Comptia Security+ 2008 in depth /

Ciampa, Mark D.,

Comptia Security+ 2008 in depth / Mark Ciampa. - xvii, 444 pages : illustrations ; 23 cm.

Includes bibliographical references and index.

""Table of Contents""; ""Introduction""; ""CHAPTER 1 Introduction to Security""; ""Challenges of Securing Information""; ""Today�s Security Attacks""; ""Difficulties in Defending against Attacks""; ""What Is Information Security?""; ""Defining Information Security""; ""Information Security Terminology""; ""Understanding the Importance of Information Security""; ""Who Are the Attackers?""; ""Hackers""; ""Script Kiddies""; ""Spies""; ""Employees""; ""Cybercriminals""; ""Cyberterrorists""; ""Attacks and Defenses""; ""Steps of an Attack""; ""Defenses against Attacks""; ""Layering"" LimitingDiversity -- Obscurity -- Simplicity -- Surveying Information Security Careers and the Security+ Certification -- Types of Information Security Jobs -- CompTIA Security+ Certification -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 2 Systems Threats and Risks -- Software-Based Attacks -- Infecting Malware -- Concealing Malware -- Malware for Profit -- Hardware-Based Attacks -- BIOS -- USB Devices -- Network Attached Storage (NAS) -- Cell Phones -- Attacks on Virtualized Systems -- What Is Virtualization? Attacks on Virtual SystemsChapter Summary -- Key Terms -- Review Questions -- CHAPTER 3 Protecting Systems -- Hardening the Operating System -- Managing Operating System Updates -- Buffer Overflow Protection -- Configuring Operating System Protection -- Preventing Attacks That Target the Web Browser -- Cookies -- JavaScript -- Java -- ActiveX -- Cross Site Scripting (XSS) -- Hardening Web Servers -- Protecting Systems from Communications-Based Attacks -- SMTP Open Relays -- Instant Messaging -- Peer-to-Peer (P2P) Networks Applying Software Security ApplicationsAntivirus -- Popup Blockers -- Antispam -- Personal Software Firewalls -- Host Intrusion Detection Systems (HIDS) -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 4 Network Vulnerabilities and Attacks -- Network Vulnerabilities -- Media-Based Vulnerabilities -- Network Device Vulnerabilities -- Categories of Attacks -- Denial-of-Service (DoS) -- Spoofing -- Man-in-the-Middle -- Replay -- Methods of Network Attacks -- Protocol-Based Attacks -- Wireless Attacks -- Other Attacks and Frauds Chapter SummaryKey Terms -- Review Questions -- CHAPTER 5 Network Defenses -- Crafting a Secure Network -- Security through Network Design -- Security through Network Technologies -- Applying Network Security Devices -- Firewall -- Proxy Server -- Honeypot -- Network Intrusion Detection Systems (NIDS) -- Host and Network Intrusion Prevention Systems (HIPS/NIPS) -- Protocol Analyzers -- Internet Content Filters -- Integrated Network Security Hardware -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 6 Wireless Network Security

1598638130 9781598638134

2008939938


Computer security.
Data protection.

QA76.9.A25 / C524 2009

005.8 CI.C 2009 G.C