CompTIA Security+ Guide To Network Security
CompTIA Security+ Guide To Network Security
CompTIA Security+ Guide To Network Security
Security+ Guide to
Network Security Fundamentals
INFORMATION SECURITY
Sixth Edition
Mark Ciampa
Sixth
Edition
CIAMPA
malware.
2 Analyze
11
15
Understand
Analyze
Understand
Apply/Understand
Create
Apply
3
4
5
9
10
Understand
Understand
Understand
Understand
Understand
Understand
Apply
Analyze
Apply
Analyze/Evaluate
8
13
14
Evaluate
Analyze/Evaluate
Evaluate
2.3 Given a scenario, troubleshoot common security issues. 15
Analyze
2.4 Given a scenario, analyze and interpret output from
security technologies. 6
7
9
Analyze
Analyze
Analyze
Apply/Evaluate
Analyze/Create
Analyze
Apply
Analyze
configuration guides.
1
15
Analyze
Understand
13
Analyze
Apply
Apply/Evaluate
Apply
INFORMATION SECURITY
Sixth Edition
SECURITY+ GUIDE TO
NETWORK SECURITY
CompTIA ®
FUNDAMENTALS
Mark Ciampa
ISBN: 978-1-337-28878-1
LLF ISBN: 978-1-337-68585-6
Cengage
20 Channel Center Street
Boston, MA 02210
USA
Brief Contents
INTRODUCTION....................................................................
.........................xv
PART 1
Introduction to Security
................................................................................3
CHAPTER 2
PART 2
CRYPTOGRAPHY
.......................................................................................... 97
CHAPTER 3
Basic Cryptography
..................................................................................... 99
CHAPTER 4
PART 3
CHAPTER 5
CHAPTER 7
CHAPTER 8
PART 4
DEVICE
SECURITY.............................................................................
.......... 371
CHAPTER 9
iii
CHAPTER 10
PART 5
CHAPTER 11
CHAPTER 12
Access Management
..................................................................................521
PART 6
RISK MANAGEMENT
...................................................................................563
CHAPTER 13
CHAPTER 14
Business Continuity
...................................................................................607
CHAPTER 15
Risk Mitigation
...........................................................................................65
1
APPENDIX A
GLOSSARY
................................................................ ...............................
.......... 713
INDEX
...............................................................................................
..................741
iv
Table of Contents
INTRODUCTION....................................................................
.......................................xv
PART 1
SECURITY AND ITS THREATS
.....................................................1
CHAPTER 1
Introduction to Security
...........................................................3
Challenges of Securing Information
.............................................. .................... 8
Chapter Summary
..............................................................................................
35
Key Terms
.......................................................... .....................................
............ 37
Review
Questions................................................................................
............... 37
Case Projects
........................................................................ .......................
....... 46
CHAPTER 2
Table of Contentsvi
Concealment
............................................................................. ..................
..... 65
Payload Capabilities
.........................................................................................66
Chapter Summary
..............................................................................................
82
Key Terms
...............................................................................................
............ 84
Review Questions
....................................... .......................................................
84
Case Projects
...............................................................................................
....... 92
PART 2
CRYPTOGRAPHY
...................................................... ................97
CHAPTER 3
Basic Cryptography
.................................................................99
Defining Cryptography
.................................................................................... 101
What Is Cryptography?
................................................................................... 101
Cryptography and Security
............................................................................ 105
Cryptography Constraints
........................................ .......................................107
Cryptographic Algorithms
............................................................................... 108
Hash Algorithms
....................................................................................... ......1
10
Symmetric Cryptographic Algorithms
........................................................... 113
Asymmetric Cryptographic Algorithms
......................................................... 116
Cryptographic Attacks
..................................................................................... 123
Algorithm Attacks
...........................................................................................
123
Collision Attacks
............................................................ .................................
125
Using Cryptography
.........................................................................................
126
Encryption through Software
......................................................................... 12 7
Hardware Encryption
.....................................................................................128
Chapter Summary
............................................................................................
130
Key Terms
...............................................................................................
.......... 132
Review
Questions................................................................................
............. 133
Case Projects
...............................................................................................
..... 142
CHAPTER 4
Key Strength
...............................................................................................
.....147
Secret Algorithms
...........................................................................................14
8
Digital Certificates
...........................................................................................
152
Defining Digital Certificates
............................................................................ 152
Managing Digital Certificates
.........................................................................154
Types of Digital Certificates
............................................................................158
Chapter Summary
............................................................................................
179
Key Terms
...............................................................................................
.......... 181
Review
Questions................................................................................
............. 181
Case Projects
...............................................................................................
..... 187
PART 3
CHAPTER 5
Interception
...............................................................................................
.....194
Poisoning
...............................................................................................
........ 196
Server Attacks
...............................................................................................
... 201
Denial of Service (DoS)
...................................................................................201
Web Server Application Attacks
.................................................................... 203
Hijacking
...............................................................................................
.........209
Overflow Attacks
..................................................... .......................................
213
Advertising Attacks
.........................................................................................
215
Browser Vulnerabilities
.......................................................................... ........218
Chapter Summary
............................................................................................
222
Table of Contentsviii
Key Terms
...............................................................................................
.......... 223
Review
Questions........................................ ........................................
............. 223
Case Projects
...............................................................................................
..... 229
CHAPTER 6
Key Terms
...............................................................................................
.......... 271
Review
Questions................................................................................
............. 271
Case Projects
...............................................................................................
..... 279
CHAPTER 7
Chapter Summary
............................................................................................
309
Table of Contents ix
Key Terms
.............................................................................. .................
.......... 310
Review
Questions................................................................................
............. 311
Case Projects
.............................................................................................. .
..... 318
CHAPTER 8
Bluetooth
Attacks...................................................................................
........ 324
Near Field Communication (NFC) Attacks
.....................................................327
Radio Frequency Identification (RFID) Attacks
.................................... ......... 330
Wireless Local Area Network Attacks
.............................................................332
Wireless Security
Solution
s ........................................................................... . 346
Wi-Fi Protected Access (WPA)
....................................................................... 347
Wi-Fi Protected Access 2 (WPA2)
................................................................... 349
Additional Wireless Security Protections
.......................................................352
Chapter Summary
............................................................................................
356
Key Terms
....................................................................... ........................
.......... 359
Review
Questions................................................................................
............. 359
Case Projects
....................................................................................... ........
..... 368
PART 4
DEVICE SECURITY
...................................................................371
CHAPTER 9
Physical Security
..............................................................................................
392
External Perimeter Defenses
......................................................................... 393
Internal Physical Access Security
.................................................................. 395
Computer Hardware Security
.............................. ......................................... 400
Application Security
.........................................................................................
401
Application Development Concepts
............................................................. .402
Chapter Summary
............................................................... .............................
406
Key Terms
...............................................................................................
.......... 409
Review
Questions................................................................................
............. 410
Case Projects
...............................................................................................
..... 417
CHAPTER 10
Chapter Summary
............................................................................................
455
Key Terms
...............................................................................................
.......... 457
Review
Questions................................................................................
............. 457
Case Projects
...............................................................................................
..... 465
PART 5
CHAPTER 11
Table of Contents xi
Single Sign-on
..................................... ..........................................................
.... 500
Account Management
..................................................................................... 502
Chapter Summary
.............................................................. ..............................
505
Key Terms
...............................................................................................
........... 506
Review
Questions................................................................................
............. 507
Case Projects
...............................................................................................
..... 517
CHAPTER 12
Access Management
.............................................................521
What Is Access Control?
.................................................................................. 523
Chapter Summary
...................................................................... ......................
552
Key Terms
...............................................................................................
.......... 554
Review
Questions................................................................................
............. 554
Case Projects
...............................................................................................
..... 561
Table of Contentsxii
PART 6
RISK MANAGEMENT
..............................................................563
CHAPTER 13
Vulnerability Scanning
.................................................................................... 584
Penetration Testing
....................................................................... ..................
586
Chapter Summary
................................................... .........................................
596
Key Terms
...............................................................................................
.......... 598
Review
Questions....................................................................... .........
............. 598
Case Projects
...............................................................................................
..... 604
CHAPTER 14
Business Continuity
..............................................................607
What Is Business Continuity?
......................................................................... 609
Environmental Controls
.................................................................................. 628
Fire Suppression
............................................................................................
628
Electromagnetic Disruption Protection
................................................ ..........631
HVAC
...............................................................................................
................631
Incident Response
...........................................................................................
633
What Is Forensics?
.........................................................................................
633
Chapter Summary
............................................................................................
640
Key Terms
...............................................................................................
.......... 642
Review
Questions................................................................................
............. 643
Case Projects
...............................................................................................
..... 649
CHAPTER 15
Risk Mitigation
......................................................................651
Managing Risk
...............................................................................................
... 653
Threat Assessment
.................................. ...................................................... 654
Risk Assessment
............................................................................................
656
Chapter Summary
............................................................................................
680
Key Terms
...............................................................................................
.......... 682
Review
Questions......................... .......................................................
............. 682
Case Projects
...............................................................................................
..... 688
APPENDIX A
GLOSSARY
...............................................................................................
.......... 713
INDEX
...............................................................................................
.................. 741
88781_fm_hr_i-xxvi.indd 13 8/16/17 7:01 PM
xv
INTRODUCTION
Introductionxvi
Intended Audience
This book is designed to meet the needs of students and
professionals who want to
master basic information security. A fundamental knowledge of
computers and net-
works is all that is required to use this book. Those seeking to
pass the CompTIA Secu-
rity+ certification exam will find the text’s approach and
content especially helpful; all
Security+ SY0-501 exam objectives are covered in the text (see
Appendix A). Security+
Guide to Network Security Fundamentals, Sixth Edition covers
all aspects of network and
computer security while satisfying the Security+ objectives.
Chapter Descriptions
Here is a summary of the topics covered in each chapter of this
book:
Introduction xvii
Introductionxviii
• Key Terms. All the terms in each chapter that were introduced
with bold text are
gathered in a Key Terms list, providing additional review and
highlighting key con-
cepts. Key Term definitions are included in the Glossary at the
end of the text.
Introduction xix
security software
• More Case Projects in each chapter
• Expanded Information Security Community Site activity in
each chapter allows
learners to interact with other learners and security
professionals from around the
world
The Case Projects icon marks Case Projects, which are scenario -
based assignments. In these extensive case examples, you are
asked to implement independently what you have learned.
Hands-On Projects
Case Projects
Certification
Note
Tip
Caution
Introductionxx
Instructor’s Materials
Everything you need for your course in one place. This
collection of book-specific
lecture and class tools is available online. Please visit
login.cengage.com and log in to
access instructor-specific resources on the Instructor
Companion Site, which includes
the Instructor’s Manual,