Book description
Fully updated computer security essentials—mapped to the CompTIA Security+ SY0-601 exam
Save 10% on any CompTIA exam voucher! Coupon code inside.
Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. This thoroughly revised, full-color textbook covers how to secure hardware, systems, and software. It addresses new threats and cloud environments, and provides additional coverage of governance, risk, compliance, and much more. Written by a team of highly respected security educators, Principles of Computer Security: CompTIA Security+™ and Beyond, Sixth Edition (Exam SY0-601) will help you become a CompTIA-certified computer security expert while also preparing you for a successful career.
Find out how to:
- Ensure operational, organizational, and physical security
- Use cryptography and public key infrastructures (PKIs)
- Secure remote access, wireless networks, and virtual private networks (VPNs)
- Authenticate users and lock down mobile devices
- Harden network devices, operating systems, and applications
- Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing
- Combat viruses, worms, Trojan horses, and rootkits
- Manage e-mail, instant messaging, and web security
- Explore secure software development requirements
- Implement disaster recovery and business continuity measures
- Handle computer forensics and incident response
- Understand legal, ethical, and privacy issues
- Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective
- Learning objectives
- Real-world examples
- Try This! and Cross Check exercises
- Tech Tips, Notes, and Warnings
- Exam Tips
- End-of-chapter quizzes and lab projects
Table of contents
- Cover
- About the Authors
- Title Page
- Copyright Page
- Acknowledgments
- About this Book
- Contents at a Glance
- Contents
- Foreword
- Preface
- Introduction
- Instructor Website
- Chapter 1 Introduction and Security Trends
- Chapter 2 General Security Concepts
-
Chapter 3 Operational and Organizational Security
- Policies, Procedures, Standards, and Guidelines
- Organizational Policies
- Security Policies
-
Human Resources Policies
- Code of Ethics
- Job Rotation
- Separation of Duties
- Employee Hiring (Onboarding) and Promotions
- Retirement, Separation, or Termination (Offboarding)
- Exit Interviews
- Onboarding/Offboarding Business Partners
- Adverse Actions
- Mandatory Vacations
- Acceptable Use Policy
- Internet Usage Policy
- E-mail Usage Policy
- Social Media Analysis
- Clean Desk Policy
- Bring-Your-Own-Device (BYOD) Policy
- Privacy Policy
- Due Care and Due Diligence
- Due Process
- Incident Response Policies and Procedures
- Security Awareness and Training
- Standard Operating Procedures
- Third-Party Risk Management
- Interoperability Agreements
- Chapter 3 Review
-
Chapter 4 The Role of People in Security
- People—A Security Problem
- Tools
-
Attacks
- Impersonation
- Phishing
- Smishing
- Vishing
- Spam
- Spam over Internet Messaging (SPIM)
- Spear Phishing
- Whaling
- Pharming
- Dumpster Diving
- Shoulder Surfing
- Tailgating/Piggybacking
- Eliciting Information
- Prepending
- Identity Fraud
- Invoice Scams
- Credential Harvesting
- Reverse Social Engineering
- Reconnaissance
- Hoax
- Watering Hole Attack
- Typo Squatting
- Influence Campaigns
- Poor Security Practices
- People as a Security Tool
- Chapter 4 Review
- Chapter 5 Cryptography
- Chapter 6 Applied Cryptography
- Chapter 7 Public Key Infrastructure
- Chapter 8 Physical Security
-
Chapter 9 Network Fundamentals
- Network Architectures
- Network Topology
- Segregation/Segmentation/Isolation
- Security Zones
- Network Protocols
- Internet Protocol
- IPv4 vs. IPv6
- Packet Delivery
- Inter-Networking
- MPLS
- Software-Defined Networking (SDN)
- Quality of Service (QoS)
- Traffic Engineering
- Route Security
- For More Information
- Chapter 9 Review
- Chapter 10 Infrastructure Security
-
Chapter 11 Authentication and Remote Access
- User, Group, and Role Management
- Account Policies
- Authorization
- Identity
- Authentication Methods
- Biometric Factors
- Biometric Efficacy Rates
- Multifactor Authentication
- Remote Access
- Preventing Data Loss or Theft
- Database Security
- Cloud vs. On-premises Requirements
- Connection Summary
- For More Information
- Chapter 11 Review
-
Chapter 12 Wireless Security and Mobile Devices
- Connection Methods and Receivers
- Wireless Protocols
-
Wireless Systems Configuration
- Access Point
- SSID
- Fat vs. Thin
- Controller Based vs. Standalone
- Signal Strength
- Band Selection/Width
- Antenna Types and Placement
- Power-Level Controls
- Wi-Fi Analyzers
- Channel Overlays
- Wireless Access Point (WAP) Placement
- Site Surveys
- Heat Maps
- Controller and Access Point Security
- MAC Filtering
- Captive Portals
- Securing Public Wi-Fi
- Wireless Attacks
-
Mobile Device Management Concepts
- Application Management
- Full Device Encryption (FDE)
- Content Management
- Remote Wipe
- Geofencing
- Geolocation
- Geo-Tagging
- Screen Locks
- Push Notification Services
- Passwords and PINs
- Biometrics
- Context-Aware Authentication
- Containerization
- Storage Segmentation
- Asset Control
- Device Access Control
- Removable Storage
- Disabling Unused Features
- Mobile Application Security
- Mobile Devices
- Policies for Enforcement and Monitoring
- Deployment Models
- Chapter 12 Review
- Chapter 13 Intrusion Detection Systems and Network Security
-
Chapter 14 System Hardening and Baselines
- Overview of Baselines
- Hardware/Firmware Security
- Operating System and Network Operating System Hardening
- Secure Baseline
- Endpoint Protection
- Network Hardening
- Application Hardening
- Data-Based Security Controls
- Environment
- Automation/Scripting
- Alternative Environments
- Industry-Standard Frameworks and Reference Architectures
- Benchmarks/Secure Configuration Guides
- For More Information
- Chapter 14 Review
-
Chapter 15 Types of Attacks and Malicious Software
- Avenues of Attack
- Malicious Code
- Malware
-
Attacking Computer Systems and Networks
- Denial-of-Service Attacks
- Social Engineering
- Sniffing
- Spoofing
- MAC Spoofing
- TCP/IP Hijacking
- Man-in-the-Middle Attacks
- Man-in-the-Browser
- Replay Attacks
- Transitive Access
- Scanning Attacks
- Attacks on Encryption
- Address System Attacks
- Cache Poisoning
- Amplification
- Domain Hijacking
- Pass-the-Hash Attacks
- Software Exploitation
- Client-Side Attacks
- Driver Manipulation
- Advanced Persistent Threat
- Password Attacks
- Chapter 15 Review
- Chapter 16 Security Tools and Techniques
- Chapter 17 Web Components, E-mail, and Instant Messaging
- Chapter 18 Cloud Computing
-
Chapter 19 Secure Software Development
- The Software Engineering Process
- Secure Coding Concepts
- Application Attacks
- Application Hardening
- Code Quality and Testing
- Compiled Code vs. Runtime Code
- Software Diversity
- Secure DevOps
- Elasticity
- Scalability
- Version Control and Change Management
- Provisioning and Deprovisioning
- Integrity Measurement
- For More Information
- Chapter 19 Review
-
Chapter 20 Risk Management
- An Overview of Risk Management
- Risk Management Vocabulary
- What Is Risk Management?
- Security Controls
- Business Risks
- Third-party Risks
- Risk Mitigation Strategies
- Risk Management Models
- Risk Assessment
- Qualitatively Assessing Risk
- Quantitatively Assessing Risk
- Qualitative vs. Quantitative Risk Assessment
- Tools
- Risk Management Best Practices
- Additional References
- Chapter 20 Review
-
Chapter 21 Business Continuity, Disaster Recovery, and Change Management
- Business Continuity
- Continuity of Operations Planning (COOP)
- Disaster Recovery
- Why Change Management?
- The Key Concept: Separation of Duties
- Elements of Change Management
- Implementing Change Management
- The Purpose of a Change Control Board
- The Capability Maturity Model Integration
- Environment
- Secure Baseline
- Sandboxing
- Integrity Measurement
- Chapter 21 Review
- Chapter 22 Incident Response
- Chapter 23 Computer Forensics
- Chapter 24 Legal Issues and Ethics
-
Chapter 25 Privacy
- Data Handling
- Organizational Consequences of Privacy Breaches
- Data Sensitivity Labeling and Handling
- Data Roles
- Data Destruction and Media Sanitization
-
U.S. Privacy Laws
- Fair Information Practice Principles (FIPPs)
- Privacy Act of 1974
- Freedom of Information Act (FOIA)
- Family Education Records and Privacy Act (FERPA)
- U.S. Computer Fraud and Abuse Act (CFAA)
- U.S. Children’s Online Privacy Protection Act (COPPA)
- Video Privacy Protection Act (VPPA)
- Health Insurance Portability and Accountability Act (HIPAA)
- Gramm-Leach-Bliley Act (GLBA)
- California Senate Bill 1386 (SB 1386)
- U.S. Banking Rules and Regulations
- Payment Card Industry Data Security Standard (PCI DSS)
- Fair Credit Reporting Act (FCRA)
- Fair and Accurate Credit Transactions Act (FACTA)
- International Privacy Laws
- Privacy-Enhancing Technologies
- Privacy Policies
- Privacy Impact Assessment
- Web Privacy Issues
- Privacy in Practice
- For More Information
- Chapter 25 Review
- Appendix A CompTIA Security+ Exam Objectives: SY0-601
- Appendix B About the Online Content
- Glossary
- Index
Product information
- Title: Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601), 6th Edition
- Author(s):
- Release date: July 2021
- Publisher(s): McGraw-Hill
- ISBN: 9781260474329
You might also like
book
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition
Fully updated computer security essentials—quality approved by CompTIA Learn IT security fundamentals while getting complete coverage …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …
book
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information …
book
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)), 6th Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …