . . . . . . . . . . . . 153

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

Chapter 6: Techniques Used by Hackers 166

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

Basic Terminology.. . . . . . . . . . . . . . . . . . . . . . . . . . . 167

The Reconnaissance Phase.. . . . . . . . . . . . . . . . . . . . . . . 167

Actual Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

Malware Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . 184

Penetration Testing.. . . . . . . . . . . . . . . . . . . . . . . . . . 187

The Dark Web. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Chapter 7: Industrial Espionage in Cyberspace 200

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

What Is Industrial Espionage?.. . . . . . . . . . . . . . . . . . . . . . 202

Information as an Asset. . . . . . . . . . . . . . . . . . . . . . . . . 203

Real-World Examples of Industrial Espionage.. . . . . . . . . . . . . . . 205

How Does Espionage Occur?. . . . . . . . . . . . . . . . . . . . . . 207

Protecting Against Industrial Espionage.. . . . . . . . . . . . . . . . . . 212

Trade Secrets.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

The Industrial Espionage Act.. . . . . . . . . . . . . . . . . . . . . . 218

Spear Phishing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220

Chapter 8: Encryption 226

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

Cryptography Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 227

History of Encryption.. . . . . . . . . . . . . . . . . . . . . . . . . . 228

Modern Cryptography Methods.. . . . . . . . . . . . . . . . . . . . . 236

Public Key (Asymmetric) Encryption.. . . . . . . . . . . . . . . . . . . 245

PGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

Legitimate Versus Fraudulent Encryption Methods.. . . . . . . . . . . . . 251

Digital Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . . 252

Hashing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

MAC and HMAC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 254

Steganography. . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

Cryptanalysis.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Cryptography Used on the Internet.. . . . . . . . . . . . . . . . . . . . 259

Quantum Computing Cryptography. . . . . . . . . . . . . . . . . . . . 259

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Chapter 9: Computer Security Technology 268

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

Virus Scanners.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

Firewalls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Antispyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

IDSs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

Digital Certificates.. . . . . . . . . . . . . . . . . . . . . . . . . . . 292

SSL/TLS.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Virtual Private Networks.. . . . . . . . . . . . . . . . . . . . . . . . 296

Wi-Fi Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

Chapter 10: Security Policies 304

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304

What Is a Policy?.. . . . . . . . . . . . . . . . . . . . . . . . . . . 305

Important Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . 305

Defining User Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 308

Defining System Administration Policies.. . . . . . . . . . . . . . . . . . 316

Security Breaches.. . . . . . . . . . . . . . . . . . . . . . . . . . . 319

Defining Access Control.. . . . . . . . . . . . . . . . . . . . . . . . 321

Development Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 322

Standards, Guidelines, and Procedures.. . . . . . . . . . . . . . . . . . 323

Disaster Recovery.. . . . . . . . . . . . . . . . . . . . . . . . . . . 324

Zero Trust.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

Important Laws.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

Chapter 11: Network Scanning and Vulnerability Scanning 336

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

Basics of Assessing a System.. . . . . . . . . . . . . . . . . . . . . . 337

Securing Computer Systems.. . . . . . . . . . . . . . . . . . . . . . 346

Scanning Your Network. . . . . . . . . . . . . . . . . . . . . . . . . 352

Testing and Scanning Standards.. . . . . . . . . . . . . . . . . . . . . 363

Getting Professional Help.. . . . . . . . . . . . . . . . . . . . . . . . 366

Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369

Chapter 12: Cyber Terrorism and Information Warfare 378

Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378

Actual Cases of Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 379

Weapons of Cyber Warfare.. . . . . . . . . . . . . . . . . . . . . . . 382

Economic Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . 384

Military Operations Attacks. . . . . . . . . . . . . . . . . . . . . . . 386

General Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Supervisory Control and Data Acquisitions (SCADA).. . . . . . . . . . . . . 387

Information Warfare.. . . . . . . . . . . . . . . . . . . . . . . . . . 388

Actual Cases of Cyber...

Details
Erscheinungsjahr: 2022
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: Kartoniert / Broschiert
ISBN-13: 9780137984787
ISBN-10: 0137984782
Sprache: Englisch
Einband: Kartoniert / Broschiert
Autor: Easttom, William
Easttom, William Chuck
Auflage: 5. Auflage
Hersteller: Pearson International
Pearson IT Certification
Pearson Education Limited
Verantwortliche Person für die EU: Pearson, St.-Martin-Str. 82, D-81541 München, salesde@pearson.com
Maße: 232 x 178 x 31 mm
Von/Mit: William Easttom (u. a.)
Erscheinungsdatum: 23.12.2022
Gewicht: 0,976 kg
Artikel-ID: 123890824
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte