x Quick Look Chapter 1 Introduction to Cybersecurity 1.1.1 Hacking Tools . . . . . . . . . . . . . . . . . . . . . . . . . . .5 1.1.2 Time Line of Early Cyberattacks. . . . . . . . . . . .7 1.1.3 Exploring Tor Traffi c. . . . . . . . . . . . . . . . . . . . . 10 1.1.5 Report on Cyberwarfare . . . . . . . . . . . . . . . . . 14 1.1.6 Bug-Bounty Program . . . . . . . . . . . . . . . . . . . . 16 1.2.1 Installing VirtualBox . . . . . . . . . . . . . . . . . . . .21 1.3.1 Soft Skills Self-Assessment . . . . . . . . . . . . . . .25 Chapter 2 Information Security Fundamentals 2.1.1 Frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 2.2.1 Macro Programming . . . . . . . . . . . . . . . . . . . .43 2.2.2 Antimalware Software. . . . . . . . . . . . . . . . . . .45 2.2.3 Cookie Policy . . . . . . . . . . . . . . . . . . . . . . . . . . .47 2.2.4 Cookies with Google Chrome. . . . . . . . . . . . .49 2.2.5 Personal Data Online . . . . . . . . . . . . . . . . . . . .54 2.2.6 Advanced Internet Search . . . . . . . . . . . . . . . .56 2.3.1 State Security Laws. . . . . . . . . . . . . . . . . . . . . .65 Chapter 3 Managing User Security 3.1.1 Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 3.1.2 Emerging Authentication Methods . . . . . . . .77 3.1.3 Mandatory Vacations . . . . . . . . . . . . . . . . . . . .80 3.1.4 Local User Accounts. . . . . . . . . . . . . . . . . . . . .84 3.1.5 Secondary Logon . . . . . . . . . . . . . . . . . . . . . . .85 3.1.6 Local Password Policies . . . . . . . . . . . . . . . . . .89 3.1.7 User Account Control Settings . . . . . . . . . . . .91 3.2.1 Share Permissions. . . . . . . . . . . . . . . . . . . . . . .95 3.2.2 Shared Folders on a System. . . . . . . . . . . . . . .98 3.2.3 NTFS Permission Settings . . . . . . . . . . . . . . . .99 3.2.4 Effective User Rights . . . . . . . . . . . . . . . . . . . 102 Chapter 4 Command Line Interface Management 4.1.1 Command Prompt Options. . . . . . . . . . . . . . 111 4.1.2 Navigational Commands. . . . . . . . . . . . . . . . 114 4.1.3 Commands in Batch Files . . . . . . . . . . . . . . . 117 4.2.1 PowerShell Cmdlets and Aliases . . . . . . . . .123 4.2.2 Help for PowerShell Cmdlets . . . . . . . . . . . .125 4.2.3 Advanced PowerShell Cmdlet Options. . . .129 4.2.4 PowerShell Scripts. . . . . . . . . . . . . . . . . . . . . .130 4.3.1 Linux Commands and Switches. . . . . . . . . .136 4.3.2 Linux Command Help . . . . . . . . . . . . . . . . . . 139 Chapter 5 Controlling Physical Environments and User Actions 5.1.1 Physical Access Control . . . . . . . . . . . . . . . . . 152 5.1.2 Tempest History . . . . . . . . . . . . . . . . . . . . . . .153 5.2.1 Data Centers. . . . . . . . . . . . . . . . . . . . . . . . . . .156 5.2.2 Fire Safety. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 5.3.1 Recognizing Phishing . . . . . . . . . . . . . . . . . . 163 5.3.2 Local DNS Cache. . . . . . . . . . . . . . . . . . . . . . . 165 5.3.3 School AUP . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 5.3.4 California Online Privacy Protection Act. . . 169 Chapter 6 Protecting Host Systems 6.1.1 Windows Host Services . . . . . . . . . . . . . . . . .180 6.1.2 Startup Programs and Scheduled Tasks . . . 181 6.1.3 Parameters in Performance Monitor . . . . . . 186 6.1.4 Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 6.1.5 Event Log Data . . . . . . . . . . . . . . . . . . . . . . . . 193 6.1.6 Event Log Backup . . . . . . . . . . . . . . . . . . . . . . 195 6.1.7 Audit Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 6.2.1 Out-of-Band Patches . . . . . . . . . . . . . . . . . . . .202 6.2.2 Vulnerability Scanners. . . . . . . . . . . . . . . . . .204 6.2.3 Windows Firewall. . . . . . . . . . . . . . . . . . . . . .209 6.2.4 ITAM Systems . . . . . . . . . . . . . . . . . . . . . . . . . 212 Chapter 7 Security Vulnerabilities and Protection of Nontraditional Hosts 7.1.1 Mobile Malware Threats . . . . . . . . . . . . . . . .222 7.1.2 BYOD Policies . . . . . . . . . . . . . . . . . . . . . . . . .223 7.1.3 TPM Compatibility . . . . . . . . . . . . . . . . . . . . .226 7.1.4 QR Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227 7.1.5 IoT Security Risks . . . . . . . . . . . . . . . . . . . . . .229 7.1.6 Metadata. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231 7.1.7 Tracking Software. . . . . . . . . . . . . . . . . . . . . .234 7.2.1 Retail Data Breaches . . . . . . . . . . . . . . . . . . . .237 7.2.2 Printer Security . . . . . . . . . . . . . . . . . . . . . . . .238 Chapter 8 Overview of Network Security and Network Threats 8.1.1 Decimal and CIDR Address Formats. . . . . .254 8.1.2 IPv4 Address Exploration . . . . . . . . . . . . . . .256 8.1.3 IPv6 Address Exploration . . . . . . . . . . . . . . . 261 8.1.4 Wireshark Basics . . . . . . . . . . . . . . . . . . . . . . .265 8.1.5 UDP and TCP Information in Wireshark . . .268 8.2.1 Ping and ICMP . . . . . . . . . . . . . . . . . . . . . . . .273 8.2.2 Ping Sweep Software . . . . . . . . . . . . . . . . . . . 276 8.2.3 Netstat Command. . . . . . . . . . . . . . . . . . . . . .278 8.2.4 Exploring the Telnet Interface. . . . . . . . . . . .279 Chapter 9 Protecting Network Services and Infrastructure from Attacks 9.1.1 DNS Cache and Settings . . . . . . . . . . . . . . . .290 9.1.2 DNS Response Resolution . . . . . . . . . . . . . . .292
Previous Page Next Page