Foreword |
|
xxvii | |
Introduction |
|
xxix | |
|
Chapter 1 Measuring and Weighing Risk |
|
|
1 | (44) |
|
|
3 | (16) |
|
Computing Risk Assessment |
|
|
4 | (5) |
|
Acting on Your Risk Assessment |
|
|
9 | (8) |
|
Risks Associated with Cloud Computing |
|
|
17 | (2) |
|
Risks Associated with Visualization |
|
|
19 | (1) |
|
Developing Policies, Standards, and Guidelines |
|
|
19 | (20) |
|
|
20 | (6) |
|
Understanding Control Types and False Positives/Negatives |
|
|
26 | (2) |
|
Risk Management Best Practices |
|
|
28 | (8) |
|
|
36 | (3) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (2) |
|
|
41 | (4) |
|
Chapter 2 Monitoring and Diagnosing Networks |
|
|
45 | (26) |
|
|
46 | (6) |
|
|
46 | (6) |
|
|
52 | (8) |
|
|
52 | (4) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
61 | (2) |
|
Continuous Security Monitoring |
|
|
61 | (1) |
|
Setting a Remediation Policy |
|
|
62 | (1) |
|
Reporting Security Issues |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Differentiating between Detection Controls and Prevention Controls |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (4) |
|
Chapter 3 Understanding Devices and Infrastructure |
|
|
71 | (58) |
|
|
73 | (14) |
|
|
74 | (1) |
|
Working with the TCP/IP Suite |
|
|
74 | (4) |
|
|
78 | (1) |
|
Understanding Encapsulation |
|
|
79 | (1) |
|
Working with Protocols and Services |
|
|
80 | (7) |
|
Designing a Secure Network |
|
|
87 | (8) |
|
|
87 | (2) |
|
|
89 | (1) |
|
Virtual Local Area Networks |
|
|
89 | (3) |
|
|
92 | (1) |
|
Network Address Translation |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Understanding the Various Network Infrastructure Devices |
|
|
95 | (27) |
|
|
96 | (4) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
VPNs and VPN Concentrators |
|
|
103 | (2) |
|
Intrusion Detection Systems |
|
|
105 | (1) |
|
Understanding Intrusion Detection Systems |
|
|
106 | (4) |
|
|
110 | (1) |
|
Working with a Network-Based IDS |
|
|
111 | (5) |
|
Working with a Host-Based IDS |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (3) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (5) |
|
Chapter 4 Access Control, Authentication, and Authorization |
|
|
129 | (38) |
|
Understanding Access Control Basics |
|
|
131 | (11) |
|
Identification vs. Authentication |
|
|
131 | (1) |
|
Authentication (Single Factor) and Authorization |
|
|
132 | (1) |
|
Multifactor Authentication |
|
|
133 | (1) |
|
Layered Security and Defense in Depth |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
Potential Authentication and Access Problems |
|
|
136 | (1) |
|
Authentication Issues to Consider |
|
|
137 | (2) |
|
|
139 | (1) |
|
Account Policy Enforcement |
|
|
139 | (2) |
|
Users with Multiple Accounts/Roles |
|
|
141 | (1) |
|
Generic Account Prohibition |
|
|
142 | (1) |
|
Group-based and User-assigned Privileges |
|
|
142 | (1) |
|
Understanding Remote Access Connectivity |
|
|
142 | (5) |
|
Using the Point-to-Point Protocol |
|
|
143 | (1) |
|
Working with Tunneling Protocols |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
Understanding Authentication Services |
|
|
147 | (3) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Single Sign-On Initiatives |
|
|
149 | (1) |
|
Understanding Access Control |
|
|
150 | (2) |
|
|
151 | (1) |
|
Discretionary Access Control |
|
|
151 | (1) |
|
Role-Based Access Control |
|
|
152 | (1) |
|
Rule-Based Access Control |
|
|
152 | (1) |
|
Implementing Access Controlling Best Practices |
|
|
152 | (9) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Flood Guards and Loop Protection |
|
|
158 | (1) |
|
Preventing Network Bridging |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Secure Router Configuration |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (4) |
|
Chapter 5 Protecting Wireless Networks |
|
|
167 | (28) |
|
Working with Wireless Systems |
|
|
169 | (5) |
|
IEEE 802.11x Wireless Protocols |
|
|
169 | (2) |
|
|
171 | (2) |
|
Wireless Transport Layer Security |
|
|
173 | (1) |
|
Understanding Wireless Devices |
|
|
174 | (9) |
|
|
175 | (6) |
|
Extensible Authentication Protocol |
|
|
181 | (1) |
|
Lightweight Extensible Authentication Protocol |
|
|
182 | (1) |
|
Protected Extensible Authentication Protocol |
|
|
182 | (1) |
|
Wireless Vulnerabilities to Know |
|
|
183 | (5) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (5) |
|
Chapter 6 Securing the Cloud |
|
|
195 | (18) |
|
Working with Cloud Computing |
|
|
196 | (5) |
|
Software as a Service (SaaS) |
|
|
197 | (1) |
|
Platform as a Service (PaaS) |
|
|
198 | (1) |
|
Infrastructure as a Service (IaaS) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Working with Virtualization |
|
|
201 | (4) |
|
|
203 | (1) |
|
|
203 | (1) |
|
Host Availability/Elasticity |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (5) |
|
Chapter 7 Host, Data, and Application Security |
|
|
213 | (30) |
|
|
215 | (5) |
|
Databases and Technologies |
|
|
215 | (3) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Application Configuration Baselining |
|
|
219 | (1) |
|
Operating System Patch Management |
|
|
220 | (1) |
|
Application Patch Management |
|
|
220 | (1) |
|
|
220 | (13) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (5) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (2) |
|
Protecting Data Through Fault Tolerance |
|
|
233 | (2) |
|
|
233 | (1) |
|
|
234 | (1) |
|
Clustering and Load Balancing |
|
|
235 | (1) |
|
|
235 | (1) |
|
Best Practices for Security |
|
|
236 | (2) |
|
|
236 | (1) |
|
Hardware-Based Encryption Devices |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (4) |
|
|
243 | (54) |
|
An Overview of Cryptography |
|
|
245 | (4) |
|
|
245 | (4) |
|
|
249 | (9) |
|
Working with Symmetric Algorithms |
|
|
249 | (2) |
|
Working with Asymmetric Algorithms |
|
|
251 | (3) |
|
What Cryptography Should You Use? |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Understanding Quantum Cryptography |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
Using Cryptographic Systems |
|
|
258 | (5) |
|
Confidentiality and Strength |
|
|
259 | (1) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
Understanding Cryptography Standards and Protocols |
|
|
263 | (15) |
|
The Origins of Encryption Standards |
|
|
263 | (3) |
|
Public-Key Infrastructure X.509 /Public-Key Cryptography Standards |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (2) |
|
Certificate Management Protocols |
|
|
270 | (1) |
|
Secure Multipurpose Internet Mail Extensions |
|
|
270 | (1) |
|
Secure Electronic Transaction |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (2) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
274 | (3) |
|
|
277 | (1) |
|
Federal Information Processing Standard |
|
|
278 | (1) |
|
Using Public-Key Infrastructure |
|
|
278 | (13) |
|
Using a Certificate Authority |
|
|
279 | (1) |
|
Working with Registration Authorities and Local Registration Authorities |
|
|
280 | (1) |
|
Implementing Certificates |
|
|
281 | (4) |
|
Understanding Certificate Revocation |
|
|
285 | (1) |
|
Implementing Trust Models |
|
|
285 | (5) |
|
Hardware-Based Encryption Devices |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
291 | (2) |
|
|
293 | (4) |
|
Chapter 9 Malware, Vulnerabilities, and Threats |
|
|
297 | (56) |
|
|
300 | (10) |
|
|
310 | (8) |
|
Symptoms of a Virus Infection |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (4) |
|
Managing Spam to Avoid Viruses |
|
|
316 | (1) |
|
|
317 | (1) |
|
Understanding Various Types of Attacks |
|
|
318 | (16) |
|
Identifying Denial-of-Service and Distributed Denial-of-Service Attacks |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Phishing, Spear Phishing, and Vishing |
|
|
323 | (1) |
|
|
324 | (1) |
|
Man-in-the-Middle Attacks |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (2) |
|
|
328 | (4) |
|
Malicious Insider Threats |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Typo Squatting and URL Hijacking |
|
|
333 | (1) |
|
|
334 | (1) |
|
Identifying Types of Application Attacks |
|
|
334 | (7) |
|
Cross-Site Scripting and Forgery |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
Directory Traversal/Command Injection |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Locally Shared Objects and Flash Cookies |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
Arbitrary Code and Remote Code Execution |
|
|
341 | (1) |
|
Tools for Finding Threats |
|
|
341 | (5) |
|
Interpreting Assessment Results |
|
|
341 | (1) |
|
|
342 | (2) |
|
Risk Calculations and Assessment Types |
|
|
344 | (2) |
|
|
346 | (1) |
|
|
346 | (2) |
|
|
348 | (5) |
|
Chapter 10 Social Engineering and Other Foes |
|
|
353 | (42) |
|
Understanding Social Engineering |
|
|
355 | (11) |
|
Types of Social Engineering Attacks |
|
|
356 | (5) |
|
What Motivates an Attack? |
|
|
361 | (1) |
|
The Principles Behind Social Engineering |
|
|
362 | (1) |
|
Social Engineering Attack Examples |
|
|
363 | (3) |
|
Understanding Physical Security |
|
|
366 | (11) |
|
Hardware Locks and Security |
|
|
369 | (2) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
377 | (7) |
|
|
378 | (1) |
|
|
378 | (2) |
|
|
380 | (2) |
|
|
382 | (1) |
|
|
383 | (1) |
|
Temperature and Humidity Controls |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (4) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (2) |
|
|
391 | (4) |
|
Chapter 11 Security Administration |
|
|
395 | (34) |
|
|
397 | (2) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Understanding Security Awareness and Training |
|
|
399 | (10) |
|
Communicating with Users to Raise Awareness |
|
|
399 | (1) |
|
Providing Education and Training |
|
|
399 | (2) |
|
|
401 | (1) |
|
|
402 | (7) |
|
|
409 | (4) |
|
|
410 | (1) |
|
|
411 | (2) |
|
Information Access Controls |
|
|
413 | (1) |
|
|
413 | (1) |
|
Complying with Privacy and Security Regulations |
|
|
414 | (4) |
|
The Health Insurance Portability and Accountability Act |
|
|
415 | (1) |
|
The Gramm-Leach-Bliley Act |
|
|
415 | (1) |
|
The Computer Fraud and Abuse Act |
|
|
416 | (1) |
|
The Family Educational Rights and Privacy Act |
|
|
416 | (1) |
|
The Computer Security Act of 1987 |
|
|
416 | (1) |
|
The Cyberspace Electronic Security Act |
|
|
417 | (1) |
|
The Cyber Security Enhancement Act |
|
|
417 | (1) |
|
|
417 | (1) |
|
Familiarizing Yourself with International Efforts |
|
|
418 | (1) |
|
|
418 | (2) |
|
|
419 | (1) |
|
Alternative Methods to Mitigate Security Risks |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
422 | (2) |
|
|
424 | (5) |
|
Chapter 12 Disaster Recovery and Incident Response |
|
|
429 | (38) |
|
Issues Associated with Business Continuity |
|
|
431 | (24) |
|
Types of Storage Mechanisms |
|
|
432 | (1) |
|
Crafting a Disaster-Recovery Plan |
|
|
433 | (12) |
|
Incident Response Policies |
|
|
445 | (1) |
|
Understanding Incident Response |
|
|
446 | (8) |
|
|
454 | (1) |
|
|
454 | (1) |
|
Reinforcing Vendor Support |
|
|
455 | (3) |
|
|
455 | (2) |
|
|
457 | (1) |
|
|
458 | (2) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (5) |
|
Appendix A Answers to Review Questions |
|
|
467 | (16) |
|
Chapter 1 Measuring and Weighing Risk |
|
|
468 | (1) |
|
Chapter 2 Monitoring and Diagnosing Networks |
|
|
469 | (1) |
|
Chapter 3 Understanding Devices and Infrastructure |
|
|
470 | (1) |
|
Chapter 4 Access Control, Authentication, and Authorization |
|
|
471 | (2) |
|
Chapter 5 Protecting Wireless Networks |
|
|
473 | (1) |
|
Chapter 6 Securing the Cloud |
|
|
474 | (1) |
|
Chapter 7 Host, Data, and Application Security |
|
|
475 | (1) |
|
|
476 | (1) |
|
Chapter 9 Malware, Vulnerabilities, and Threats |
|
|
477 | (1) |
|
Chapter 10 Social Engineering and Other Foes |
|
|
478 | (2) |
|
Chapter 11 Security Administration |
|
|
480 | (1) |
|
Chapter 12 Disaster Recovery and Incident Response |
|
|
481 | (2) |
|
Appendix B Labs, Questions, and Exam Preparation Miscellany |
|
|
483 | (86) |
|
|
485 | (32) |
|
|
485 | (1) |
|
Choose Problem Reporting Defaults |
|
|
485 | (1) |
|
Open the Add/Remove Programs Applet |
|
|
485 | (1) |
|
|
485 | (1) |
|
Remove All Currently Allowed Pop-ups |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
Allow Remote Desktop Connections |
|
|
487 | (1) |
|
|
488 | (1) |
|
MISC: Fire Extinguisher Types |
|
|
488 | (1) |
|
|
488 | (1) |
|
Open the Security Center Applet |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
MISC: Identify the Tool #1 |
|
|
490 | (1) |
|
Generate a System Health Report |
|
|
491 | (1) |
|
Change Permissions for a File |
|
|
491 | (1) |
|
|
492 | (1) |
|
Open the System Configuration Utility |
|
|
492 | (1) |
|
Turn On the SmartScreen Filter |
|
|
492 | (1) |
|
Prevent Sites from Knowing Your Location |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
View Configuration for a Service |
|
|
496 | (1) |
|
View Current Audit Policy |
|
|
497 | (1) |
|
|
497 | (1) |
|
MISC: Identify the Tool #2 |
|
|
497 | (1) |
|
Change Ownership on a File |
|
|
498 | (1) |
|
|
498 | (1) |
|
Configure Program Compatibility |
|
|
498 | (1) |
|
Configure Immediate Deletion |
|
|
499 | (1) |
|
Change the Registered Organization for Windows |
|
|
499 | (1) |
|
|
499 | (1) |
|
Allow Pop-Ups from a Site |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
Open a Port in Windows Firewall |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
Open the System Properties |
|
|
502 | (1) |
|
View Group Policy Settings |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
Call Up the Security Policy Manager |
|
|
503 | (1) |
|
MISC: Identify the Tool #3 |
|
|
503 | (1) |
|
View Effective Permissions for a File |
|
|
503 | (1) |
|
Create a Quota on Disk Space |
|
|
504 | (1) |
|
|
504 | (1) |
|
Choose Firewall Notifications |
|
|
504 | (1) |
|
MISC: Identify the Tool #4 |
|
|
504 | (1) |
|
Turn Off Windows Firewall |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
View All Processes Currently Running |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
510 | (1) |
|
Enable Shutdown Without Login |
|
|
510 | (1) |
|
Open System Configuration Editor |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (1) |
|
Change Notification Settings |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
512 | (1) |
|
Backup and Recover Passwords |
|
|
513 | (1) |
|
MISC: Identify the Tool #5 |
|
|
513 | (1) |
|
MISC: Identify the Tool #6 |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
Reduce the Number of Recently Used Programs |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
516 | (1) |
|
Configure Sharing of a Folder |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
517 | (52) |
|
See Hidden Shares: Answer |
|
|
517 | (1) |
|
Choose Problem Reporting Defaults: Answer |
|
|
517 | (1) |
|
Open the Add/Remove Programs Applet: Answer |
|
|
518 | (1) |
|
|
518 | (1) |
|
Remove All Currently Allowed Pop-ups: Answer |
|
|
518 | (1) |
|
Synchronize Files: Answer |
|
|
519 | (1) |
|
Configure the Crash File: Answer |
|
|
519 | (1) |
|
Limit Computer Time: Answer |
|
|
520 | (1) |
|
|
520 | (1) |
|
Allow Remote Desktop Connections: Answer |
|
|
521 | (1) |
|
Display Statistics: Answer |
|
|
522 | (1) |
|
MISC: Fire Extinguisher Types: Answer |
|
|
522 | (1) |
|
Restore Connections: Answer |
|
|
523 | (1) |
|
Open the Security Center Applet: Answer |
|
|
523 | (1) |
|
Identify the Issue #1: Answer |
|
|
523 | (1) |
|
Display All Information: Answer |
|
|
524 | (1) |
|
MISC: Compute CIDR #1: Answer |
|
|
524 | (1) |
|
Turn On the Archive Bit: Answer |
|
|
525 | (1) |
|
Repair Damaged Files: Answer |
|
|
525 | (1) |
|
MISC: Identify the Tool #1: Answer |
|
|
525 | (1) |
|
Generate a System Health Report: Answer |
|
|
526 | (1) |
|
Change Permissions for a File: Answer |
|
|
527 | (1) |
|
Create a Legal Notice: Answer |
|
|
528 | (1) |
|
Open the System Configuration Utility: Answer |
|
|
529 | (1) |
|
Turn On the SmartScreen Filter: Answer |
|
|
529 | (1) |
|
Prevent Sites from Knowing Your Location: Answer |
|
|
530 | (23) |
|
MISC: Compute CIDR #2: Answer |
|
|
553 | (1) |
|
Summon the Event Viewer: Answer |
|
|
553 | (1) |
|
Identify the Issue #4: Answer |
|
|
553 | (1) |
|
Enable ReadyBoost: Answer |
|
|
554 | (1) |
|
Encrypt Folder Contents: Answer |
|
|
555 | (1) |
|
Clear Index Scores: Answer |
|
|
555 | (1) |
|
Turn On BitLocker: Answer |
|
|
556 | (1) |
|
Turn Off All AutoPlay: Answer |
|
|
556 | (1) |
|
Choose Default Programs: Answer |
|
|
556 | (1) |
|
Enable Shutdown Without Login: Answer |
|
|
557 | (1) |
|
Open System Configuration Editor: Answer |
|
|
557 | (1) |
|
Override Cookie Handling: Answer |
|
|
558 | (1) |
|
|
559 | (1) |
|
Prohibit Remote Desktop: Answer |
|
|
559 | (1) |
|
|
560 | (1) |
|
Change Notification Settings: Answer |
|
|
560 | (1) |
|
Display Network Name: Answer |
|
|
561 | (1) |
|
|
561 | (1) |
|
Backup and Recover Passwords: Answer |
|
|
561 | (1) |
|
MISC: Identify the Tool #5: Answer |
|
|
562 | (1) |
|
MISC: Identify the Tool #6: Answer |
|
|
563 | (1) |
|
|
564 | (1) |
|
Identify the Issue #5: Answer |
|
|
564 | (1) |
|
Reduce the Number of Recently Used Programs: Answer |
|
|
565 | (1) |
|
|
566 | (1) |
|
Audit Views of a File: Answer |
|
|
566 | (1) |
|
Configure Sharing of a Folder: Answer |
|
|
567 | (1) |
|
Don't Display Last User: Answer |
|
|
567 | (2) |
|
Appendix C About the Companion CD |
|
|
569 | |
|
What You'll Find on the CD |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
572 | |
|
|
572 | |
Index |
|
573 | |
Introduction |
|
xxv | |
|
Chapter 1 Network Security |
|
|
1 | (68) |
|
1.1 Implement security configuration parameters on network devices and other technologies |
|
|
5 | (17) |
|
|
5 | (3) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (6) |
|
|
18 | (1) |
|
|
18 | (1) |
|
All-in-one security appliances |
|
|
19 | (1) |
|
Web application firewall vs. network firewall |
|
|
19 | (1) |
|
Application aware devices |
|
|
20 | (1) |
|
|
20 | (2) |
|
1.2 Given a scenario, use secure network administration principles |
|
|
22 | (5) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
Secure router configuration |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Unified Threat Management |
|
|
27 | (1) |
|
|
27 | (1) |
|
1.3 Explain network design elements and components |
|
|
27 | (13) |
|
|
27 | (2) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (2) |
|
Layered security / Defense in depth |
|
|
39 | (1) |
|
|
39 | (1) |
|
1.4 Given a scenario, implement common protocols and services |
|
|
40 | (16) |
|
|
40 | (11) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (3) |
|
1.5 Given a scenario, troubleshoot security issues related to wireless networking |
|
|
56 | (13) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (2) |
|
|
66 | (3) |
|
Chapter 2 Compliance and Operational Security |
|
|
69 | (86) |
|
2.1 Explain the importance of risk-related concepts |
|
|
76 | (16) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Importance of policies in reducing risk |
|
|
78 | (4) |
|
|
82 | (3) |
|
Quantitative vs. qualitative |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
Probability/threat likelihood |
|
|
87 | (1) |
|
Risk avoidance, transference, acceptance, mitigation, deterrence |
|
|
87 | (2) |
|
Risks associated with Cloud Computing and Virtualization |
|
|
89 | (1) |
|
Recovery time objective and recovery point objective |
|
|
89 | (1) |
|
|
90 | (2) |
|
2.2 Summarize the security implications of integrating systems and data with third parties |
|
|
92 | (4) |
|
On-boarding/off-boarding business partners |
|
|
92 | (1) |
|
Social media networks and/or applications |
|
|
93 | (1) |
|
Interoperability agreements |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
Unauthorized data sharing |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Follow security policy and procedures |
|
|
95 | (1) |
|
Review agreement requirements to verify compliance and performance standards |
|
|
95 | (1) |
|
|
95 | (1) |
|
2.3 Given a scenario, implement appropriate risk-mitigation strategies |
|
|
96 | (5) |
|
|
96 | (2) |
|
|
98 | (1) |
|
User rights and permissions reviews |
|
|
99 | (1) |
|
|
99 | (1) |
|
Enforce policies and procedures to prevent data loss or theft |
|
|
100 | (1) |
|
Enforce technology controls |
|
|
100 | (1) |
|
|
101 | (1) |
|
2.4 Given a scenario, implement basic forensic procedures |
|
|
101 | (5) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
Track man hours and expense |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
2.5 Summarize common incident response procedures |
|
|
106 | (5) |
|
|
106 | (1) |
|
|
106 | (1) |
|
Escalation and notification |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Recovery/reconstitution procedures |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
2.6 Explain the importance of security-related awareness and training |
|
|
111 | (12) |
|
Security policy training and procedures |
|
|
112 | (1) |
|
|
113 | (1) |
|
Personally identifiable information |
|
|
113 | (1) |
|
Information classification |
|
|
113 | (4) |
|
Data labeling, handling and disposal |
|
|
117 | (1) |
|
Compliance with laws, best practices, and standards |
|
|
118 | (1) |
|
|
118 | (2) |
|
New threats and new security trends/alerts |
|
|
120 | (1) |
|
Use of social networking and P2P |
|
|
121 | (1) |
|
Follow up and gather training metrics to validate compliance and security posture |
|
|
121 | (1) |
|
|
122 | (1) |
|
2.7 Compare and contrast physical security and environmental controls |
|
|
123 | (12) |
|
|
123 | (1) |
|
|
124 | (8) |
|
|
132 | (2) |
|
|
134 | (1) |
|
2.8 Summarize risk-management best practices |
|
|
135 | (13) |
|
Business continuity concepts |
|
|
136 | (6) |
|
|
142 | (2) |
|
Disaster recovery concepts |
|
|
144 | (2) |
|
|
146 | (2) |
|
2.9 Given a scenario, select the appropriate control to meet the goals of security |
|
|
148 | (7) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
Chapter 3 Threats and Vulnerabilities |
|
|
155 | (70) |
|
3.1 Explain types of malware |
|
|
161 | (6) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
3.2 Summarize various types of attacks |
|
|
167 | (17) |
|
|
168 | (1) |
|
|
168 | (2) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
DNS poisoning and ARP poisoning |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
179 | (2) |
|
Typo squatting/URL hijacking |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (2) |
|
3.3 Summarize social engineering attacks and the associated effectiveness with each attack |
|
|
184 | (4) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Principles (reasons for effectiveness) |
|
|
186 | (2) |
|
|
188 | (1) |
|
3.4 Explain types of wireless attacks |
|
|
188 | (6) |
|
|
189 | (1) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
3.5 Explain types of application attacks |
|
|
194 | (7) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Directory traversal/command injection |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
LSO (Locally Shared Objects) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Arbitrary code execution/remote code execution |
|
|
200 | (1) |
|
|
201 | (1) |
|
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques |
|
|
201 | (10) |
|
|
201 | (1) |
|
|
202 | (4) |
|
|
206 | (1) |
|
|
207 | (2) |
|
|
209 | (1) |
|
Detection controls vs. prevention controls |
|
|
210 | (1) |
|
|
211 | (1) |
|
3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities |
|
|
211 | (6) |
|
Interpret results of security assessment tools |
|
|
211 | (1) |
|
|
212 | (3) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
3.8 Explain the proper use of penetration testing versus vulnerability scanning |
|
|
217 | (8) |
|
|
217 | (3) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (2) |
|
Chapter 4 Application, Data, and Host Security |
|
|
225 | (42) |
|
4.1 Explain the importance of application security controls and techniques |
|
|
229 | (6) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Cross-site scripting prevention |
|
|
230 | (1) |
|
Cross-site Request Forgery (XSRF) prevention |
|
|
230 | (1) |
|
Application configuration baseline (proper settings) |
|
|
231 | (1) |
|
|
231 | (1) |
|
Application patch management |
|
|
231 | (1) |
|
NoSQL databases vs. SQL databases |
|
|
232 | (2) |
|
Server-side vs. Client-side validation |
|
|
234 | (1) |
|
|
234 | (1) |
|
4.2 Summarize mobile security concepts and technologies |
|
|
235 | (9) |
|
|
236 | (3) |
|
|
239 | (2) |
|
|
241 | (3) |
|
|
244 | (1) |
|
4.3 Given a scenario, select the appropriate solution to establish host security |
|
|
244 | (7) |
|
Operating system security and settings |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Whitelisting vs. blacklisting applications |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
Host-based intrusion detection |
|
|
247 | (1) |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
4.4 Implement the appropriate controls to ensure data security |
|
|
251 | (6) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (3) |
|
Hardware-based encryption devices |
|
|
254 | (1) |
|
Data in transit, Data at rest, Data in use |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
4.5 Compare and contrast alternative methods to mitigate security risks in static environments |
|
|
257 | (10) |
|
|
257 | (3) |
|
|
260 | (2) |
|
|
262 | (1) |
|
|
263 | (4) |
|
Chapter 5 Access Control and Identity Management |
|
|
267 | (32) |
|
5.1 Compare and contrast the function and purpose of authentication services |
|
|
270 | (5) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
5.2 Given a scenario, select the appropriate authentication, authorization, or access control |
|
|
275 | (14) |
|
Identification vs. authentication vs. authorization |
|
|
276 | (1) |
|
|
276 | (4) |
|
|
280 | (5) |
|
|
285 | (1) |
|
|
285 | (2) |
|
|
287 | (1) |
|
Transitive trust/authentication |
|
|
287 | (1) |
|
|
287 | (2) |
|
5.3 Install and configure security controls when performing account management, based on best practices |
|
|
289 | (10) |
|
Mitigate issues associated with users with multiple account/roles and/or shared accounts |
|
|
290 | (1) |
|
Account policy enforcement |
|
|
291 | (3) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (3) |
|
|
299 | (60) |
|
6.1 Given a scenario, utilize general cryptography concepts |
|
|
302 | (29) |
|
|
304 | (3) |
|
|
307 | (1) |
|
In-band vs. out-of-band key exchange |
|
|
308 | (1) |
|
Fundamental differences and encryption methods |
|
|
308 | (1) |
|
|
309 | (6) |
|
|
315 | (1) |
|
|
315 | (4) |
|
|
319 | (4) |
|
|
323 | (1) |
|
|
323 | (1) |
|
Use of proven technologies |
|
|
324 | (1) |
|
Elliptic curve and quantum cryptography |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (5) |
|
6.2 Given a scenario, use appropriate cryptographic methods |
|
|
331 | (13) |
|
WEP vs. WPA/WPA2 and preshared key |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
Comparative strengths and performance of algorithms |
|
|
340 | (1) |
|
Use of algorithms/protocols with transport encryption |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
6.3 Given a scenario, use appropriate PKI, certificate management, and associated components |
|
|
344 | (15) |
|
Certificate authorities and digital certificates |
|
|
344 | (6) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (1) |
|
|
351 | (2) |
|
|
353 | (3) |
|
|
356 | (3) |
|
Appendix A Answers to Review Questions |
|
|
359 | (8) |
|
Chapter 1 Network Security |
|
|
360 | (1) |
|
Chapter 2 Compliance and Operational Security |
|
|
360 | (1) |
|
Chapter 3 Threats and Vulnerabilities |
|
|
361 | (1) |
|
Chapter 4 Application, Data, and Host Security |
|
|
362 | (1) |
|
Chapter 5 Access Control and Identity Management |
|
|
363 | (1) |
|
|
364 | (3) |
|
Appendix B About the Additional Study Tools |
|
|
367 | (4) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (2) |
|
|
370 | (1) |
Index |
|
371 | |