v Brief Contents Chapter 1 Introduction to Cybersecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Chapter 2 Information Security Fundamentals. . . . . . . . . . . . . . . . . . . . . . .32 Chapter 3 Managing User Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70 Chapter 4 Command Line Interface Management. . . . . . . . . . . . . . . . . . . 108 Chapter 5 Controlling Physical Environments and User Actions. . . . . . . . . . 146 Chapter 6 Protecting Host Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Chapter 7 Security Vulnerabilities and Protection of Nontraditional Hosts. . . . 218 Chapter 8 Overview of Network Security and Network Threats . . . . . . . . .248 Chapter 9 Protecting Network Services and Infrastructure from Attacks. . . .286 Chapter 10 Wireless Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 Chapter 11 Encryption and Cryptography. . . . . . . . . . . . . . . . . . . . . . . . .350 Chapter 12 Threats to Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .386 Chapter 13 Penetration Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 Chapter 14 Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .450 Chapter 15 Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .480 Chapter 16 Business Continuity and Disaster Recovery . . . . . . . . . . . . . . . .504 Chapter 17 Incident Response and Computer Forensics . . . . . . . . . . . . . . . .534 Chapter 18 Career and Workplace Considerations. . . . . . . . . . . . . . . . . . .564