https://ebookmass.com/product/computer-securityfundamentals-fourth-edition-chuck-easttom/
Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...
Computer Security Fundamentals Chuck Easttom
https://ebookmass.com/product/computer-security-fundamentals-chuckeasttom/
ebookmass.com
Computer Security Fundamentals, 5th Edition Chuck Easttom
https://ebookmass.com/product/computer-security-fundamentals-5thedition-chuck-easttom/
ebookmass.com
Computer Security Fundamentals, 5th Edition William Chuck Easttom
https://ebookmass.com/product/computer-security-fundamentals-5thedition-william-chuck-easttom/
ebookmass.com
Child, Family, and Community: Family-Centered Early Care and Education 5th ed. Edition – Ebook PDF Version
https://ebookmass.com/product/child-family-and-community-familycentered-early-care-and-education-5th-ed-edition-ebook-pdf-version/
ebookmass.com
Current Developments in Biotechnology and Bioengineering. Production, Isolation and Purification of Industrial Products 1st Edition Ashok Pandey
https://ebookmass.com/product/current-developments-in-biotechnologyand-bioengineering-production-isolation-and-purification-ofindustrial-products-1st-edition-ashok-pandey/ ebookmass.com
Pragmatism and Organization Studies Philippe Lorino
https://ebookmass.com/product/pragmatism-and-organization-studiesphilippe-lorino/
ebookmass.com
She/He/They/Me: An Interactive Guide to the Gender Binary (LGBTQ+, Queer Guide, Diverse Gender, Transgender, Nonbinary) Ryle
https://ebookmass.com/product/she-he-they-me-an-interactive-guide-tothe-gender-binary-lgbtq-queer-guide-diverse-gender-transgendernonbinary-ryle/ ebookmass.com
Modern Control: State-Space Analysis and Design Methods
Arie Nakhmani
https://ebookmass.com/product/modern-control-state-space-analysis-anddesign-methods-arie-nakhmani/
ebookmass.com
Origen and Prophecy: Fate, Authority, Allegory, and the Structure of Scripture Claire Hall
https://ebookmass.com/product/origen-and-prophecy-fate-authorityallegory-and-the-structure-of-scripture-claire-hall/
ebookmass.com
American Mermaid: A Novel Julia Langbein https://ebookmass.com/product/american-mermaid-a-novel-julia-langbein/
ebookmass.com
About This eBook ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site.
Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.
Computer Security Fundamentals Dr. Chuck Easttom
Computer Security Fundamentals, Fourth Edition Copyright © 2020 by Pearson Education, Inc.
All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.
ISBN-13: 978-0-13-577477-9
ISBN-10: 0-13-577477-2
Library of Congress control number: 2019908181
ScoutAutomatedPrintCode
Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.
Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation.
Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The author and the
publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose all such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.
Special Sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at corpsales@pearsoned.com or (800) 382-3419.
For government sales inquiries, please contact governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact intlcs@pearson.com.
Editor-in-Chief
Mark Taub
Product Line Manager
Brett Bartow
Senior Editor
James Manly
Development Editor
Christopher Cleveland
Managing Editor
Sandra Schroeder
Project Editor
Mandie Frank
Indexer
Erika Millen
Proofreader
Abigail Manheim
Technical Editor
Akhil Behl
Publishing Coordinator
Cindy Teeters
Designer
Chuti Prasertsith
Compositor
codeMantra
Credits Figure Number Attribution/Credit Line
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
Figure 2-6
Figure 2-7
Figure 2-8
Figure 2-9
Figure 3-1
Figure 3-2
Figure 3-3
Figure 3-4
Figure 3-5
Figure 4-1
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of Command prompt ©
Microsoft 2019
Screenshot of windows © Microsoft 2019
Screenshot of windows © Microsoft 2019
Screenshot of windows © Microsoft 2019
Screenshot of windows © Microsoft 2019
Screenshot of windows © Microsoft 2019
Screenshot of Command prompt © Microsoft 2019
Figure Number
Figure 4-2
Figure 4-3
Figure 5-1
Figure 5-2
Figure 5-3
Figure 5-4
Figure 5-5
Figure 5-6
Figure 5-7
Figure 5-8
Figure 5-9
Figure 5-10
Figure 5-11
Figure 6-1
Figure 6-2
Figure 6-3
Figure 6-4
Attribution/Credit Line
Screenshot of LOIC © Praetox Technologies
Screenshot of XOIC © Praetox Technologies
Screenshot of Command prompt © Microsoft 2019
Screenshot of Counterexploitation © CEXX.ORG
Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.
Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.
Screenshot of SpywareGuide © 2003-2011, Actiance, Inc.
Screenshot of Norton Security © 1995 - 2019 Symantec Corporation
Screenshot of McAfee AntiVirus © 2019 McAfee, LLC
Screenshot of Avast © 1988-2019
Copyright Avast Software s.r.o
Screenshot of AVG © 1988-2019
Copyright Avast Software s.r.o
Screenshot of Malwarebytes © 2019 Malwarebytes
Screenshot of Windows © Microsoft 2019
Screenshot of Netcraft © 1995-2019 Netcraft Ltd
Screenshot of WayBackMachine BETA © Internet Archive
Screenshot of Zenmap © NMAP.ORG
Screenshot of Cain © Cain and Abel
Figure Number
Figure 6-5
Figure 6-6
Figure 6-8
Figure 6-9
Figure 6-11
Figure 6-12
Attribution/Credit Line
Screenshot of Shodan © 2013-2019
Shodan
Screenshot of Shodan © 2013-2019 Shodan
Screenshot of OphCrack © 2019 Slashdot Media
Screenshot of TeraBIT Virus Maker © TeraBIT Virus Maker
Screenshot of Yahoo © 2019 Verizon Media
Screenshot of Peoples Drug Store © 2019 Digital Pharmacist Inc.
Figure 7-2 New Africa/Shutterstock
Figure 7-4 Reed Kaestner/Getty Images
Figure 7-5
Figure 7-6
Screenshot of VeraCrypt © IDRIX
Screenshot of windows © Microsoft 2019
Figure 8-2 Chuck Easttom
Figure 9-1
Figure 9-2
Figure 9-7
Figure 11-1
Figure 11-2
Figure 11-4
Figure 11-5
Screenshot of Windows 10 Firewall © Microsoft 2019
Screenshot of Snort Installation © 2019 Cisco
Screenshot of Windows-style library © Microsoft 2019
Screenshot of Shutting Down a Service in Windows © Microsoft 2019
Screenshot of Disabled services © Microsoft 2019
Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019
Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019
Figure Number
Figure 11-6
Figure 11-7
Figure 11-8
Figure 11-9
Figure 11-10
Figure 11-11
Figure 11-12
Figure 11-13
Figure 11-14
Figure 11-15
Attribution/Credit Line
Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019
Screenshot of Nessus © 2019 Tenable
Screenshot of Nessus © 2019 Tenable
Screenshot of Nessus © 2019 Tenable
Screenshot of Nessus © 2019 Tenable
Screenshot of Nessus © 2019 Tenable
Screenshot of OWASP ZAP © OWASP
Screenshot of OWASP ZAP © OWASP
Screenshot of shodan © 2013-2019 Shodan®
Screenshot of shodan © 2013-2019 Shodan®
Figure 12-1 Dan Grytsku/123RF
Figure 12-2
Figure 12-3
Figure 12-4
Figure 12-5
Figure 12-6
Figure 12-7
Figure 12-8
Screenshot of Sinn Fein © Sinn Féin
Screenshot of BBC News © 2019 BBC
Screenshot of Cyberterrorism Preparedness Act
Screenshot of Cyberterrorism Preparedness Act
Screenshot of Tech Law Journal
Screenshot of The Peoples drug store
Screenshot of ccPal Store
Figure Number Attribution/Credit Line
Figure 13-1
Figure 13-2
Figure 13-3
Figure 13-4
Figure 13-6
Figure 13-7
Figure 13-8
Figure 13-9
Figure 14-1
Figure 14-2
Figure 14-3
Figure 14-4
Figure 14-5
Figure 14-6
Screenshot of Yahoo © 2019 Verizon Media
Screenshot of Yahoo © 2019 Verizon Media
Screenshot of Yahoo © 2019 Verizon Media
Screenshot of Infobel © 1995 - 2019 Kapitol
Screenshot of Federal Bureau of Investigation
Screenshot of Texas Department of Public Safety © 2000- 2019 Texas Department of Public Safety.
Screenshot of Oklahoma
Screenshot of Google access ©2019 Google
Screenshot of FTK Imager © Copyright 2019 AccessData
Screenshot of FTK Imager © Copyright 2019 AccessData
Screenshot of FTK Imager © Copyright 2019 AccessData
Screenshot of FTK Imager © Copyright 2019 AccessData
Screenshot of FTK Imager © Copyright 2019 AccessData
Screenshot of OSForensics
Copyright © 2019 PassMark® Software
Screenshot of OSForensics
Figure 14-7
Copyright © 2019 PassMark® Software
Figure Number Attribution/Credit Line
Figure 14-8
Figure 14-9
Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC
Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC
Figure 14-10 pio3/Shutterstock
Screenshot of OSForensics
Figure 14-11
Figure 14-12
Figure 14-13
Figure 14-14
Figure 14-15
Figure 14-16
Figure 14-17
Figure 15-10
Copyright © 2019 PassMark® Software
Screenshot of Command Prompt © Microsoft 2019
Screenshot of Command Prompt © Microsoft 2019
Screenshot of Command Prompt © Microsoft 2019
Screenshot of Command Prompt © Microsoft 2019
Screenshot of Windows registry © Microsoft 2019
Screenshot of Windows registry © Microsoft 2019
Screenshot of Microsoft Excel © Microsoft 2019
Cover gintas77/Shutterstock
Contents at a Glance Table of Contents Introduction
Chapter 1: Introduction to Computer Security
Introduction
How Seriously Should You Take Threats to Network Security?
Identifying Types of Threats
Malware
Compromising System Security
DoS Attacks
Web Attacks
Session Hijacking
Insider Threats
DNS Poisoning
New Attacks
Assessing the Likelihood of an Attack on Your Network
Basic Security Terminology
Hacker Slang
Professional Terms
Concepts and Approaches
How Do Legal Issues Impact Network Security?
Online Security Resources
CERT
Microsoft Security Advisor
F-Secure
SANS Institute
Summary
Test Your Skills
Chapter 2: Networks and the Internet
Introduction
Network Basics
The Physical Connection: Local Networks
Faster Connection Speeds
Wireless
Bluetooth
Other Wireless Protocols
Data Transmission
How the Internet Works
IP Addresses
Uniform Resource Locators
What Is a Packet?
Basic Communications
History of the Internet
Basic Network Utilities
IPConfig
Ping
Tracert
Netstat
NSLookup
ARP
Route
Other Network Devices
Advanced Network Communications Topics
The OSI Model
Media Access Control (MAC) Addresses
Summary
Test Your Skills
Chapter 3: Cyber Stalking, Fraud, and Abuse
Introduction
How Internet Fraud Works
Investment Offers
Auction Fraud
Identity Theft
Phishing
Cyber Stalking
Real Cyber Stalking Cases
How to Evaluate Cyber Stalking
Crimes Against Children
Laws About Internet Fraud
Protecting Yourself Against Cybercrime
Protecting Against Investment Fraud
Protecting Against Identity Theft
Secure Browser Settings
Protecting Against Auction Fraud
Protecting Against Online Harassment
Summary
Test Your Skills
Chapter 4: Denial of Service Attacks
Introduction
DoS Attacks
Illustrating an Attack
Distributed Reflection Denial of Service Attacks
Common Tools Used for DoS Attacks
Low Orbit Ion Cannon
XOIC
TFN and TFN2K
Stacheldraht
DoS Weaknesses
Specific DoS Attacks
TCP SYN Flood Attacks
Smurf IP Attacks
UDP Flood Attacks
ICMP Flood Attacks
The Ping of Death
Teardrop Attacks
DHCP Starvation
HTTP POST DoS Attacks
PDoS Attacks
Registration DoS Attacks
Login DoS Attacks
Land Attacks
DDoS Attacks
Real-World Examples of DoS Attacks
Boston Globe Attack
Memcache Attacks
MyDoom
DDoS Blackmail
Mirai
How to Defend Against DoS Attacks
Summary
Test Your Skills
Chapter 5: Malware
Introduction
Viruses
How a Virus Spreads
Types of Viruses
Virus Examples
The Impact of Viruses
Rules for Avoiding Viruses
Trojan Horses
The Buffer-Overflow Attack
The Sasser Virus/Buffer Overflow
Spyware
Legal Uses of Spyware
How Is Spyware Delivered to a Target System?
Obtaining Spyware Software
Other Forms of Malware
Rootkits
Malicious Web-Based Code
Logic Bombs
Spam
Advanced Persistent Threats
Detecting and Eliminating Viruses and Spyware
Antivirus Software
Remediation Steps
Summary
Test Your Skills
Chapter 6: Techniques Used by Hackers
Introduction
Basic Terminology
The Reconnaissance Phase
Passive Scanning Techniques
Active Scanning Techniques
Actual Attacks
SQL Script Injection
Cross-Site Scripting
Cross-Site Request Forgery
Directory Traversal
Cookie Poisoning
URL Hijacking
Wireless Attacks
Cell Phone Attacks
Password Cracking
Malware Creation
Windows Hacking Techniques
Penetration Testing
NIST 800-115
The NSA Information Assessment Methodology
PCI Penetration Testing Standard
The Dark Web
Summary
Test Your Skills
Chapter 7: Industrial Espionage in Cyberspace
Introduction
What Is Industrial Espionage?
Information as an Asset
Real-World Examples of Industrial Espionage
Example 1: Houston Astros
Example 2: University Trade Secrets
Example 3: Nuclear Secrets
Example 4: Uber
Example 5: Foreign Governments and Economic Espionage
Trends in Industrial Espionage
Industrial Espionage and You
How Does Espionage Occur?
Low-Tech Industrial Espionage
Spyware Used in Industrial Espionage
Steganography Used in Industrial Espionage
Phone Taps and Bugs
Protecting Against Industrial Espionage
The Industrial Espionage Act
Spear Phishing
Summary
Test Your Skills
Chapter 8: Encryption
Introduction
Cryptography Basics
History of Encryption
The Caesar Cipher
Atbash
Multi-Alphabet Substitution
Rail Fence
Enigma
Binary Operations
Modern Cryptography Methods
Single-Key (Symmetric) Encryption
Modification of Symmetric Methods
Public Key (Asymmetric) Encryption
PGP
Legitimate Versus Fraudulent Encryption Methods
Digital Signatures
Hashing
MAC
Rainbow Tables
Steganography
Historical Steganography
Steganography Methods and Tools
Cryptanalysis
Frequency Analysis
Modern Cryptanalysis Methods
Cryptography Used on the Internet
Quantum Computing Cryptography
Summary
Test Your Skills
Chapter 9: Computer Security Technology
Introduction
Virus Scanners
How Does a Virus Scanner Work?
Virus-Scanning Techniques
Commercial Antivirus Software
Firewalls
Benefits and Limitations of Firewalls
Firewall Types and Components
Firewall Configurations
Commercial and Free Firewall Products
Firewall Logs
Antispyware
IDSs
IDS Categorization
Identifying an Intrusion
IDS Elements
Snort
Honey Pots
Database Activity Monitoring
Other Preemptive Techniques
Authentication
Digital Certificates
SSL/TLS
Virtual Private Networks
Point-to-Point Tunneling Protocol
Layer 2 Tunneling Protocol
IPsec
Wi-Fi Security
Wired Equivalent Privacy
Wi-Fi Protected Access
WPA2
WPA3
Summary
Test Your Skills
Chapter 10: Security Policies
Introduction
What Is a Policy?
ISO 17999
Defining User Policies
Passwords
Internet Use
Email Usage
Installing/Uninstalling Software
Instant Messaging
Desktop Configuration
Bring Your Own Device
Final Thoughts on User Policies
Defining System Administration Policies
New Employees
Departing Employees
Change Requests
Security Breaches
Virus Infection
DoS Attacks
Intrusion by a Hacker
Defining Access Control
Development Policies
Standards, Guidelines, and Procedures
Data Classification
DoD Clearances
Disaster Recovery
Disaster Recovery Plan
Business Continuity Plan
Impact Analysis
Disaster Recovery and Business Continuity Standards
Fault Tolerance
Important Laws
HIPAA
Sarbanes-Oxley
Payment Card Industry Data Security Standards
Summary
Test Your Skills
Chapter 11: Network Scanning and Vulnerability Scanning
Introduction
Basics of Assessing a System
Patch
Ports
Protect
Policies
Probe
Physical
Securing Computer Systems
Securing an Individual Workstation
Securing a Server
Securing a Network
Scanning Your Network
MBSA
NESSUS
OWASP Zap
Shodan
Getting Professional Help
Summary
Test Your Skills
Chapter 12: Cyber Terrorism and Information Warfare
Introduction
Actual Cases of Cyber Terrorism
The Chinese Eagle Union
China’s Advanced Persistent Threat
India and Pakistan
Russian Hackers
Weapons of Cyber Warfare
Stuxnet
Flame
StopGeorgia.ru Malware
FinFisher
BlackEnergy
NSA ANT Catalog
Economic Attacks
Military Operations Attacks
General Attacks
Supervisory Control and Data Acquisitions (SCADA)
Information Warfare
Propaganda
Information Control
Disinformation
Actual Cases
Future Trends
Positive Trends
Negative Trends
Defense Against Cyber Terrorism
Terrorist Recruiting and Communication
TOR and the Dark Web
Summary
Test Your Skills
Chapter 13: Cyber Detective
Introduction
General Searches
Facebook
Court Records and Criminal Checks
Sex Offender Registries
Civil Court Records
Other Resources
Usenet
Summary
Test Your Skills
Chapter 14: Introduction to Forensics
Introduction
General Guidelines
Don’t Touch the Suspect Drive
Image a Drive with Forensic Toolkit
Can You Ever Conduct Forensics on a Live Machine?
Document Trail
Secure the Evidence
Chain of Custody
FBI Forensics Guidelines
U.S. Secret Service Forensics Guidelines
EU Evidence Gathering
Scientific Working Group on Digital Evidence
Locard’s Principle of Transference
Tools
Finding Evidence on the PC
Finding Evidence in the Browser
Finding Evidence in System Logs
Windows Logs
Linux Logs
Getting Back Deleted Files
Operating System Utilities
net sessions
openfiles
fc
netstat
The Windows Registry
Specific Entries
Mobile Forensics: Cell Phone Concepts
Cell Concepts Module
Cellular Networks
iOS