Introduction |
|
xiii | |
|
Chapter 1 Using Digital Resources Responsibly |
|
|
1 | (14) |
|
Protecting Personal Rights |
|
|
2 | (2) |
|
Protecting Digital Privacy |
|
|
4 | (3) |
|
|
4 | (1) |
|
Where Might My Personal Data Be Hanging Out? |
|
|
4 | (2) |
|
What Are My Responsibilities as a Site Administrator? |
|
|
6 | (1) |
|
Can Escaped Genies Be Forced Back into Their Bottles? |
|
|
6 | (1) |
|
|
7 | (1) |
|
Establishing Authenticity |
|
|
7 | (2) |
|
|
8 | (1) |
|
Be Aware of Common Threat Categories |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (4) |
|
Chapter 2 What Are Vulnerabilities and Threats? |
|
|
15 | (18) |
|
The Basics: What Are We Trying to Accomplish Here? |
|
|
16 | (4) |
|
What Are Vulnerabilities and Threats? |
|
|
17 | (1) |
|
|
17 | (1) |
|
Who's Doing the Exploiting? |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
21 | (2) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
Identity Theft (Besides Breaches) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
Man-in-the-Middle Attacks |
|
|
25 | (1) |
|
Denial-of-Service and Distributed Denial-of-Service Attacks |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (5) |
|
Chapter 3 Controlling Access to Your Assets |
|
|
33 | (26) |
|
Controlling Physical Access |
|
|
34 | (11) |
|
Understanding Your Devices |
|
|
34 | (2) |
|
|
36 | (2) |
|
Managing Authentication Through Effective Password Use |
|
|
38 | (6) |
|
Managing Authorization Through Permissions |
|
|
44 | (1) |
|
Controlling Network Access |
|
|
45 | (5) |
|
|
45 | (3) |
|
Virus and Malware Protection |
|
|
48 | (1) |
|
|
49 | (1) |
|
Controlling Software Sources |
|
|
50 | (2) |
|
|
51 | (1) |
|
Mobile Package Management |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (2) |
|
|
54 | (5) |
|
Chapter 4 Controlling Network Connections |
|
|
59 | (22) |
|
Understanding Network Architecture |
|
|
60 | (5) |
|
The Transmission Control Protocol |
|
|
60 | (1) |
|
|
61 | (3) |
|
Understanding the Domain Name System |
|
|
64 | (1) |
|
|
65 | (6) |
|
|
66 | (4) |
|
|
70 | (1) |
|
|
71 | (3) |
|
|
71 | (2) |
|
Physically Secure Your Infrastructure |
|
|
73 | (1) |
|
Secure Your Network Behavior |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (5) |
|
Chapter 5 Encrypting Your Data at Rest |
|
|
81 | (12) |
|
|
82 | (3) |
|
Encryption Usage Patterns |
|
|
85 | (2) |
|
|
85 | (1) |
|
Understanding Hashing vs. Encryption |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (3) |
|
Chapter 6 Encrypting Your Moving Data |
|
|
93 | (16) |
|
|
94 | (5) |
|
Why You Should Use Encryption |
|
|
95 | (1) |
|
How Website Encryption Works |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Does Gmail Encrypt Your Emails? |
|
|
100 | (1) |
|
Working with VPN Connections and Software Repositories |
|
|
100 | (5) |
|
Securing Your Actions Using VPNs |
|
|
101 | (3) |
|
Securing Transfers from Software Repositories |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (3) |
|
Chapter 7 Risk Assessment |
|
|
109 | (16) |
|
Conducting Open Source Intelligence Gathering |
|
|
111 | (1) |
|
Accessing Public Vulnerability Databases |
|
|
112 | (3) |
|
Vulnerability Data Frameworks |
|
|
112 | (1) |
|
Vulnerability Data Formats |
|
|
113 | (1) |
|
Vulnerability Data Metrics |
|
|
114 | (1) |
|
Vulnerability Data Management Tools |
|
|
114 | (1) |
|
Conducting Vulnerability Scans |
|
|
115 | (2) |
|
Conducting Penetration Tests |
|
|
117 | (2) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (4) |
|
Chapter 8 Configuring System Backups and Monitoring |
|
|
125 | (18) |
|
Why You Need to Get Backups Right the First Time |
|
|
127 | (5) |
|
|
128 | (1) |
|
Spreading Your Backups Across Multiple Sites |
|
|
129 | (1) |
|
|
130 | (1) |
|
Meeting Regulatory Compliance |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
|
Multisite Storage Solutions |
|
|
134 | (1) |
|
Disaster Recovery Planning |
|
|
134 | (1) |
|
Configuring Monitoring and Alerts |
|
|
135 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (4) |
|
Chapter 9 Resource Isolation Design Patterns |
|
|
143 | (12) |
|
Configuring Network Firewalling |
|
|
145 | (3) |
|
Balancing Public and Private Networks |
|
|
145 | (2) |
|
Building Isolated Development Environments |
|
|
147 | (1) |
|
Working with Sandbox Environments |
|
|
148 | (2) |
|
|
148 | (1) |
|
|
149 | (1) |
|
Controlling Local System Access |
|
|
150 | (2) |
|
Configuring Mandatory Access Controls |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
Appendix Answers to Review Questions |
|
|
155 | (12) |
|
Chapter 1 Using Digital Resources Responsibly |
|
|
156 | (1) |
|
Chapter 2 What are Vulnerabilities and Threats? |
|
|
157 | (1) |
|
Chapter 3 Controlling Access to Your Assets |
|
|
158 | (2) |
|
Chapter 4 Controlling Network Connections |
|
|
160 | (1) |
|
Chapter 5 Encrypting Your Data at Rest |
|
|
161 | (1) |
|
Chapter 6 Encrypting Your Moving Data |
|
|
162 | (1) |
|
Chapter 7 Risk Assessment |
|
|
163 | (2) |
|
Chapter 8 Configuring System Backups and Monitoring |
|
|
165 | (1) |
|
Chapter 9 Resource Isolation Design Patterns |
|
|
166 | (1) |
Index |
|
167 | |