Cybersecurity Essentials

Sofort lieferbar | Lieferzeit: Sofort lieferbar I
Alle Preise inkl. MwSt. | Versandkostenfrei
ISBN-13:
9781119362395
Veröffentl:
2018
Erscheinungsdatum:
01.12.2018
Seiten:
758
Autor:
Charles J. Brooks
Gewicht:
1252 g
Format:
236x182x44 mm
Sprache:
Englisch
Beschreibung:

About the Authors
 
Charles J. Brooks is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company. Christopher Grow is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience. Philip Craig is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas.Donald Short is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick.
Introduction xix
 
PART I SECURING THE INFRASTRUCTURE 1
 
Chapter 1 Infrastructure Security in the Real World 3
 
Security Challenges 3
 
Infrastructure Security Scenario 1 4
 
Infrastructure Security Scenario 2 6
 
Summary 8
 
Chapter 2 Understanding Access-Control and Monitoring Systems 9
 
A Quick Primer on Infrastructure Security 9
 
Access Control 12
 
Security Policies 14
 
Physical Security Controls 15
 
Locks and Keys 16
 
Standard Key-Locking Deadbolts 17
 
Solenoid-Operated Deadbolt Locks 18
 
Cipher Locks 19
 
Access-Control Gates 20
 
Sliding Gates 20
 
Swinging Gates 21
 
Control Relays 21
 
Authentication Systems 23
 
Magnetic Stripe Readers 24
 
Smart Cards 25
 
RFID Badges 26
 
Biometric Scanners 27
 
Remote-Access Monitoring 29
 
Opened- and Closed-Condition Monitoring 30
 
Automated Access-Control Systems 32
 
Hands-On Exercises 33
 
Discussion 34
 
Procedure 35
 
Review Questions 43
 
Chapter 3 Understanding Video Surveillance Systems 45
 
Video Surveillance Systems 45
 
Cameras 46
 
Hands-On Exercises 60
 
Discussion 61
 
Procedure 61
 
Review Questions 69
 
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
 
Intrusion-Detection and Reporting Systems 71
 
Security Controllers 74
 
Sensors 77
 
Vehicle-Detection Sensors 82
 
Fire-Detection Sensors 85
 
Output Devices 87
 
Hands-On Exercises 90
 
Discussion 90
 
Procedure 92
 
Review Questions 94
 
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
 
Summary Points 97
 
Security Challenge Scenarios 101
 
Infrastructure Security Scenario 1 101
 
Infrastructure Security Scenario 2 102
 
Professional Feedback 102
 
Review Questions 107
 
Exam Questions 109
 
PART II SECURING LOCAL HOSTS 113
 
Chapter 6 Local Host Security in the Real World 115
 
Security Challenges 115
 
Computing Device Security Scenario 1 116
 
Computing Device Security Scenario 2 117
 
Summary 120
 
Chapter 7 Securing Devices 121
 
The Three Layers of Security 121
 
Securing Host Devices 123
 
Securing Outer-Perimeter Portals 124
 
Additional Inner-Perimeter Access Options 127
 
Hands-On Exercises 137
 
Objectives 137
 
Procedure 137
 
Review Questions 148
 
Chapter 8 Protecting the Inner Perimeter 149
 
The Inner Perimeter 149
 
Operating Systems 151
 
Operating System Security Choices 168
 
Common Operating System Security Tools 169
 
Using Local Administrative Tools 177
 
Implementing Data Encryption 182
 
Hands-On Exercises 188
 
Objectives 188
 
Resources 188
 
Discussion 189
 
Procedures 190
 
Tables 200
 
Lab Questions 201
 
Chapter 9 Protecting Remote Access 203
 
Protecting Local Computing Devices 203
 
Using a Secure Connection 204
 
Establishing and Using a Firewall 204
 
Installing and Using Anti-Malware Software 205
 
Removing Unnecessary Software 205
 
Disabling Nonessential Services 205
 
Disabling Unnecessary OS Default Features 205
 
Securing the Web Browser 205
 
Applying Updates and Patches 20
Lieferung vom Verlag mit leichten Qualitätsmängeln möglich
An accessible introduction to cybersecurity concepts and practices
 
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
 
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
* Learn security and surveillance fundamentals
* Secure and protect remote access and devices
* Understand network topologies, protocols, and strategies
* Identify threats and mount an effective defense
 
Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.