Book description
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today’s latest attacks and
countermeasures
The perfect beginner’s guide for anyone interested in a computer security career
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.
Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.
Learn how to
· Identify and prioritize potential threats to your network
· Use basic networking knowledge to improve security
· Get inside the minds of hackers, so you can deter their attacks
· Implement a proven layered approach to network security
· Resist modern social engineering attacks
· Defend against today’s most common Denial of Service (DoS) attacks
· Halt viruses, spyware, worms, Trojans, and other malware
· Prevent problems arising from malfeasance or ignorance
· Choose the best encryption methods for your organization
· Compare security technologies, including the latest security appliances
· Implement security policies that will work in your environment
· Scan your network for vulnerabilities
· Evaluate potential security consultants
· Master basic computer forensics and know what to do if you’re attacked
· Learn how cyberterrorism and information warfare are evolving
Table of contents
- About This E-Book
- Title Page
- Copyright Page
- Contents at a Glance
- Table of Contents
- About the Author
- Dedication
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
-
Chapter 1. Introduction to Computer Security
- Introduction
- How Seriously Should You Take Threats to Network Security?
- Identifying Types of Threats
- Assessing the Likelihood of an Attack on Your Network
- Basic Security Terminology
- Concepts and Approaches
- How Do Legal Issues Impact Network Security?
- Online Security Resources
- Summary
- Test Your Skills
- Chapter 2. Networks and the Internet
- Chapter 3. Cyber Stalking, Fraud, and Abuse
- Chapter 4. Denial of Service Attacks
- Chapter 5. Malware
- Chapter 6. Techniques Used by Hackers
-
Chapter 7. Industrial Espionage in Cyberspace
- Introduction
- What Is Industrial Espionage?
- Information as an Asset
- Real-World Examples of Industrial Espionage
- How Does Espionage Occur?
- Steganography Used in Industrial Espionage
- Phone Taps and Bugs
- Protecting Against Industrial Espionage
- Industrial Espionage Act
- Spear Phishing
- Summary
- Test Your Skills
- Chapter 8. Encryption
- Chapter 9. Computer Security Technology
- Chapter 10. Security Policies
- Chapter 11. Network Scanning and Vulnerability Scanning
-
Chapter 12. Cyber Terrorism and Information Warfare
- Introduction
- Actual Cases of Cyber Terrorism
- Weapons of Cyber Warfare
- Economic Attacks
- Military Operations Attacks
- General Attacks
- Supervisory Control and Data Acquisitions (SCADA)
- Information Warfare
- Actual Cases
- Future Trends
- Defense Against Cyber Terrorism
- Terrorist Recruiting and Communication
- TOR and the Dark Web
- Summary
- Test Your Skills
- Chapter 13. Cyber Detective
-
Chapter 14. Introduction to Forensics
- Introduction
-
General Guidelines
- Don’t Touch the Suspect Drive
- Image a Drive with Forensic Toolkit
- Can You Ever Conduct Forensics on a Live Machine?
- Document Trail
- Secure the Evidence
- Chain of Custody
- FBI Forensics Guidelines
- U.S. Secret Service Forensics Guidelines
- EU Evidence Gathering
- Scientific Working Group on Digital Evidence
- Locard’s Principle of Transference
- Tools
- Finding Evidence on the PC
- Finding Evidence in System Logs
- Getting Back Deleted Files
- Operating System Utilities
- The Windows Registry
- Mobile Forensics: Cell Phone Concepts
- The Need for Forensic Certification
- Expert Witnesses
- Additional Types of Forensics
- Summary
- Test Your Skills
- Appendix A. Glossary
- Appendix B. Resources
- Appendix C. Answers to the Multiple Choice Questions
- Index
- Code Snippets
Product information
- Title: Computer Security Fundamentals, Third Edition
- Author(s):
- Release date: June 2016
- Publisher(s): Pearson IT Certification
- ISBN: 9780134470627
You might also like
book
Computer Security Fundamentals, Second Edition
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together …
book
Computer Security Fundamentals, 4th Edition
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today’s latest attacks and countermeasures The …
book
Computer Security Basics, 2nd Edition
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, …
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …