Instant ebooks textbook Computer security fundamentals, fourth edition chuck easttom download all ch

Page 1


https://ebookmass.com/product/computer-securityfundamentals-fourth-edition-chuck-easttom/

Instant digital products (PDF, ePub, MOBI) ready for you

Download now and discover formats that fit your needs...

Computer Security Fundamentals Chuck Easttom

https://ebookmass.com/product/computer-security-fundamentals-chuckeasttom/

ebookmass.com

Computer Security Fundamentals, 5th Edition Chuck Easttom

https://ebookmass.com/product/computer-security-fundamentals-5thedition-chuck-easttom/

ebookmass.com

Computer Security Fundamentals, 5th Edition William Chuck Easttom

https://ebookmass.com/product/computer-security-fundamentals-5thedition-william-chuck-easttom/

ebookmass.com

Child, Family, and Community: Family-Centered Early Care and Education 5th ed. Edition – Ebook PDF Version

https://ebookmass.com/product/child-family-and-community-familycentered-early-care-and-education-5th-ed-edition-ebook-pdf-version/

ebookmass.com

Current Developments in Biotechnology and Bioengineering. Production, Isolation and Purification of Industrial Products 1st Edition Ashok Pandey

https://ebookmass.com/product/current-developments-in-biotechnologyand-bioengineering-production-isolation-and-purification-ofindustrial-products-1st-edition-ashok-pandey/ ebookmass.com

Pragmatism and Organization Studies Philippe Lorino

https://ebookmass.com/product/pragmatism-and-organization-studiesphilippe-lorino/

ebookmass.com

She/He/They/Me: An Interactive Guide to the Gender Binary (LGBTQ+, Queer Guide, Diverse Gender, Transgender, Nonbinary) Ryle

https://ebookmass.com/product/she-he-they-me-an-interactive-guide-tothe-gender-binary-lgbtq-queer-guide-diverse-gender-transgendernonbinary-ryle/ ebookmass.com

Modern Control: State-Space Analysis and Design Methods

Arie Nakhmani

https://ebookmass.com/product/modern-control-state-space-analysis-anddesign-methods-arie-nakhmani/

ebookmass.com

Origen and Prophecy: Fate, Authority, Allegory, and the Structure of Scripture Claire Hall

https://ebookmass.com/product/origen-and-prophecy-fate-authorityallegory-and-the-structure-of-scripture-claire-hall/

ebookmass.com

American Mermaid: A Novel Julia Langbein

https://ebookmass.com/product/american-mermaid-a-novel-julia-langbein/

ebookmass.com

About This eBook

ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site.

Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.

Computer Security Fundamentals

Dr. Chuck Easttom

Computer Security Fundamentals, Fourth Edition

Copyright © 2020 by Pearson Education, Inc.

All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.

ISBN-13: 978-0-13-577477-9

ISBN-10: 0-13-577477-2

Library of Congress control number: 2019908181

ScoutAutomatedPrintCode

Trademarks

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation.

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The author and the

publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book.

Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose all such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services.

The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.

Special Sales

For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419.

For government sales inquiries, please contact governmentsales@pearsoned.com.

For questions about sales outside the U.S., please contact intlcs@pearson.com.

Editor-in-Chief

Mark Taub

Product Line Manager

Brett Bartow

Senior Editor

James Manly

Development Editor

Christopher Cleveland

Managing Editor

Sandra Schroeder

Project Editor

Mandie Frank

Indexer

Erika Millen

Proofreader

Abigail Manheim

Technical Editor

Akhil Behl

Publishing Coordinator

Cindy Teeters

Designer

Chuti Prasertsith

Compositor

codeMantra

Credits

Figure Number Attribution/Credit Line

Figure 2-1

Figure 2-2

Figure 2-3

Figure 2-4

Figure 2-5

Figure 2-6

Figure 2-7

Figure 2-8

Figure 2-9

Figure 3-1

Figure 3-2

Figure 3-3

Figure 3-4

Figure 3-5

Figure 4-1

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of Command prompt ©

Microsoft 2019

Screenshot of windows © Microsoft 2019

Screenshot of windows © Microsoft 2019

Screenshot of windows © Microsoft 2019

Screenshot of windows © Microsoft 2019

Screenshot of windows © Microsoft 2019

Screenshot of Command prompt © Microsoft 2019

Figure Number

Figure 4-2

Figure 4-3

Figure 5-1

Figure 5-2

Figure 5-3

Figure 5-4

Figure 5-5

Figure 5-6

Figure 5-7

Figure 5-8

Figure 5-9

Figure 5-10

Figure 5-11

Figure 6-1

Figure 6-2

Figure 6-3

Figure 6-4

Attribution/Credit Line

Screenshot of LOIC © Praetox Technologies

Screenshot of XOIC © Praetox Technologies

Screenshot of Command prompt © Microsoft 2019

Screenshot of Counterexploitation © CEXX.ORG

Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.

Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.

Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.

Screenshot of Norton Security © 1995 - 2019 Symantec Corporation

Screenshot of McAfee AntiVirus © 2019 McAfee, LLC

Screenshot of Avast © 1988-2019

Copyright Avast Software s.r.o

Screenshot of AVG © 1988-2019

Copyright Avast Software s.r.o

Screenshot of Malwarebytes © 2019 Malwarebytes

Screenshot of Windows © Microsoft 2019

Screenshot of Netcraft © 1995-2019 Netcraft Ltd

Screenshot of WayBackMachine BETA © Internet Archive

Screenshot of Zenmap © NMAP.ORG

Screenshot of Cain © Cain and Abel

Figure Number

Figure 6-5

Figure 6-6

Figure 6-8

Figure 6-9

Figure 6-11

Figure 6-12

Attribution/Credit Line

Screenshot of Shodan © 2013-2019

Shodan

Screenshot of Shodan © 2013-2019 Shodan

Screenshot of OphCrack © 2019 Slashdot Media

Screenshot of TeraBIT Virus Maker © TeraBIT Virus Maker

Screenshot of Yahoo © 2019 Verizon Media

Screenshot of Peoples Drug Store © 2019 Digital Pharmacist Inc.

Figure 7-2 New Africa/Shutterstock

Figure 7-4 Reed Kaestner/Getty Images

Figure 7-5

Figure 7-6

Screenshot of VeraCrypt © IDRIX

Screenshot of windows © Microsoft 2019

Figure 8-2 Chuck Easttom

Figure 9-1

Figure 9-2

Figure 9-7

Figure 11-1

Figure 11-2

Figure 11-4

Figure 11-5

Screenshot of Windows 10 Firewall © Microsoft 2019

Screenshot of Snort Installation © 2019 Cisco

Screenshot of Windows-style library © Microsoft 2019

Screenshot of Shutting Down a Service in Windows © Microsoft 2019

Screenshot of Disabled services © Microsoft 2019

Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019

Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019

Figure Number

Figure 11-6

Figure 11-7

Figure 11-8

Figure 11-9

Figure 11-10

Figure 11-11

Figure 11-12

Figure 11-13

Figure 11-14

Figure 11-15

Attribution/Credit Line

Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019

Screenshot of Nessus © 2019 Tenable

Screenshot of Nessus © 2019 Tenable

Screenshot of Nessus © 2019 Tenable

Screenshot of Nessus © 2019 Tenable

Screenshot of Nessus © 2019 Tenable

Screenshot of OWASP ZAP © OWASP

Screenshot of OWASP ZAP © OWASP

Screenshot of shodan © 2013-2019 Shodan®

Screenshot of shodan © 2013-2019 Shodan®

Figure 12-1 Dan Grytsku/123RF

Figure 12-2

Figure 12-3

Figure 12-4

Figure 12-5

Figure 12-6

Figure 12-7

Figure 12-8

Screenshot of Sinn Fein © Sinn Féin

Screenshot of BBC News © 2019 BBC

Screenshot of Cyberterrorism Preparedness Act

Screenshot of Cyberterrorism Preparedness Act

Screenshot of Tech Law Journal

Screenshot of The Peoples drug store

Screenshot of ccPal Store

Figure Number Attribution/Credit Line

Figure 13-1

Figure 13-2

Figure 13-3

Figure 13-4

Figure 13-6

Figure 13-7

Figure 13-8

Figure 13-9

Figure 14-1

Figure 14-2

Figure 14-3

Figure 14-4

Figure 14-5

Figure 14-6

Screenshot of Yahoo © 2019 Verizon Media

Screenshot of Yahoo © 2019 Verizon Media

Screenshot of Yahoo © 2019 Verizon Media

Screenshot of Infobel © 1995 - 2019 Kapitol

Screenshot of Federal Bureau of Investigation

Screenshot of Texas Department of Public Safety © 2000- 2019 Texas Department of Public Safety.

Screenshot of Oklahoma

Screenshot of Google access ©2019 Google

Screenshot of FTK Imager © Copyright 2019 AccessData

Screenshot of FTK Imager © Copyright 2019 AccessData

Screenshot of FTK Imager © Copyright 2019 AccessData

Screenshot of FTK Imager © Copyright 2019 AccessData

Screenshot of FTK Imager © Copyright 2019 AccessData

Screenshot of OSForensics

Copyright © 2019 PassMark® Software

Screenshot of OSForensics

Figure 14-7

Copyright © 2019 PassMark® Software

Figure Number Attribution/Credit Line

Figure 14-8

Figure 14-9

Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC

Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC

Figure 14-10 pio3/Shutterstock

Screenshot of OSForensics

Figure 14-11

Figure 14-12

Figure 14-13

Figure 14-14

Figure 14-15

Figure 14-16

Figure 14-17

Figure 15-10

Copyright © 2019 PassMark® Software

Screenshot of Command Prompt © Microsoft 2019

Screenshot of Command Prompt © Microsoft 2019

Screenshot of Command Prompt © Microsoft 2019

Screenshot of Command Prompt © Microsoft 2019

Screenshot of Windows registry © Microsoft 2019

Screenshot of Windows registry © Microsoft 2019

Screenshot of Microsoft Excel © Microsoft 2019

Cover gintas77/Shutterstock

Contents at a Glance

Table of Contents

Introduction

Chapter 1: Introduction to Computer Security

Introduction

How Seriously Should You Take Threats to Network Security?

Identifying Types of Threats

Malware

Compromising System Security

DoS Attacks

Web Attacks

Session Hijacking

Insider Threats

DNS Poisoning

New Attacks

Assessing the Likelihood of an Attack on Your Network

Basic Security Terminology

Hacker Slang

Professional Terms

Concepts and Approaches

How Do Legal Issues Impact Network Security?

Online Security Resources

CERT

Microsoft Security Advisor

F-Secure

SANS Institute

Summary

Test Your Skills

Chapter 2: Networks and the Internet

Introduction

Network Basics

The Physical Connection: Local Networks

Faster Connection Speeds

Wireless

Bluetooth

Other Wireless Protocols

Data Transmission

How the Internet Works

IP Addresses

Uniform Resource Locators

What Is a Packet?

Basic Communications

History of the Internet

Basic Network Utilities

IPConfig

Ping

Tracert

Netstat

NSLookup

ARP

Route

Other Network Devices

Advanced Network Communications Topics

The OSI Model

Media Access Control (MAC) Addresses

Summary

Test Your Skills

Chapter 3: Cyber Stalking, Fraud, and Abuse

Introduction

How Internet Fraud Works

Investment Offers

Auction Fraud

Identity Theft

Phishing

Cyber Stalking

Real Cyber Stalking Cases

How to Evaluate Cyber Stalking

Crimes Against Children

Laws About Internet Fraud

Protecting Yourself Against Cybercrime

Protecting Against Investment Fraud

Protecting Against Identity Theft

Secure Browser Settings

Protecting Against Auction Fraud

Protecting Against Online Harassment

Summary

Test Your Skills

Chapter 4: Denial of Service Attacks

Introduction

DoS Attacks

Illustrating an Attack

Distributed Reflection Denial of Service Attacks

Common Tools Used for DoS Attacks

Low Orbit Ion Cannon

XOIC

TFN and TFN2K

Stacheldraht

DoS Weaknesses

Specific DoS Attacks

TCP SYN Flood Attacks

Smurf IP Attacks

UDP Flood Attacks

ICMP Flood Attacks

The Ping of Death

Teardrop Attacks

DHCP Starvation

HTTP POST DoS Attacks

PDoS Attacks

Registration DoS Attacks

Login DoS Attacks

Land Attacks

DDoS Attacks

Real-World Examples of DoS Attacks

Boston Globe Attack

Memcache Attacks

MyDoom

DDoS Blackmail

Mirai

How to Defend Against DoS Attacks

Summary

Test Your Skills

Chapter 5: Malware

Introduction

Viruses

How a Virus Spreads

Types of Viruses

Virus Examples

The Impact of Viruses

Rules for Avoiding Viruses

Trojan Horses

The Buffer-Overflow Attack

The Sasser Virus/Buffer Overflow

Spyware

Legal Uses of Spyware

How Is Spyware Delivered to a Target System?

Obtaining Spyware Software

Other Forms of Malware

Rootkits

Malicious Web-Based Code

Logic Bombs

Spam

Advanced Persistent Threats

Detecting and Eliminating Viruses and Spyware

Antivirus Software

Remediation Steps

Summary

Test Your Skills

Chapter 6: Techniques Used by Hackers

Introduction

Basic Terminology

The Reconnaissance Phase

Passive Scanning Techniques

Active Scanning Techniques

Actual Attacks

SQL Script Injection

Cross-Site Scripting

Cross-Site Request Forgery

Directory Traversal

Cookie Poisoning

URL Hijacking

Wireless Attacks

Cell Phone Attacks

Password Cracking

Malware Creation

Windows Hacking Techniques

Penetration Testing

NIST 800-115

The NSA Information Assessment Methodology

PCI Penetration Testing Standard

The Dark Web

Summary

Test Your Skills

Chapter 7: Industrial Espionage in Cyberspace

Introduction

What Is Industrial Espionage?

Information as an Asset

Real-World Examples of Industrial Espionage

Example 1: Houston Astros

Example 2: University Trade Secrets

Example 3: Nuclear Secrets

Example 4: Uber

Example 5: Foreign Governments and Economic Espionage

Trends in Industrial Espionage

Industrial Espionage and You

How Does Espionage Occur?

Low-Tech Industrial Espionage

Spyware Used in Industrial Espionage

Steganography Used in Industrial Espionage

Phone Taps and Bugs

Protecting Against Industrial Espionage

The Industrial Espionage Act

Spear Phishing

Summary

Test Your Skills

Chapter 8: Encryption

Introduction

Cryptography Basics

History of Encryption

The Caesar Cipher

Atbash

Multi-Alphabet Substitution

Rail Fence

Enigma

Binary Operations

Modern Cryptography Methods

Single-Key (Symmetric) Encryption

Modification of Symmetric Methods

Public Key (Asymmetric) Encryption

PGP

Legitimate Versus Fraudulent Encryption Methods

Digital Signatures

Hashing

MAC

Rainbow Tables

Steganography

Historical Steganography

Steganography Methods and Tools

Cryptanalysis

Frequency Analysis

Modern Cryptanalysis Methods

Cryptography Used on the Internet

Quantum Computing Cryptography

Summary

Test Your Skills

Chapter 9: Computer Security Technology

Introduction

Virus Scanners

How Does a Virus Scanner Work?

Virus-Scanning Techniques

Commercial Antivirus Software

Firewalls

Benefits and Limitations of Firewalls

Firewall Types and Components

Firewall Configurations

Commercial and Free Firewall Products

Firewall Logs

Antispyware

IDSs

IDS Categorization

Identifying an Intrusion

IDS Elements

Snort

Honey Pots

Database Activity Monitoring

Other Preemptive Techniques

Authentication

Digital Certificates

SSL/TLS

Virtual Private Networks

Point-to-Point Tunneling Protocol

Layer 2 Tunneling Protocol

IPsec

Wi-Fi Security

Wired Equivalent Privacy

Wi-Fi Protected Access

WPA2

WPA3

Summary

Test Your Skills

Chapter 10: Security Policies

Introduction

What Is a Policy?

ISO 17999

Defining User Policies

Passwords

Internet Use

Email Usage

Installing/Uninstalling Software

Instant Messaging

Desktop Configuration

Bring Your Own Device

Final Thoughts on User Policies

Defining System Administration Policies

New Employees

Departing Employees

Change Requests

Security Breaches

Virus Infection

DoS Attacks

Intrusion by a Hacker

Defining Access Control

Development Policies

Standards, Guidelines, and Procedures

Data Classification

DoD Clearances

Disaster Recovery

Disaster Recovery Plan

Business Continuity Plan

Impact Analysis

Disaster Recovery and Business Continuity Standards

Fault Tolerance

Important Laws

HIPAA

Sarbanes-Oxley

Payment Card Industry Data Security Standards

Summary

Test Your Skills

Chapter 11: Network Scanning and Vulnerability Scanning

Introduction

Basics of Assessing a System

Patch

Ports

Protect

Policies

Probe

Physical

Securing Computer Systems

Securing an Individual Workstation

Securing a Server

Securing a Network

Scanning Your Network

MBSA

NESSUS

OWASP Zap

Shodan

Getting Professional Help

Summary

Test Your Skills

Chapter 12: Cyber Terrorism and Information Warfare

Introduction

Actual Cases of Cyber Terrorism

The Chinese Eagle Union

China’s Advanced Persistent Threat

India and Pakistan

Russian Hackers

Weapons of Cyber Warfare

Stuxnet

Flame

StopGeorgia.ru Malware

FinFisher

BlackEnergy

NSA ANT Catalog

Economic Attacks

Military Operations Attacks

General Attacks

Supervisory Control and Data Acquisitions (SCADA)

Information Warfare

Propaganda

Information Control

Disinformation

Actual Cases

Future Trends

Positive Trends

Negative Trends

Defense Against Cyber Terrorism

Terrorist Recruiting and Communication

TOR and the Dark Web

Summary

Test Your Skills

Chapter 13: Cyber Detective

Introduction

General Searches

Facebook

Court Records and Criminal Checks

Sex Offender Registries

Civil Court Records

Other Resources

Usenet

Summary

Test Your Skills

Chapter 14: Introduction to Forensics

Introduction

General Guidelines

Don’t Touch the Suspect Drive

Image a Drive with Forensic Toolkit

Can You Ever Conduct Forensics on a Live Machine?

Document Trail

Secure the Evidence

Chain of Custody

FBI Forensics Guidelines

U.S. Secret Service Forensics Guidelines

EU Evidence Gathering

Scientific Working Group on Digital Evidence

Locard’s Principle of Transference

Tools

Finding Evidence on the PC

Finding Evidence in the Browser

Finding Evidence in System Logs

Windows Logs

Linux Logs

Getting Back Deleted Files

Operating System Utilities

net sessions

openfiles

fc

netstat

The Windows Registry

Specific Entries

Mobile Forensics: Cell Phone Concepts

Cell Concepts Module

Cellular Networks

iOS

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.