TIENE EN SU CESTA DE LA COMPRA
en total 0,00 €
An accessible introduction to cybersecurity concepts and practices
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
Learn security and surveillance fundamentals
Secure and protect remote access and devices
Understand network topologies, protocols, and strategies
Identify threats and mount an effective defense
Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
Introduction xix
PART I SECURING THE INFRASTRUCTURE 1
Chapter 1 Infrastructure Security in the Real World 3
Security Challenges 3
Infrastructure Security Scenario 1 4
Infrastructure Security Scenario 2 6
Summary 8
Chapter 2 Understanding Access-Control and Monitoring Systems 9
A Quick Primer on Infrastructure Security 9
Access Control 12
Security Policies 14
Physical Security Controls 15
Locks and Keys 16
Standard Key-Locking Deadbolts 17
Solenoid-Operated Deadbolt Locks 18
Cipher Locks 19
Access-Control Gates 20
Sliding Gates 20
Swinging Gates 21
Control Relays 21
Authentication Systems 23
Magnetic Stripe Readers 24
Smart Cards 25
RFID Badges 26
Biometric Scanners 27
Remote-Access Monitoring 29
Opened- and Closed-Condition Monitoring 30
Automated Access-Control Systems 32
Hands-On Exercises 33
Discussion 34
Procedure 35
Review Questions 43
Chapter 3 Understanding Video Surveillance Systems 45
Video Surveillance Systems 45
Cameras 46
Hands-On Exercises 60
Discussion 61
Procedure 61
Review Questions 69
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
Intrusion-Detection and Reporting Systems 71
Security Controllers 74
Sensors 77
Vehicle-Detection Sensors 82
Fire-Detection Sensors 85
Output Devices 87
Hands-On Exercises 90
Discussion 90
Procedure 92
Review Questions 94
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
Summary Points 97
Security Challenge Scenarios 101
Infrastructure Security Scenario 1 101
Infrastructure Security Scenario 2 102
Professional Feedback 102
Review Questions 107
Exam Questions 109
PART II SECURING LOCAL HOSTS 113
Chapter 6 Local Host Security in the Real World 115
Security Challenges 115
Computing Device Security Scenario 1 116
Computing Device Security Scenario 2 117
Summary 120
Chapter 7 Securing Devices 121
The Three Layers of Security 121
Securing Host Devices 123
Securing Outer-Perimeter Portals 124
Additional Inner-Perimeter Access Options 127
Hands-On Exercises 137
Objectives 137
Procedure 137
Review Questions 148
Chapter 8 Protecting the Inner Perimeter 149
The Inner Perimeter 149
Operating Systems 151
Operating System Security Choices 168
Common Operating System Security Tools 169
Using Local Administrative Tools 177
Implementing Data Encryption 182
Hands-On Exercises 188
Objectives 188
Resources 188
Discussion 189
Procedures 190
Tables 200
Lab Questions 201
Chapter 9 Protecting Remote Access 203
Protecting Local Computing Devices 203
Using a Secure Connection 204
Establishing and Using a Firewall 204
Installing and Using Anti-Malware Software 205
Removing Unnecessary Software 205
Disabling Nonessential Services 205
Disabling Unnecessary OS Default Features 205
Securing the Web Browser 205
Applying Updates and Patches 206
Requiring Strong Passwords 206
Implementing Local Protection Tools 206
Software-Based Local Firewalls 207
Using Local Intrusion-Detection Tools 209
Profile-Based Anomaly-Detection Systems 210
Threshold-Based Anomaly-Detection Systems 211
Configuring Browser Security Options 211
Configuring Security Levels 213
Configuring Script Support 214
Defending Against Malicious Software 218
Using Antivirus Programs 220
Using Antispyware 221
Hardening Operating Systems 222
Service Packs 222
Patches 222
Updates 223
Overseeing Application Software Security 223
Software Exploitation 223
Applying Software Updates and Patches 224
Hands-On Exercises 225
Objectives 225
Resources 225
Discussion 225
Procedures 226
Tables 241
Lab Questions 242
Chapter 10 Local Host Security: Review Questions and Hands-On Exercises 243
Summary Points 243
Security Challenge Scenarios 248
Computing Device Security Scenario 1 248
Computing Device Security Scenario 2 248
Professional Feedback 248
Review Questions 257
Exam Questions 259
PART III SECURING LOCAL NETWORKS 263
Chapter 11 Local Network Security in the Real World 265
Security Challenges 266
Local Network Security Scenario 1 266
Local Network Security Scenario 2 270
Summary 272
Chapter 12 Networking Basics 273
Understanding the Basics of Networking 273
Campus Area Networks or Corporate Area Networks (CANs) 274
Metropolitan Area Networks (MANs) 274
Wireless Local Area Networks (WLANs) 274
Storage Area Networks (SANs) 274
The OSI Networking Model 275
Layer 1: Physical 276
Layer 2: Data Link 276
Layer 3: Network 276
Layer 4: Transport 276
Layer 5: Session 276
Layer 6: Presentation 277
Layer 7: Application 277
Data Transmission Packets 277
OSI Layer Security 278
Network Topologies 280
Bus Topology 280
Ring Topology 280
Star Topology 281
Mesh Topology 282
Logical Topologies 282
Hands-On Exercises 283
Objectives 283
Resources 283
Discussion 283
Procedure 284
Lab Questions 295
Lab Answers 295
Chapter 13 Understanding Networking Protocols 297
The Basics of Networking Protocols 297
MAC Addresses 298
TCP/IP 299
Ethernet 309
Network Control Strategies 311
Hands-On Exercises 313
Objectives 313
Discussion 313
Procedures 314
Lab Questions 325
Lab Answers 326
Chapte