Acknowledgments |
|
xviii | |
Introduction |
|
xix | |
Chapter 1 Security Fundamentals |
|
1 | (26) |
|
Reviewing the Requirements for SSCP |
|
|
1 | (7) |
|
|
1 | (2) |
|
Have One Year of Experience |
|
|
3 | (1) |
|
|
4 | (3) |
|
Maintaining Your SSCP Certification |
|
|
7 | (1) |
|
Understanding Basic Security Concepts |
|
|
8 | (5) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
Exploring Fundamentals of Security |
|
|
13 | (7) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
|
23 | (4) |
Chapter 2 Access Controls |
|
27 | (40) |
|
Comparing Identification, Authentication, and Authorization |
|
|
27 | (1) |
|
|
28 | (16) |
|
Three Factors of Authentication |
|
|
29 | (8) |
|
Multifactor Authentication |
|
|
37 | (1) |
|
|
38 | (1) |
|
Single Sign-on Authentication |
|
|
38 | (4) |
|
Centralized vs. Decentralized Authentication |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
Implementing Access Controls |
|
|
44 | (3) |
|
Comparing Subjects and Objects |
|
|
44 | (3) |
|
|
47 | (1) |
|
Comparing Access Control Models |
|
|
47 | (8) |
|
Discretionary Access Control |
|
|
47 | (2) |
|
Non-Discretionary Access Control |
|
|
49 | (6) |
|
Access Control Matrix vs. Capability Table |
|
|
55 | (1) |
|
Participating in the Identity-Management Life Cycle |
|
|
55 | (3) |
|
|
56 | (1) |
|
Provisioning and Authorization |
|
|
56 | (1) |
|
Maintenance and Entitlement |
|
|
57 | (1) |
|
|
58 | (1) |
|
Participating in Physical Security Operations |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (3) |
|
|
64 | (3) |
Chapter 3 Basic Networking and Communications |
|
67 | (48) |
|
|
67 | (5) |
|
The Physical Layer (Layer 1) |
|
|
68 | (1) |
|
The Data Link Layer (Layer 2) |
|
|
69 | (1) |
|
The Network Layer (Layer 3) |
|
|
70 | (1) |
|
The Transport Layer (Layer 4) |
|
|
70 | (1) |
|
The Session Layer (Layer 5) |
|
|
71 | (1) |
|
The Presentation Layer (Layer 6) |
|
|
72 | (1) |
|
The Application Layer (Layer 7) |
|
|
72 | (1) |
|
Comparing the OSI and TCP/IP Models |
|
|
72 | (1) |
|
|
73 | (6) |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Reviewing Basic Protocols and Ports |
|
|
79 | (12) |
|
|
79 | (1) |
|
Dynamic Host Configuration Protocol |
|
|
80 | (1) |
|
Address Resolution Protocol |
|
|
81 | (1) |
|
Network Discovery Protocol |
|
|
82 | (1) |
|
|
82 | (1) |
|
Internet Control Message Protocol |
|
|
83 | (1) |
|
Internet Group Message Protocol |
|
|
83 | (1) |
|
Simple Network Management Protocol |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
HyperText Transfer Protocol and |
|
|
|
HyperText Transfer Protocol Secure |
|
|
86 | (1) |
|
Transport Layer Security and Secure Sockets Layer |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Internet Protocol Security |
|
|
88 | (1) |
|
Mapping Well-Known Ports to Protocols |
|
|
89 | (2) |
|
Comparing Ports and Protocol Numbers |
|
|
91 | (1) |
|
Comparing Internetwork Trust Architectures |
|
|
91 | (6) |
|
Comparing Public and Private IP Addresses |
|
|
93 | (1) |
|
|
94 | (2) |
|
Comparing Trust Relationships |
|
|
96 | (1) |
|
Exploring Wireless Technologies |
|
|
97 | (10) |
|
Securing Data Transmissions |
|
|
99 | (2) |
|
Wireless Device Administrator Password |
|
|
101 | (1) |
|
Wireless Service Set Identifier |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Radio Frequency Identification |
|
|
105 | (1) |
|
|
105 | (1) |
|
Protecting Mobile Devices |
|
|
106 | (1) |
|
|
107 | (2) |
|
|
109 | (3) |
|
|
112 | (3) |
Chapter 4 Advanced Networking and Communications |
|
115 | (42) |
|
Managing LAN-Based Security |
|
|
115 | (5) |
|
Comparing Switches and Routers |
|
|
115 | (2) |
|
|
117 | (3) |
|
|
120 | (1) |
|
Understanding Telecommunications |
|
|
120 | (3) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (2) |
|
|
125 | (5) |
|
Packet-Filtering Firewall |
|
|
125 | (2) |
|
Stateful Inspection Firewall |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Comparing Network-based and Host-based Firewalls |
|
|
129 | (1) |
|
Exploring Remote Access Solutions |
|
|
130 | (8) |
|
Risks and Vulnerabilities |
|
|
131 | (1) |
|
|
131 | (3) |
|
|
134 | (4) |
|
|
138 | (1) |
|
Access and Admission Control |
|
|
138 | (2) |
|
Exploring Virtual Environments |
|
|
140 | (4) |
|
Virtualization Terminology |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
Continuity and Resilience |
|
|
142 | (1) |
|
Separation of Data Plane and Control Plane |
|
|
142 | (1) |
|
Software-defined Networking |
|
|
143 | (1) |
|
Attacks and Countermeasures |
|
|
143 | (1) |
|
Understanding Cloud Computing |
|
|
144 | (4) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
Data Control and Third-party Outsourcing |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (2) |
|
|
150 | (3) |
|
|
153 | (4) |
Chapter 5 Attacks |
|
157 | (50) |
|
|
157 | (6) |
|
|
158 | (1) |
|
White Hats, Black Hats, and Grey Hats |
|
|
158 | (1) |
|
Advanced Persistent Threats |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Exploring Attack Types and Countermeasures |
|
|
163 | (30) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
167 | (3) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
Smurf and Fraggle Attacks |
|
|
173 | (1) |
|
Software Security as a Countermeasure |
|
|
174 | (3) |
|
|
177 | (1) |
|
|
178 | (2) |
|
|
180 | (1) |
|
Cross-Site Request Forgery |
|
|
180 | (2) |
|
|
182 | (3) |
|
|
185 | (1) |
|
|
185 | (2) |
|
Phishing and Drive-by Downloads |
|
|
187 | (1) |
|
Spear Phishing and Whaling |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (2) |
|
|
190 | (1) |
|
Wireless Attacks and Countermeasures |
|
|
190 | (3) |
|
Understanding Social Engineering |
|
|
193 | (4) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
Social Networking Attacks |
|
|
196 | (1) |
|
User Awareness as a Countermeasure |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
199 | (3) |
|
|
202 | (5) |
Chapter 6 Malicious Code and Activity |
|
207 | (36) |
|
Identifying Malicious Code |
|
|
207 | (14) |
|
|
207 | (3) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (2) |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Analyzing the Stages of Regin |
|
|
219 | (2) |
|
Understanding Malware Delivery Methods |
|
|
221 | (2) |
|
Delivering Malware via Drive-by Downloads |
|
|
221 | (1) |
|
Delivering Malware via Malvertising |
|
|
222 | (1) |
|
Delivering Malware via E-mail |
|
|
223 | (1) |
|
Delivering Malware via USB Drives |
|
|
223 | (1) |
|
Implementing Malicious Code Countermeasures |
|
|
223 | (12) |
|
|
224 | (4) |
|
Keeping AV Signatures Up to Date |
|
|
228 | (1) |
|
|
229 | (1) |
|
Content-Filtering Appliances |
|
|
229 | (2) |
|
Keeping Operating Systems Up to Date |
|
|
231 | (1) |
|
|
231 | (1) |
|
Beware of Shortened Links |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
Application Whitelisting and Blacklisting |
|
|
234 | (1) |
|
Participating in Security Awareness and Training |
|
|
234 | (1) |
|
Common Vulnerabilities and Exposures |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (4) |
|
|
240 | (3) |
Chapter 7 Risk, Response, and Recovery |
|
243 | (32) |
|
|
243 | (7) |
|
Identifying Threat Sources |
|
|
245 | (1) |
|
Identifying Threat Events |
|
|
246 | (2) |
|
Understanding Vulnerabilities |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (4) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Risk Visibility and Reporting |
|
|
253 | (1) |
|
|
253 | (1) |
|
Performing Risk Assessments |
|
|
254 | (8) |
|
|
254 | (2) |
|
|
256 | (2) |
|
|
258 | (4) |
|
|
262 | (1) |
|
|
262 | (5) |
|
|
263 | (2) |
|
|
265 | (1) |
|
Containment, Eradication, and Recovery |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (4) |
|
|
272 | (3) |
Chapter 8 Monitoring and Analysis |
|
275 | (28) |
|
Operating and Maintaining Monitoring Systems |
|
|
275 | (11) |
|
Intrusion Detection Systems |
|
|
275 | (1) |
|
|
276 | (1) |
|
Network-based Intrusion Detection Systems |
|
|
277 | (1) |
|
Host-based Intrusion Detection Systems |
|
|
278 | (1) |
|
Intrusion Prevention Systems |
|
|
279 | (3) |
|
|
282 | (1) |
|
Wireless Intrusion Detection and Prevention Systems |
|
|
283 | (1) |
|
|
283 | (1) |
|
Detection Systems and Logs |
|
|
284 | (1) |
|
Detecting Unauthorized Changes |
|
|
284 | (2) |
|
Using Security Information and Event Management Tools |
|
|
286 | (1) |
|
Performing Security Assessment Activities |
|
|
287 | (9) |
|
Vulnerability Assessments |
|
|
287 | (7) |
|
|
294 | (2) |
|
|
296 | (1) |
|
|
297 | (3) |
|
|
300 | (3) |
Chapter 9 Controls and Countermeasures |
|
303 | (40) |
|
Using Controls, Safeguards, and Countermeasures |
|
|
303 | (4) |
|
Performing a Cost-Benefit Analysis |
|
|
304 | (1) |
|
Security Controls Life Cycle |
|
|
305 | (2) |
|
Understanding Control Goals |
|
|
307 | (4) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (2) |
|
Comparing the Classes of Controls |
|
|
311 | (2) |
|
Management/Administrative Security Controls |
|
|
311 | (1) |
|
Technical Security Controls |
|
|
312 | (1) |
|
Operational Security Controls |
|
|
312 | (1) |
|
Physical Security Controls |
|
|
313 | (1) |
|
Combining Control Goals and Classes |
|
|
313 | (1) |
|
Exploring Some Basic Controls |
|
|
314 | (11) |
|
|
314 | (1) |
|
Policies, Standards, Procedures, and Guidelines |
|
|
315 | (2) |
|
|
317 | (1) |
|
Change Control and Configuration Management |
|
|
317 | (1) |
|
Testing Patches, Fixes, and Updates |
|
|
318 | (2) |
|
|
320 | (5) |
|
User Awareness and Training Programs |
|
|
325 | (1) |
|
Understanding Fault Tolerance |
|
|
325 | (6) |
|
Fault Tolerance for Disks |
|
|
325 | (4) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (3) |
|
|
332 | (1) |
|
Full/Incremental Backup Strategy |
|
|
332 | (1) |
|
Full/Differential Backup Strategy |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (4) |
|
|
339 | (4) |
Chapter 10 Auditing |
|
343 | (28) |
|
Understanding Auditing and Accountability |
|
|
343 | (5) |
|
Holding Users Accountable with Audit Logs |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (2) |
|
Understanding Audit Trails |
|
|
348 | (1) |
|
|
348 | (6) |
|
|
348 | (1) |
|
Storing Logs on Remote Systems |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
Performing Security Audits |
|
|
354 | (4) |
|
|
355 | (1) |
|
Auditing Security Policies |
|
|
355 | (1) |
|
|
356 | (1) |
|
Exploring PCI DSS Requirements |
|
|
356 | (2) |
|
Auditing Physical Access Controls |
|
|
358 | (1) |
|
Understanding Configuration Management |
|
|
358 | (3) |
|
Using Imaging for Configuration Management |
|
|
359 | (1) |
|
Using Group Policy for Configuration Management |
|
|
360 | (1) |
|
Understanding Change Management |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
363 | (4) |
|
|
367 | (4) |
Chapter 11 Security Operations |
|
371 | (36) |
|
|
371 | (19) |
|
|
371 | (3) |
|
Marking and Labeling Data |
|
|
374 | (1) |
|
Roles and Responsibilities |
|
|
374 | (1) |
|
Protecting Data from Cradle to Grave |
|
|
375 | (1) |
|
Data at Rest and Data in Motion |
|
|
375 | (1) |
|
|
376 | (6) |
|
|
382 | (4) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (3) |
|
|
390 | (1) |
|
|
390 | (2) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
Certification and Accreditation |
|
|
392 | (6) |
|
Certification, Accreditation, and Security Assessments |
|
|
392 | (1) |
|
|
393 | (1) |
|
Using a Risk Management Framework |
|
|
394 | (1) |
|
Understanding Security Within the |
|
|
|
System Development Life Cycle |
|
|
395 | (3) |
|
|
398 | (1) |
|
|
399 | (3) |
|
|
402 | (5) |
Chapter 12 Security Administration and Planning |
|
407 | (32) |
|
Understanding Security Policies |
|
|
407 | (10) |
|
Security Policy Characteristics |
|
|
408 | (4) |
|
Enforcing Security Policies |
|
|
412 | (1) |
|
Value of a Security Policy |
|
|
412 | (1) |
|
Security Policies Becoming More Common |
|
|
413 | (1) |
|
Understanding Code of Ethics |
|
|
414 | (1) |
|
|
415 | (1) |
|
Updating Security Policies |
|
|
416 | (1) |
|
Understanding BCPs and DRPs |
|
|
417 | (11) |
|
|
419 | (3) |
|
|
422 | (1) |
|
Emergency Response Plans and Procedures |
|
|
423 | (1) |
|
Comparing a BCP and a DRP |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
425 | (3) |
|
Identifying Security Organizations |
|
|
428 | (2) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (4) |
|
|
435 | (4) |
Chapter 13 Legal Issues |
|
439 | (26) |
|
Exploring Computer Forensics |
|
|
439 | (9) |
|
Participating in Incident Handling |
|
|
439 | (3) |
|
First Responders and Preserving the Scene |
|
|
442 | (1) |
|
Three Phases of a Computer Forensics Investigation |
|
|
443 | (4) |
|
Forensic Evidence Guidelines and Principles |
|
|
447 | (1) |
|
Comparing Computer Abuse and Computer Crime |
|
|
448 | (2) |
|
Understanding Fraud and Embezzlement Crime |
|
|
450 | (2) |
|
|
450 | (1) |
|
|
451 | (1) |
|
Understanding Privacy Issues |
|
|
452 | (5) |
|
|
454 | (1) |
|
California Supreme Court Rules That ZIP Codes Are PII |
|
|
455 | (1) |
|
Connecticut's Public Act No. 08-167 |
|
|
455 | (1) |
|
Children's Online Privacy Protection Act |
|
|
456 | (1) |
|
California Online Privacy Protection Act of 2003 |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
458 | (3) |
|
|
461 | (4) |
Chapter 14 Cryptography |
|
465 | (46) |
|
Understanding Basic Cryptography Concepts |
|
|
465 | (4) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
Participating in Security Awareness and Training |
|
|
469 | (1) |
|
Enforcing Integrity with Hashing |
|
|
469 | (5) |
|
Hashing Algorithms Provide One-Way Encryption |
|
|
469 | (1) |
|
|
470 | (2) |
|
|
472 | (1) |
|
|
473 | (1) |
|
Exploring Symmetric Encryption |
|
|
474 | (5) |
|
|
475 | (1) |
|
Composing and Rotating Keys |
|
|
475 | (1) |
|
Comparing Block and Stream Ciphers |
|
|
476 | (1) |
|
Advanced Encryption Standard |
|
|
477 | (1) |
|
Other Symmetric Encryption Algorithms |
|
|
477 | (2) |
|
Exploring Asymmetric Encryption |
|
|
479 | (11) |
|
|
481 | (1) |
|
|
481 | (2) |
|
|
483 | (1) |
|
|
483 | (1) |
|
Elliptic Curve Cryptography |
|
|
484 | (1) |
|
|
484 | (1) |
|
Protecting E-mail with S/MIME |
|
|
484 | (6) |
|
Pretty Good Privacy (PGP) |
|
|
490 | (1) |
|
|
490 | (2) |
|
|
490 | (2) |
|
|
492 | (1) |
|
Public Key Infrastructure |
|
|
492 | (9) |
|
|
492 | (3) |
|
|
495 | (4) |
|
|
499 | (1) |
|
Alternative Certificate Trusts |
|
|
500 | (1) |
|
Comparing Cryptanalysis Attacks |
|
|
501 | (1) |
|
Managing Cryptographic Keys |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (2) |
|
|
504 | (3) |
|
|
507 | (4) |
Appendix About the CD-ROM |
|
511 | (2) |
|
|
511 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
511 | (1) |
|
Installing and Running Total Tester |
|
|
|
Premium Practice Exam Software |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (1) |
|
Total Seminars Technical Support |
|
|
512 | (1) |
|
McGraw-Hill Education Content Support |
|
|
512 | (1) |
Glossary |
|
513 | (26) |
Index |
|
539 | |