| Introduction |
|
xxix | |
|
Chapter 1 Introduction to Computer Security |
|
|
2 | (32) |
|
|
|
2 | (2) |
|
How Seriously Should You Take Threats to Network Security? |
|
|
4 | (3) |
|
Identifying Types of Threats |
|
|
7 | (10) |
|
|
|
8 | (1) |
|
Compromising System Security |
|
|
9 | (1) |
|
|
|
10 | (1) |
|
|
|
11 | (2) |
|
|
|
13 | (1) |
|
|
|
14 | (1) |
|
|
|
15 | (1) |
|
|
|
16 | (1) |
|
Assessing the Likelihood of an Attack on Your Network |
|
|
17 | (1) |
|
Basic Security Terminology |
|
|
18 | (3) |
|
|
|
18 | (2) |
|
|
|
20 | (1) |
|
|
|
21 | (3) |
|
How Do Legal Issues Impact Network Security? |
|
|
24 | (1) |
|
Online Security Resources |
|
|
25 | (2) |
|
|
|
25 | (1) |
|
Microsoft Security Advisor |
|
|
26 | (1) |
|
|
|
26 | (1) |
|
|
|
26 | (1) |
|
|
|
27 | (7) |
|
Chapter 2 Networks and the Internet |
|
|
34 | (40) |
|
|
|
34 | (1) |
|
|
|
35 | (8) |
|
The Physical Connection: Local Networks |
|
|
35 | (3) |
|
|
|
38 | (1) |
|
|
|
39 | (1) |
|
|
|
40 | (1) |
|
|
|
41 | (1) |
|
|
|
41 | (2) |
|
|
|
43 | (7) |
|
|
|
43 | (5) |
|
Uniform Resource Locators |
|
|
48 | (1) |
|
|
|
49 | (1) |
|
|
|
50 | (1) |
|
|
|
50 | (2) |
|
|
|
52 | (7) |
|
|
|
52 | (1) |
|
|
|
53 | (2) |
|
|
|
55 | (1) |
|
|
|
56 | (1) |
|
|
|
56 | (1) |
|
|
|
56 | (1) |
|
|
|
57 | (1) |
|
|
|
58 | (1) |
|
|
|
59 | (1) |
|
Advanced Network Communications Topics |
|
|
60 | (1) |
|
|
|
60 | (1) |
|
|
|
61 | (1) |
|
Media Access Control (MAC) Addresses |
|
|
61 | (1) |
|
|
|
61 | (4) |
|
|
|
65 | (9) |
|
Chapter 3 Cyber Stalking, Fraud, and Abuse |
|
|
74 | (32) |
|
|
|
74 | (1) |
|
|
|
75 | (5) |
|
|
|
75 | (3) |
|
|
|
78 | (2) |
|
|
|
80 | (2) |
|
|
|
81 | (1) |
|
|
|
82 | (9) |
|
Real Cyber Stalking Cases |
|
|
83 | (4) |
|
How to Evaluate Cyber Stalking |
|
|
87 | (1) |
|
|
|
88 | (2) |
|
Laws About Internet Fraud |
|
|
90 | (1) |
|
Protecting Yourself Against Cybercrime |
|
|
91 | (8) |
|
Protecting Against Investment Fraud |
|
|
91 | (1) |
|
Protecting Against Identity Theft |
|
|
91 | (1) |
|
|
|
92 | (5) |
|
Protecting Against Auction Fraud |
|
|
97 | (1) |
|
Protecting Against Online Harassment |
|
|
98 | (1) |
|
|
|
99 | (7) |
|
Chapter 4 Denial of Service Attacks |
|
|
106 | (24) |
|
|
|
106 | (1) |
|
|
|
107 | (1) |
|
|
|
107 | (2) |
|
Distributed Reflection Denial of Service Attacks |
|
|
109 | (1) |
|
Common Tools Used for DoS Attacks |
|
|
109 | (3) |
|
|
|
109 | (1) |
|
|
|
110 | (1) |
|
|
|
111 | (1) |
|
|
|
111 | (1) |
|
|
|
112 | (1) |
|
|
|
112 | (8) |
|
|
|
112 | (3) |
|
|
|
115 | (1) |
|
|
|
116 | (1) |
|
|
|
117 | (1) |
|
|
|
117 | (1) |
|
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
118 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
Degradation of Service Attacks |
|
|
120 | (1) |
|
Challenge Collapsar Attack |
|
|
120 | (1) |
|
|
|
120 | (1) |
|
Real-World Examples of DoS Attacks |
|
|
120 | (1) |
|
|
|
120 | (1) |
|
|
|
120 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (1) |
|
|
|
121 | (1) |
|
How to Defend Against DoS Attacks |
|
|
121 | (2) |
|
|
|
123 | (7) |
|
|
|
130 | (36) |
|
|
|
130 | (1) |
|
|
|
131 | (11) |
|
|
|
131 | (1) |
|
|
|
132 | (1) |
|
|
|
133 | (7) |
|
|
|
140 | (1) |
|
Machine Learning and Malware |
|
|
140 | (1) |
|
Rules for Avoiding Viruses |
|
|
141 | (1) |
|
|
|
142 | (3) |
|
The Buffer-Overflow Attack |
|
|
145 | (1) |
|
The Sasser Virus/Buffer Overflow |
|
|
145 | (1) |
|
|
|
146 | (3) |
|
|
|
147 | (1) |
|
How Is Spyware Delivered to a Target System? |
|
|
147 | (1) |
|
|
|
147 | (1) |
|
Obtaining Spyware Software |
|
|
148 | (1) |
|
|
|
149 | (4) |
|
|
|
150 | (1) |
|
|
|
150 | (1) |
|
|
|
151 | (1) |
|
|
|
152 | (1) |
|
Advanced Persistent Threats |
|
|
152 | (1) |
|
|
|
152 | (1) |
|
Detecting and Eliminating Viruses and Spyware |
|
|
153 | (6) |
|
|
|
153 | (4) |
|
Anti-Malware and Machine Learning |
|
|
157 | (1) |
|
|
|
157 | (2) |
|
|
|
159 | (7) |
|
Chapter 6 Techniques Used by Hackers |
|
|
166 | (34) |
|
|
|
166 | (1) |
|
|
|
167 | (1) |
|
|
|
167 | (10) |
|
Passive Scanning Techniques |
|
|
167 | (2) |
|
Active Scanning Techniques |
|
|
169 | (8) |
|
|
|
177 | (7) |
|
|
|
177 | (2) |
|
|
|
179 | (1) |
|
Cross-Site Request Forgery |
|
|
180 | (1) |
|
|
|
180 | (1) |
|
|
|
180 | (1) |
|
|
|
180 | (1) |
|
|
|
181 | (1) |
|
|
|
181 | (1) |
|
|
|
181 | (1) |
|
|
|
182 | (2) |
|
|
|
184 | (3) |
|
Windows Hacking Techniques |
|
|
185 | (2) |
|
|
|
187 | (2) |
|
|
|
187 | (1) |
|
The NSA Information Assessment Methodology |
|
|
188 | (1) |
|
PCI Penetration Testing Standard |
|
|
189 | (1) |
|
|
|
189 | (5) |
|
|
|
194 | (6) |
|
Chapter 7 Industrial Espionage in Cyberspace |
|
|
200 | (26) |
|
|
|
200 | (2) |
|
What Is Industrial Espionage? |
|
|
202 | (1) |
|
|
|
203 | (2) |
|
Real-World Examples of Industrial Espionage |
|
|
205 | (2) |
|
|
|
206 | (1) |
|
Example 2 Company Versus Company |
|
|
206 | (1) |
|
Example 3 Nuclear Secrets |
|
|
206 | (1) |
|
|
|
206 | (1) |
|
Example 5 Foreign Governments and Economic Espionage |
|
|
207 | (1) |
|
Trends in Industrial Espionage |
|
|
207 | (1) |
|
Industrial Espionage and You |
|
|
207 | (1) |
|
How Does Espionage Occur? |
|
|
207 | (5) |
|
Low-Tech Industrial Espionage |
|
|
208 | (2) |
|
Spyware Used in Industrial Espionage |
|
|
210 | (1) |
|
Steganography Used in Industrial Espionage |
|
|
211 | (1) |
|
|
|
211 | (1) |
|
|
|
212 | (1) |
|
Protecting Against Industrial Espionage |
|
|
212 | (3) |
|
|
|
215 | (3) |
|
The Industrial Espionage Act |
|
|
218 | (1) |
|
|
|
219 | (1) |
|
|
|
220 | (6) |
|
|
|
226 | (42) |
|
|
|
226 | (1) |
|
|
|
227 | (1) |
|
|
|
228 | (8) |
|
|
|
229 | (1) |
|
|
|
230 | (1) |
|
Multi-Alphabet Substitution |
|
|
231 | (1) |
|
|
|
232 | (1) |
|
|
|
233 | (1) |
|
|
|
233 | (1) |
|
|
|
234 | (1) |
|
|
|
235 | (1) |
|
Modern Cryptography Methods |
|
|
236 | (9) |
|
Single-Key (Symmetric) Encryption |
|
|
237 | (6) |
|
Modification of Symmetric Methods |
|
|
243 | (2) |
|
Public Key (Asymmetric) Encryption |
|
|
245 | (5) |
|
|
|
250 | (1) |
|
Legitimate Versus Fraudulent Encryption Methods |
|
|
251 | (1) |
|
|
|
252 | (1) |
|
|
|
253 | (1) |
|
|
|
253 | (1) |
|
|
|
253 | (1) |
|
|
|
254 | (1) |
|
|
|
254 | (1) |
|
|
|
254 | (1) |
|
|
|
255 | (2) |
|
|
|
256 | (1) |
|
Steganography Methods and Tools |
|
|
257 | (1) |
|
|
|
257 | (2) |
|
|
|
258 | (1) |
|
Modern Cryptanalysis Methods |
|
|
258 | (1) |
|
Cryptography Used on the Internet |
|
|
259 | (1) |
|
Quantum Computing Cryptography |
|
|
259 | (2) |
|
|
|
261 | (7) |
|
Chapter 9 Computer Security Technology |
|
|
268 | (36) |
|
|
|
268 | (1) |
|
|
|
269 | (3) |
|
How Does a Virus Scanner Work? |
|
|
269 | (1) |
|
Virus-Scanning Techniques |
|
|
270 | (2) |
|
Commercial Antivirus Software |
|
|
272 | (1) |
|
|
|
272 | (6) |
|
Benefits and Limitations of Firewalls |
|
|
273 | (1) |
|
Firewall Types and Components |
|
|
273 | (1) |
|
|
|
274 | (2) |
|
|
|
276 | (1) |
|
Commercial and Free Firewall Products |
|
|
277 | (1) |
|
|
|
278 | (1) |
|
|
|
278 | (1) |
|
|
|
279 | (13) |
|
|
|
279 | (1) |
|
|
|
280 | (1) |
|
|
|
281 | (1) |
|
|
|
281 | (5) |
|
|
|
286 | (1) |
|
Database Activity Monitoring |
|
|
287 | (1) |
|
|
|
287 | (1) |
|
Other Preemptive Techniques |
|
|
288 | (1) |
|
|
|
288 | (4) |
|
|
|
292 | (1) |
|
|
|
293 | (3) |
|
|
|
296 | (2) |
|
Point-to-Point Tunneling Protocol |
|
|
296 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
296 | (1) |
|
|
|
297 | (1) |
|
|
|
298 | (1) |
|
|
|
298 | (1) |
|
|
|
298 | (1) |
|
|
|
298 | (1) |
|
|
|
298 | (1) |
|
|
|
299 | (5) |
|
Chapter 10 Security Policies |
|
|
304 | (32) |
|
|
|
304 | (1) |
|
|
|
305 | (1) |
|
|
|
305 | (3) |
|
|
|
305 | (1) |
|
|
|
306 | (1) |
|
|
|
306 | (1) |
|
|
|
307 | (1) |
|
|
|
307 | (1) |
|
|
|
308 | (8) |
|
|
|
309 | (1) |
|
|
|
310 | (1) |
|
|
|
311 | (1) |
|
Installing/Uninstalling Software |
|
|
312 | (1) |
|
|
|
313 | (1) |
|
|
|
313 | (1) |
|
|
|
314 | (1) |
|
Final Thoughts on User Policies |
|
|
314 | (2) |
|
Defining System Administration Policies |
|
|
316 | (3) |
|
|
|
316 | (1) |
|
|
|
316 | (1) |
|
|
|
317 | (2) |
|
|
|
319 | (2) |
|
|
|
319 | (1) |
|
|
|
320 | (1) |
|
|
|
320 | (1) |
|
|
|
321 | (1) |
|
|
|
322 | (1) |
|
Standards, Guidelines, and Procedures |
|
|
323 | (1) |
|
|
|
323 | (1) |
|
|
|
323 | (1) |
|
|
|
324 | (3) |
|
|
|
324 | (1) |
|
|
|
325 | (1) |
|
|
|
325 | (1) |
|
Disaster Recovery and Business Continuity Standards |
|
|
325 | (1) |
|
|
|
326 | (1) |
|
|
|
327 | (1) |
|
|
|
328 | (2) |
|
|
|
328 | (1) |
|
|
|
329 | (1) |
|
Payment Card Industry Data Security Standards |
|
|
329 | (1) |
|
|
|
330 | (6) |
|
Chapter 11 Network Scanning and Vulnerability Scanning |
|
|
336 | (42) |
|
|
|
336 | (1) |
|
Basics of Assessing a System |
|
|
337 | (9) |
|
|
|
337 | (1) |
|
|
|
338 | (3) |
|
|
|
341 | (2) |
|
|
|
343 | (1) |
|
|
|
344 | (1) |
|
|
|
345 | (1) |
|
Securing Computer Systems |
|
|
346 | (6) |
|
Securing an Individual Workstation |
|
|
346 | (2) |
|
|
|
348 | (2) |
|
|
|
350 | (2) |
|
|
|
352 | (11) |
|
|
|
352 | (3) |
|
|
|
355 | (2) |
|
|
|
357 | (2) |
|
|
|
359 | (3) |
|
|
|
362 | (1) |
|
|
|
363 | (1) |
|
Testing and Scanning Standards |
|
|
363 | (3) |
|
|
|
363 | (1) |
|
|
|
364 | (1) |
|
|
|
365 | (1) |
|
National Vulnerability Database |
|
|
365 | (1) |
|
Getting Professional Help |
|
|
366 | (3) |
|
|
|
369 | (9) |
|
Chapter 12 Cyber Terrorism and Information Warfare |
|
|
378 | (30) |
|
|
|
378 | (1) |
|
Actual Cases of Cyber Terrorism |
|
|
379 | (3) |
|
China's Advanced Persistent Threat |
|
|
381 | (1) |
|
|
|
381 | (1) |
|
|
|
381 | (1) |
|
|
|
381 | (1) |
|
|
|
382 | (2) |
|
|
|
382 | (1) |
|
|
|
382 | (1) |
|
|
|
383 | (1) |
|
|
|
383 | (1) |
|
|
|
383 | (1) |
|
|
|
384 | (1) |
|
|
|
384 | (1) |
|
|
|
384 | (2) |
|
Military Operations Attacks |
|
|
386 | (1) |
|
|
|
387 | (1) |
|
Supervisory Control and Data Acquisitions (SCADA) |
|
|
387 | (1) |
|
|
|
388 | (3) |
|
|
|
388 | (1) |
|
|
|
389 | (2) |
|
|
|
391 | (1) |
|
Actual Cases of Cyber Terrorism |
|
|
391 | (4) |
|
|
|
395 | (4) |
|
Machine Learning/Artificial Intelligence |
|
|
395 | (1) |
|
|
|
396 | (2) |
|
|
|
398 | (1) |
|
Defense Against Cyber Terrorism |
|
|
399 | (1) |
|
Terrorist Recruiting and Communication |
|
|
399 | (1) |
|
|
|
400 | (2) |
|
|
|
402 | (6) |
|
Chapter 13 Cyber Detective |
|
|
408 | (18) |
|
|
|
408 | (2) |
|
|
|
410 | (3) |
|
|
|
412 | (1) |
|
|
|
413 | (1) |
|
Court Records and Criminal Checks |
|
|
413 | (4) |
|
|
|
413 | (2) |
|
|
|
415 | (1) |
|
|
|
416 | (1) |
|
|
|
417 | (1) |
|
|
|
418 | (1) |
|
|
|
418 | (3) |
|
|
|
421 | (5) |
|
Chapter 14 Introduction to Forensics |
|
|
426 | (40) |
|
|
|
426 | (1) |
|
|
|
427 | (13) |
|
Don't Touch the Suspect Drive |
|
|
427 | (1) |
|
Imaging a Drive with Forensic Toolkit |
|
|
428 | (4) |
|
Can You Ever Conduct Forensics on a Live Machine? |
|
|
432 | (1) |
|
|
|
432 | (1) |
|
|
|
432 | (1) |
|
|
|
433 | (1) |
|
|
|
433 | (1) |
|
U.S. Secret Service Forensics Guidelines |
|
|
434 | (1) |
|
|
|
435 | (1) |
|
Scientific Working Group on Digital Evidence |
|
|
436 | (1) |
|
Locard's Principle of Transference |
|
|
436 | (1) |
|
|
|
437 | (1) |
|
|
|
437 | (1) |
|
|
|
438 | (1) |
|
|
|
438 | (2) |
|
|
|
440 | (1) |
|
Finding Evidence in a Browser |
|
|
440 | (1) |
|
Finding Evidence in System Logs |
|
|
441 | (1) |
|
|
|
441 | (1) |
|
|
|
442 | (1) |
|
Getting Back Deleted Files |
|
|
442 | (3) |
|
Operating System Utilities |
|
|
445 | (2) |
|
|
|
445 | (1) |
|
|
|
445 | (3) |
|
|
|
446 | (1) |
|
|
|
446 | (1) |
|
|
|
447 | (2) |
|
|
|
449 | (3) |
|
Mobile Forensics: Cell Phone Concepts |
|
|
452 | (5) |
|
|
|
452 | (1) |
|
|
|
452 | (1) |
|
|
|
453 | (1) |
|
|
|
454 | (1) |
|
|
|
455 | (1) |
|
|
|
456 | (1) |
|
The Need for Forensic Certification |
|
|
457 | (1) |
|
|
|
458 | (1) |
|
|
|
459 | (1) |
|
|
|
459 | (1) |
|
Additional Types of Forensics |
|
|
459 | (4) |
|
|
|
460 | (1) |
|
|
|
460 | (3) |
|
|
|
463 | (3) |
|
Chapter 15 Cybersecurity Engineering |
|
|
466 | (28) |
|
|
|
466 | (1) |
|
Defining Cybersecurity Engineering |
|
|
467 | (8) |
|
Cybersecurity and Systems Engineering |
|
|
468 | (1) |
|
Applying Engineering to Cybersecurity |
|
|
468 | (7) |
|
|
|
475 | (5) |
|
|
|
476 | (1) |
|
|
|
477 | (1) |
|
|
|
478 | (1) |
|
|
|
478 | (2) |
|
|
|
480 | (9) |
|
|
|
481 | (1) |
|
|
|
481 | (5) |
|
Security Sequence Diagram |
|
|
486 | (2) |
|
|
|
488 | (1) |
|
|
|
489 | (1) |
|
|
|
489 | (2) |
|
|
|
489 | (1) |
|
|
|
490 | (1) |
|
|
|
490 | (1) |
|
|
|
491 | (3) |
| Glossary |
|
494 | (6) |
| Appendix A Resources |
|
500 | (2) |
| Appendix B Answers to the Multiple Choice Questions |
|
502 | (6) |
| Index |
|
508 | |