𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Computer Security Fundamentals

✍ Scribed by William Easttom II


Publisher
Pearson IT Certification
Year
2023
Tongue
English
Leaves
576
Series
Pearson IT Cybersecurity Curriculum (ITCC)
Edition
5
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

Β 

Clearly explains core concepts, terminology, challenges, technologies, and skills

Β 

Covers today's latest attacks and countermeasures

Β 

The perfect beginner's guide for anyone interested in a computer security career

Β 

Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

Β 

This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned.

Β 

LEARN HOW TO

Β 

  • Identify and prioritize potential threats to your network
  • Use basic networking knowledge to improve security
  • Get inside the minds of hackers, so you can deter their attacks
  • Implement a proven layered approach to network security
  • Resist modern social engineering attacks
  • Defend against today’s most common Denial of Service (DoS) attacks
  • Halt viruses, spyware, worms, Trojans, and other malware
  • Prevent problems arising from malfeasance or ignorance
  • Choose the best encryption methods for your organization
  • Compare security technologies, including the latest security appliances
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Master basic computer forensics and know what to do if you’re attacked
  • Learn how cyberterrorism and information warfare are evolving

✦ Table of Contents


Cover Page
About This eBook
Title Page
Copyright Page
Pearson’s Commitment to Diversity, Equity, and Inclusion
Credits
Contents at a Glance
Table of Contents
About the Author
About the Technical Reviewer
Dedication Page
Acknowledgments
We Want to Hear from You!
Reader Services
Introduction
Chapter 1. Introduction to Computer Security

Introduction
How Seriously Should You Take Threats to Network Security?
Identifying Types of Threats
Assessing the Likelihood of an Attack on Your Network
Basic Security Terminology
Concepts and Approaches
How Do Legal Issues Impact Network Security?
Online Security Resources
Summary

Chapter 2. Networks and the Internet

Introduction
Network Basics
How the Internet Works
History of the Internet
Basic Network Utilities
Other Network Devices
Advanced Network Communications Topics
Cloud Computing
Summary

Chapter 3. Cyber Stalking, Fraud, and Abuse

Introduction
How Internet Fraud Works
Identity Theft
Cyber Stalking
Protecting Yourself Against Cybercrime
Summary

Chapter 4. Denial of Service Attacks

Introduction
DoS Attacks
Illustrating an Attack
Common Tools Used for DoS Attacks
DoS Weaknesses
Specific DoS Attacks
Real-World Examples of DoS Attacks
How to Defend Against DoS Attacks
Summary

Chapter 5. Malware

Introduction
Viruses
Trojan Horses
The Buffer-Overflow Attack
Spyware
Other Forms of Malware
Detecting and Eliminating Viruses and Spyware
Summary

Chapter 6. Techniques Used by Hackers

Introduction
Basic Terminology
The Reconnaissance Phase
Actual Attacks
Malware Creation
Penetration Testing
The Dark Web
Summary

Chapter 7. Industrial Espionage in Cyberspace

Introduction
What Is Industrial Espionage?
Information as an Asset
Real-World Examples of Industrial Espionage
How Does Espionage Occur?
Protecting Against Industrial Espionage
Trade Secrets
The Industrial Espionage Act
Spear Phishing
Summary

Chapter 8. Encryption

Introduction
Cryptography Basics
History of Encryption
Modern Cryptography Methods
Public Key (Asymmetric) Encryption
PGP
Legitimate Versus Fraudulent Encryption Methods
Digital Signatures
Hashing
MAC and HMAC
Steganography
Cryptanalysis
Cryptography Used on the Internet
Quantum Computing Cryptography
Summary

Chapter 9. Computer Security Technology

Introduction
Virus Scanners
Firewalls
Antispyware
IDSs
Digital Certificates
SSL/TLS
Virtual Private Networks
Wi-Fi Security
Summary

Chapter 10. Security Policies

Introduction
What Is a Policy?
Important Standards
Defining User Policies
Defining System Administration Policies
Security Breaches
Defining Access Control
Development Policies
Standards, Guidelines, and Procedures
Disaster Recovery
Zero Trust
Important Laws
Summary

Chapter 11. Network Scanning and Vulnerability Scanning

Introduction
Basics of Assessing a System
Securing Computer Systems
Scanning Your Network
Testing and Scanning Standards
Getting Professional Help
Summary

Chapter 12. Cyber Terrorism and Information Warfare

Introduction
Actual Cases of Cyber Terrorism
Weapons of Cyber Warfare
Economic Attacks
Military Operations Attacks
General Attacks
Supervisory Control and Data Acquisitions (SCADA)
Information Warfare
Actual Cases of Cyber Terrorism
Future Trends
Defense Against Cyber Terrorism
Terrorist Recruiting and Communication
TOR and the Dark Web
Summary

Chapter 13. Cyber Detective

Introduction
General Searches
Company Searches
Court Records and Criminal Checks
Usenet
Google
Maltego
Summary

Chapter 14. Introduction to Forensics

Introduction
General Guidelines
Finding Evidence on a PC
Finding Evidence in System Logs
Getting Back Deleted Files
Operating System Utilities
The Windows Registry
Mobile Forensics: Cell Phone Concepts
The Need for Forensic Certification
Expert Witnesses
Additional Types of Forensics
Summary

Chapter 15. Cybersecurity Engineering

Introduction
Defining Cybersecurity Engineering
Standards
SecML
Modeling
Summary

Glossary
Appendix A: Resources

General Computer Crime and Cyber Terrorism
General Knowledge
Cyber Stalking
Identity Theft
Port Scanners and Sniffers
Password Crackers
Countermeasures
Cyber Investigation Tools
General Tools
Virus Research

Appendix B: Answers to the Multiple Choice Questions

Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15

Index

✦ Subjects


Computer Security; Networks; Internet; Cyber Stalking; Fraud; Abuse; DoS; Denial of Service Attacks; Malware; Industrial Espionage; Encryption; Network Scanning; Cybersecurity Engineering


πŸ“œ SIMILAR VOLUMES


Computer Security Fundamentals
✍ William (Chuck) Easttom II πŸ“‚ Library πŸ“… 2011 πŸ› Pearson IT Certification 🌐 English

<P style="MARGIN: 0px">Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his ext

Computer Security Fundamentals
✍ William (Chuck) Easttom II πŸ“‚ Library πŸ“… 2011 πŸ› Pearson IT Certification 🌐 English

<P style="MARGIN: 0px">Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his ext

Computer Security Fundamentals
✍ William (Chuck) Easttom II πŸ“‚ Library πŸ“… 2016 πŸ› Pearson IT Certification 🌐 English

<p style="margin:0px;">ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Clearly explains core concepts, terminology, challenges, technologies, and skills</p> <p style="margin:0px;"> <br> </p> <p style="margin:0px;">Covers today’s latest attack

Computer Security Fundamentals
✍ William (Chuck) Easttom πŸ“‚ Library πŸ“… 2016 πŸ› Pearson IT Certification 🌐 English

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY<br>Clearly explains core concepts, terminology, challenges, technologies, and skills<br>Covers today’s latest attacks and countermeasures <br>The perfect beginner’s guide for anyone interested in a computer security career<br>Chuck Easttom brings together