+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity Essentials. Edition No. 1

  • Book

  • 784 Pages
  • November 2018
  • John Wiley and Sons Ltd
  • ID: 3923207
An accessible introduction to cybersecurity concepts and practices

Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.

Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.

  • Learn security and surveillance fundamentals
  • Secure and protect remote access and devices
  • Understand network topologies, protocols, and strategies
  • Identify threats and mount an effective defense

Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Table of Contents

Introduction xix

PART I SECURING THE INFRASTRUCTURE 1

Chapter 1 Infrastructure Security in the Real World 3

Security Challenges 3

Infrastructure Security Scenario 1 4

Infrastructure Security Scenario 2 6

Summary 8

Chapter 2 Understanding Access-Control and Monitoring Systems 9

A Quick Primer on Infrastructure Security 9

Access Control 12

Security Policies 14

Physical Security Controls 15

Locks and Keys 16

Standard Key-Locking Deadbolts 17

Solenoid-Operated Deadbolt Locks 18

Cipher Locks 19

Access-Control Gates 20

Sliding Gates 20

Swinging Gates 21

Control Relays 21

Authentication Systems 23

Magnetic Stripe Readers 24

Smart Cards 25

RFID Badges 26

Biometric Scanners 27

Remote-Access Monitoring 29

Opened- and Closed-Condition Monitoring 30

Automated Access-Control Systems 32

Hands-On Exercises 33

Discussion 34

Procedure 35

Review Questions 43

Chapter 3 Understanding Video Surveillance Systems 45

Video Surveillance Systems 45

Cameras 46

Hands-On Exercises 60

Discussion 61

Procedure 61

Review Questions 69

Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71

Intrusion-Detection and Reporting Systems 71

Security Controllers 74

Sensors 77

Vehicle-Detection Sensors 82

Fire-Detection Sensors 85

Output Devices 87

Hands-On Exercises 90

Discussion 90

Procedure 92

Review Questions 94

Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97

Summary Points 97

Security Challenge Scenarios 101

Infrastructure Security Scenario 1 101

Infrastructure Security Scenario 2 102

Professional Feedback 102

Review Questions 107

Exam Questions 109

PART II SECURING LOCAL HOSTS 113

Chapter 6 Local Host Security in the Real World 115

Security Challenges 115

Computing Device Security Scenario 1 116

Computing Device Security Scenario 2 117

Summary 120

Chapter 7 Securing Devices 121

The Three Layers of Security 121

Securing Host Devices 123

Securing Outer-Perimeter Portals 124

Additional Inner-Perimeter Access Options 127

Hands-On Exercises 137

Objectives 137

Procedure 137

Review Questions 148

Chapter 8 Protecting the Inner Perimeter 149

The Inner Perimeter 149

Operating Systems 151

Operating System Security Choices 168

Common Operating System Security Tools 169

Using Local Administrative Tools 177

Implementing Data Encryption 182

Hands-On Exercises 188

Objectives 188

Resources 188

Discussion 189

Procedures 190

Tables 200

Lab Questions 201

Chapter 9 Protecting Remote Access 203

Protecting Local Computing Devices 203

Using a Secure Connection 204

Establishing and Using a Firewall 204

Installing and Using Anti-Malware Software 205

Removing Unnecessary Software 205

Disabling Nonessential Services 205

Disabling Unnecessary OS Default Features 205

Securing the Web Browser 205

Applying Updates and Patches 206

Requiring Strong Passwords 206

Implementing Local Protection Tools 206

Software-Based Local Firewalls 207

Using Local Intrusion-Detection Tools 209

Profile-Based Anomaly-Detection Systems 210

Threshold-Based Anomaly-Detection Systems 211

Configuring Browser Security Options 211

Configuring Security Levels 213

Configuring Script Support 214

Defending Against Malicious Software 218

Using Antivirus Programs 220

Using Antispyware 221

Hardening Operating Systems 222

Service Packs 222

Patches 222

Updates 223

Overseeing Application Software Security 223

Software Exploitation 223

Applying Software Updates and Patches 224

Hands-On Exercises 225

Objectives 225

Resources 225

Discussion 225

Procedures 226

Tables 241

Lab Questions 242

Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243

Summary Points 243

Security Challenge Scenarios 248

Computing Device Security Scenario 1 248

Computing Device Security Scenario 2 248

Professional Feedback 248

Review Questions 257

Exam Questions 259

PART III SECURING LOCAL NETWORKS 263

Chapter 11 Local Network Security in the Real World 265

Security Challenges 266

Local Network Security Scenario 1 266

Local Network Security Scenario 2 270

Summary 272

Chapter 12 Networking Basics 273

Understanding the Basics of Networking 273

Campus Area Networks or Corporate Area Networks (CANs) 274

Metropolitan Area Networks (MANs) 274

Wireless Local Area Networks (WLANs) 274

Storage Area Networks (SANs) 274

The OSI Networking Model 275

Layer 1: Physical 276

Layer 2: Data Link 276

Layer 3: Network 276

Layer 4: Transport 276

Layer 5: Session 276

Layer 6: Presentation 277

Layer 7: Application 277

Data Transmission Packets 277

OSI Layer Security 278

Network Topologies 280

Bus Topology 280

Ring Topology 280

Star Topology 281

Mesh Topology 282

Logical Topologies 282

Hands-On Exercises 283

Objectives 283

Resources 283

Discussion 283

Procedure 284

Lab Questions 295

Lab Answers 295

Chapter 13 Understanding Networking Protocols 297

The Basics of Networking Protocols 297

MAC Addresses 298

TCP/IP 299

Ethernet 309

Network Control Strategies 311

Hands-On Exercises 313

Objectives 313

Discussion 313

Procedures 314

Lab Questions 325

Lab Answers 326

Chapter 14 Understanding Network Servers 327

The Basics of Network Servers 327

Server Security 330

Network Administrators 331

Server Software Security 335

User Accounts 341

Network Authentication Options 347

Establishing Resource Controls 348

Maintaining Server Security 352

Vulnerability Scanning 358

Hands-On Exercises 361

Objectives 361

Resources 361

Discussion 362

Procedures 362

Lab Questions 382

Lab Answers 382

Chapter 15 Understanding Network Connectivity Devices 385

Network Switches 386

Routers 388

Gateways 390

Network Bridges 391

Wireless Network Connectivity 392

Network Connectivity Device Vulnerabilities 392

Network Connectivity Device Attacks 393

Network Connectivity Defense 397

Network Hardening 398

Hands-On Exercises 399

Objectives 399

Resources 399

Procedures 399

Lab Questions 404

Lab Answers 404

Chapter 16 Understanding Network Transmission Media Security 407

The Basics of Network Transmission Media 407

Copper Wire 408

Light Waves 410

Wireless Signals 412

Transmission Media Vulnerabilities 415

Securing Wireless Networks 415

Hands-On Exercises 417

Objectives 417

Resources 417

Procedure 417

Lab Questions 421

Lab Answers 421

Chapter 17 Local Network Security: Review Questions 423

Summary Points 423

Security Challenge Scenarios 432

Local Network Security Scenario 1 432

Local Network Security Scenario 2 432

Professional Feedback 432

Review Questions 443

PART IV SECURING THE PERIMETER 449

Chapter 18 Perimeter Security in the Real World 451

Security Challenges 451

Internet Security Scenario 1 451

Internet Security Scenario 2 454

Summary 455

Chapter 19 Understanding the Environment 457

The Basics of Internet Security 457

Understanding the Environment 460

Basic Internet Concepts 461

Internet Services 468

Standards and RFCs 470

Hands-On Exercises 471

Objectives 471

Resources 472

Discussion 472

Procedures 472

Lab Questions 486

Lab Answers 486

Chapter 20 Hiding the Private Network 487

Understanding Private Networks 487

Network Address Translation 488

Port Address Translation 489

Port Forwarding or Mapping 490

Network Segmentation 492

Software-Defined Networking 494

Hands-On Exercises 496

Objectives 496

Resources 496

Discussion 496

Procedure 497

Lab Questions 508

Lab Answers 509

Chapter 21 Protecting the Perimeter 511

Understanding the Perimeter 511

Firewalls 515

Firewall Considerations 517

Network Appliances 519

Proxy Servers 520

Demilitarized Zones (DMZs) 522

Single-Firewall DMZs 523

Dual-Firewall DMZs 524

Honeypots 525

Extranets 526

Hands-On Exercises 528

Objectives 528

Resources 528

Procedures 528

Lab Questions 534

Lab Answers 534

Chapter 22 Protecting Data Moving Through the Internet 535

Securing Data in Motion 535

Authentication 536

Encryption 542

Cryptography 543

Digital Certificates 545

Hash Tables 548

Cookies 548

CAPTCHAs 549

Virtual Private Networks 550

Hands-On Exercises 552

Objectives 552

Resources 552

Discussion 552

Procedures 552

Lab Questions 563

Lab Answers 563

Chapter 23 Tools and Utilities 565

Using Basic Tools 565

IFconfig/IPconfig 565

Whois 566

Nslookup 567

PING 567

Traceroute 568

Telnet 569

Secure Shell 570

Monitoring Tools and Software 570

Nagios 572

SolarWinds 572

Microsoft Network Monitor 572

Wireshark 572

Snort 573

Nmap 575

Nikto 575

OpenVAS 575

Metasploit 575

The Browser Exploitation Framework (BeEF) 576

Other Products 576

Hands-On Exercises 578

Objectives 578

Resources 578

Discussion 578

Procedures 579

Capturing a PING 583

Lab Questions 589

Lab Answers 589

Chapter 24 Identifying and Defending Against Vulnerabilities 591

Zero Day Vulnerabilities 591

Software Exploits 592

SQL Injection 594

Java 597

Other Software Exploits 599

Social Engineering Exploits 600

Phishing Attacks 600

Network Threats and Attacks 603

Broadcast Storms 603

Session-Hijacking Attacks 604

Dictionary Attacks 606

Denial of Service (DoS) Attacks 606

Tarpitting 611

Spam 612

Protecting Against Spam Exploits 613

Other Exploits 614

Transport Layer Security (TLS) Exploits 614

FREAK Exploits 615

Logjam Exploits 615

Hands-On Exercises 616

Objectives 616

Resources 616

Discussion 616

Procedures 616

Chapter 25 Perimeter Security: Review Questions and Hands-On Exercises 627

Summary Points 627

Security Scenario Review 637

Network Security Scenario 1 637

Network Security Scenario 2 637

Professional Feedback 637

Review Questions 644

Exam Questions 647

Appendix A 651

Appendix B 703

Appendix C 715

Index 727

Authors

Charles J. Brooks Christopher Grow Philip A. Craig, Jr. Donald Short