Where can buy Computer security fundamentals, 5th edition william chuck easttom ebook with cheap pri

Page 1


Visit to download the full and correct content document: https://ebookmass.com/product/computer-security-fundamentals-5th-edition-william-c huck-easttom/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Computer Security Fundamentals, 5th Edition Chuck

Easttom

https://ebookmass.com/product/computer-security-fundamentals-5thedition-chuck-easttom/

Computer Security Fundamentals Chuck Easttom

https://ebookmass.com/product/computer-security-fundamentalschuck-easttom/

Computer Security Fundamentals, Fourth Edition Chuck

Easttom

https://ebookmass.com/product/computer-security-fundamentalsfourth-edition-chuck-easttom/

Certified Ethical Hacker (CEH) Exam Cram William Chuck

Easttom

https://ebookmass.com/product/certified-ethical-hacker-ceh-examcram-william-chuck-easttom-2/

Certified Ethical Hacker (CEH) Exam Cram William Chuck Easttom

https://ebookmass.com/product/certified-ethical-hacker-ceh-examcram-william-chuck-easttom/

Computer Security Principles and Practice 5th Edition

William Stallings

https://ebookmass.com/product/computer-security-principles-andpractice-5th-edition-william-stallings/

Principles of Computer Security - Wm. Arthur Conklin & Greg White & Chuck Cothren & Roger L. Davis & Dwayne Williams

https://ebookmass.com/product/principles-of-computer-security-wmarthur-conklin-greg-white-chuck-cothren-roger-l-davis-dwaynewilliams/

Network Defense and Countermeasures: Principles and Practices, 4th Edition

William Easttom

https://ebookmass.com/product/network-defense-andcountermeasures-principles-and-practices-4th-edition-williameasttom/

Computer Fundamentals Anita Goel

https://ebookmass.com/product/computer-fundamentals-anita-goel/

About This eBook

ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site.

Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.

Computer Security Fundamentals

Dr. Chuck Easttom

Computer Security Fundamentals, Fifth Edition

Copyright © 2023 by Pearson Education, Inc.

All rights reserved. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearson.com/permissions.

No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.

ISBN-13: 978-0-13-798478-7

ISBN-10: 0-13-798478-2

Library of Congress control number: 2022917281

ScoutAutomatedPrintCode

Trademarks

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Microsoft® Windows® , and Microsoft Office® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation.

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book.

Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services.

The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.

Special Sales

For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419.

For government sales inquiries, please contact governmentsales@pearsoned.com.

For questions about sales outside the U.S., please contact intlcs@pearson.com.

Editor-in-Chief

Mark Taub

Product Line Manager

Brett Bartow

Executive Editor

James Manly

Development Editor Christopher Cleveland

Managing Editor

Sandra Schroeder

Project Editor

Mandie Frank

Indexer

Ken Johnson

Proofreader

Donna Mulder

Technical Editor

Lewis Heuermann

Publishing Coordinator

Cindy Teeters

Designer

Chuti Prasertsith

Compositor

codeMantra

Pearson’s Commitment to Diversity, Equity, and Inclusion

Pearson is dedicated to creating bias-free content that reflects the diversity of all learners. We embrace the many dimensions of diversity, including but not limited to race, ethnicity, gender, socioeconomic status, ability, age, sexual orientation, and religious or political beliefs.

Education is a powerful force for equity and change in our world. It has the potential to deliver opportunities that improve lives and enable economic mobility. As we work with authors to create content for every product and service, we acknowledge our responsibility to demonstrate inclusivity and incorporate diverse scholarship so that everyone can achieve their potential through learning. As the world’s leading learning company, we have a duty to help drive change and live up to our purpose to help more people create a better life for themselves and to create a better world.

Our ambition is to purposefully contribute to a world where:

Everyone has an equitable and lifelong opportunity to succeed through learning.

Our educational products and services are inclusive and represent the rich diversity of learners.

Our educational content accurately reflects the histories and experiences of the learners we serve.

Our educational content prompts deeper discussions with learners and motivates them to expand their own learning (and worldview).

While we work hard to present unbiased content, we want to hear from you about any concerns or needs with this Pearson product so

that we can investigate and address them.

Please contact us with concerns about any potential bias at https://www.pearson.com/report-bias.html.

Credits

Figure 3.3, Figure 3.4: Mozilla Corporation

Figure 3.5, Figure 13.8: Google

Figure 3.6: HMA

Figure 3.7, Figure 6.11, Figure 13.1, Figure 13.2: Verizon Communications

Figure 4.2, Figure 4.3: Praetox Technologies

Figure 5.2: CEXX.ORG

Figure 5.3 - Figure 5.5: Actiance, Inc

Figure 5.6: Symantec Corporation

Figure 5.7: McAfee, LLC

Figure 5.8, Figure 5.9: Avast Software s.r.o.

Figure 5.10: MalwareBytes

Figure 6.1: Netcraft Ltd

Figure 6.2: Internet Archive

Figure 6.3: NMAP.ORG

Figure 6.4: Massimiliano Montoro

Figure 6.5, Figure 6.6: Shodan

Figure 6.8: Slashdot Media

Figure 6.9: TeraBIT Virus Maker

Figure 6.12: Digital Pharmacist Inc

Figure 7.1: Carnegie Mellon University

Figure 7.2: New Africa/Shutterstock

Figure 7.3: SJ Travel Photo and Video/Shutterstock

Figure 7.4: Reed Kaestner/Getty Images

Figure 7.5: IDRIX

Figure 9.2: Cisco, Inc

Figure 9.4, Figure 9.6, Figure 9.8: Linus Torvalds

Figure 11.4 - Figure 11.8: Tenable, Inc.

Figure 11.9, Figure 11.10: The OWASP Foundation Inc

Figure 11.11, Figure 11.12: Shodan

Figure 11.13, Figure 11.14: OffSec Services Limited

Figure 11.15 - Figure 11.17: Sparta

Figure 11.18: Subgraph

Figure 11.19: Pentest-Tools.com

Figure 11.20: United States Department of Commerce

Figure 12.1: 8studio/123RF

Figure 12.2: Sinn Féin

Figure 12.3: BBC

Figure 12.4, Figure 12.5: AELE

Figure 12.6: David Carney

Figure 12.7: People Drug Store

Figure 12.8: ccPal Store

Figure 13.3: Internet Oracle, Inc

Figure 13.4: U.S. Securities and Exchange Commission

Figure 13.5: Federal Bureau of Investigation

Figure 13.6: Texas Department of Public Safety

Figure 13.7: U.S. Department of Justice

Figure 13.9 - Figure 13.11: Maltego Technologies

Figure 14.1 - Figure 14.5: Exterro, Inc

Figure 14.6, Figure 14.7, Figure 14.11: PassMark™ Software

Figure 14.8, Figure 14.9: Defiant Technologies, LLC

Figure 14.10: robwilson39/123RF

Cover: JLStock/Shutterstock

Contents at a Glance

Table of Contents

Introduction

Chapter 1: Introduction to Computer Security

Introduction

How Seriously Should You Take Threats to Network Security?

Identifying Types of Threats

Malware

Compromising System Security

DoS Attacks

Web Attacks

Session Hijacking

Insider Threats

DNS Poisoning

New Attacks

Assessing the Likelihood of an Attack on Your Network

Basic Security Terminology

Hacker Slang

Professional Terms

Concepts and Approaches

How Do Legal Issues Impact Network Security?

Online Security Resources

CERT

Microsoft

F-Secure

SANS Institute

Summary

Chapter 2: Networks and the Internet

Introduction

Network Basics

The Physical Connection: Local Networks

Faster Connection Speeds

Wireless Bluetooth

Other Wireless Protocols

Data Transmission

How the Internet Works

IP Addresses

Uniform Resource Locators

What Is a Packet?

Basic Communications

History of the Internet

Basic Network Utilities

IPConfig

ARP

Route

PathPing

Other Network Devices

Advanced Network Communications Topics

The OSI Model

The TCP/IP Model

Media Access Control (MAC) Addresses

Cloud Computing

Summary

Chapter 3: Cyber Stalking, Fraud, and Abuse

Introduction

How Internet Fraud Works

Investment Offers

Auction Fraud

Identity Theft

Cyber Stalking

Phishing

Real Cyber Stalking Cases

How to Evaluate Cyber Stalking

Crimes Against Children

Laws About Internet Fraud

Protecting Yourself Against Cybercrime

Protecting Against Investment Fraud

Summary

Protecting Against Identity Theft

Secure Browser Settings

Protecting Against Auction Fraud

Protecting Against Online Harassment

Chapter 4: Denial of Service Attacks

Introduction

DoS Attacks

Illustrating an Attack

Distributed Reflection Denial of Service Attacks

Common Tools Used for DoS Attacks

Low Orbit Ion Cannon

XOIC

TFN and TFN2K

Stacheldraht

DoS Weaknesses

Specific DoS Attacks

TCP SYN Flood Attacks

Smurf IP Attacks

UDP Flood Attacks

ICMP Flood Attacks

The Ping of Death

Teardrop Attacks

DHCP Starvation

HTTP POST DoS Attacks

PDoS Attacks

Registration DoS Attacks

Login DoS Attacks

Land Attacks

DDoS Attacks

Yo-Yo Attack

Login Attacks

CLDAP Reflection

Degradation of Service Attacks

Challenge Collapsar Attack

EDoS

Real-World Examples of DoS Attacks

Google Attack

AWS Attack

BostonGlobeAttack

Memcache Attacks

DDoS Blackmail

Mirai

How to Defend Against DoS Attacks

Summary

Chapter 5: Malware

Introduction

Viruses

How a Virus Spreads

Trojan Horses

Types of Viruses

Virus Examples

The Impact of Viruses

Machine Learning and Malware

Rules for Avoiding Viruses

The Buffer-Overflow Attack

The Sasser Virus/Buffer Overflow

Spyware

Legal Uses of Spyware

How Is Spyware Delivered to a Target System?

Pegasus

Obtaining Spyware Software

Other Forms of Malware

Rootkits

Malicious Web-Based Code

Logic Bombs

Spam

Advanced Persistent Threats

Deep Fakes

Detecting and Eliminating Viruses and Spyware

Antivirus Software

Anti-Malware and Machine Learning

Remediation Steps

Summary

Chapter 6: Techniques Used by Hackers

Introduction

Basic Terminology

The Reconnaissance Phase

Passive Scanning Techniques

Active Scanning Techniques

Actual Attacks

SQL Script Injection

Cross-Site Scripting

Cross-Site Request Forgery

Directory Traversal

Cookie Poisoning

URL Hijacking

Command Injection

Wireless Attacks

Cell Phone Attacks

Password Cracking

Malware Creation

Windows Hacking Techniques

Penetration Testing

NIST 800-115

The NSA Information Assessment

Methodology

PCI Penetration Testing Standard

The Dark Web

Summary

Chapter 7: Industrial Espionage in Cyberspace

Introduction

What Is Industrial Espionage?

Information as an Asset

Real-World Examples of Industrial Espionage

Example 1: Hacker Group

Example 2: Company Versus Company

Example 3: Nuclear Secrets

Example 4: Uber

Example 5: Foreign Governments and Economic Espionage

Trends in Industrial Espionage

Industrial Espionage and You

How Does Espionage Occur?

Low-Tech Industrial Espionage

Spyware Used in Industrial Espionage

Steganography Used in Industrial

Espionage

Phone Taps and Bugs

Spy for Hire

Protecting Against Industrial Espionage

Trade Secrets

The Industrial Espionage Act

Spear Phishing

Summary

Chapter 8: Encryption

Introduction

Cryptography Basics

History of Encryption

The Caesar Cipher

Atbash

Multi-Alphabet Substitution

Rail Fence

Scytale

Polybius Cipher

Enigma

Binary Operations

Modern Cryptography Methods

Single-Key (Symmetric) Encryption

Modification of Symmetric Methods

Public Key (Asymmetric) Encryption

PGP

Legitimate Versus Fraudulent Encryption Methods

Digital Signatures

Hashing

MAC

Steganography

Rainbow Tables

Cryptanalysis

Historical Steganography

Steganography Methods and Tools

Frequency Analysis

Modern Cryptanalysis Methods

Cryptography Used on the Internet

Quantum Computing Cryptography

Summary

Chapter 9: Computer Security Technology

Introduction

Virus Scanners

Firewalls

How Does a Virus Scanner Work?

Virus-Scanning Techniques

Commercial Antivirus Software

Benefits and Limitations of Firewalls

Firewall Types and Components

Firewall Configurations

Types of Firewalls

Commercial and Free Firewall Products

Firewall Logs

Antispyware

IDSs

IDS Categorization

Identifying an Intrusion

IDS Elements

Snort

Honey Pots

Database Activity Monitoring

SIEM

Other Preemptive Techniques

Authentication

Digital Certificates

SSL/TLS

Virtual Private Networks

Point-to-Point Tunneling Protocol

Layer 2 Tunneling Protocol

IPsec

Wi-Fi Security

Wired Equivalent Privacy

Wi-Fi Protected Access

WPA2

WPA3

Summary

Chapter 10: Security Policies Introduction

ISO 27001

ISO 27002

ISO 17799

Defining User Policies

Passwords

Internet Use

Email Usage

Installing/Uninstalling Software

Instant Messaging

Desktop Configuration

Bring Your Own Device

Final Thoughts on User Policies

Defining System Administration Policies

New Employees

Departing Employees

Change Requests

Security Breaches

Virus Infection

DoS Attacks

Intrusion by a Hacker

Defining Access Control

Development Policies

Standards, Guidelines, and Procedures

Data Classification

DoD Clearances

Disaster Recovery

Disaster Recovery Plan

Business Continuity Plan

Impact Analysis

Disaster Recovery and Business

Continuity Standards

Fault Tolerance

Zero Trust

Important Laws

Sarbanes-Oxley

Payment Card Industry Data Security Standards

Summary

Chapter 11: Network Scanning and Vulnerability

Scanning

Introduction

Basics of Assessing a System

Patch Ports Protect Policies Probe

Physical

Securing Computer Systems

Securing an Individual Workstation

HIPAA

Securing a Server

Securing a Network

Scanning Your Network

NESSUS

OWASP Zap

Shodan

Kali Linux

Vega

OpenVAS

Testing and Scanning Standards

NIST 800-115

NSA-IAM

PCI -DSS

National Vulnerability Database

Getting Professional Help

Summary

Chapter 12: Cyber Terrorism and Information Warfare

Introduction

Actual Cases of Cyber Terrorism

China’s Advanced Persistent Threat

India and Pakistan

Russian Hackers

Iran–Saudi Tension

Weapons of Cyber Warfare

Stuxnet

Economic Attacks

Flame

StopGeorgia.ru Malware

FinFisher

BlackEnergy

Regin

NSA ANT Catalog

Military Operations Attacks

General Attacks

Supervisory Control and Data Acquisitions (SCADA)

Information Warfare

Propaganda

Information Control

Disinformation

Actual Cases of Cyber Terrorism

Future Trends

Machine Learning/Artificial Intelligence

Positive Trends

Negative Trends

Defense Against Cyber Terrorism

Terrorist Recruiting and Communication

TOR and the Dark Web

Summary

Chapter 13: Cyber Detective

Introduction

General Searches

Email Searches

Company Searches

Court Records and Criminal Checks

Sex Offender Registries

Civil Court Records

Other Resources

Usenet

Google

Maltego

Summary

Chapter 14: Introduction to Forensics

Introduction

General Guidelines

Don’t Touch the Suspect Drive

Imaging a Drive with Forensic Toolkit

Can You Ever Conduct Forensics on a Live Machine?

Document Trail

Secure the Evidence

Chain of Custody

FBI Forensics Guidelines

U.S. Secret Service Forensics Guidelines

EU Evidence Gathering

Scientific Working Group on Digital Evidence

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.