Introduction |
|
xxv | |
Assessment Test |
|
xxxvi | |
|
Chapter 1 Today's Security Professional |
|
|
1 | (18) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (2) |
|
|
5 | (2) |
|
Implementing Security Controls |
|
|
7 | (1) |
|
Security Control Categories |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (3) |
|
|
12 | (1) |
|
|
12 | (2) |
|
|
14 | (5) |
|
Chapter 2 Cybersecurity Threat Landscape |
|
|
19 | (26) |
|
Exploring Cybersecurity Threats |
|
|
20 | (1) |
|
Classifying Cybersecurity Threats |
|
|
20 | (2) |
|
|
22 | (6) |
|
|
28 | (2) |
|
Threat Data and Intelligence |
|
|
30 | (1) |
|
|
31 | (2) |
|
Proprietary and Closed-Source Intelligence |
|
|
33 | (2) |
|
Assessing Threat Intelligence |
|
|
35 | (1) |
|
Threat Indicator Management and Exchange |
|
|
36 | (1) |
|
Public and Private Information Sharing Centers |
|
|
37 | (1) |
|
Conducting Your Own Research |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (5) |
|
|
45 | (20) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Potentially Unwanted Programs (PUPs) |
|
|
55 | (1) |
|
|
55 | (2) |
|
Adversarial Artificial Intelligence |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (4) |
|
Chapter 4 Social Engineering, Physical, and Password Attacks |
|
|
65 | (18) |
|
|
66 | (1) |
|
Social Engineering Techniques |
|
|
67 | (5) |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (1) |
|
|
76 | (2) |
|
|
78 | (5) |
|
Chapter 5 Security Assessment and Testing |
|
|
83 | (46) |
|
|
84 | (1) |
|
|
84 | (2) |
|
Determining Scan Frequency |
|
|
86 | (1) |
|
Configuring Vulnerability Scans |
|
|
87 | (5) |
|
|
92 | (3) |
|
Vulnerability Scanning Tools |
|
|
95 | (1) |
|
Reviewing and Interpreting Scan Reports |
|
|
96 | (10) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
Adopting the Hacker Mindset |
|
|
114 | (1) |
|
Reasons for Penetration Testing |
|
|
115 | (1) |
|
Benefits of Penetration Testing |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (2) |
|
|
124 | (5) |
|
|
129 | (50) |
|
Software Assurance Best Practices |
|
|
130 | (1) |
|
The Software Development Life Cycle |
|
|
130 | (1) |
|
Software Development Phases |
|
|
131 | (2) |
|
Software Development Models |
|
|
133 | (3) |
|
|
136 | (2) |
|
Designing and Coding for Security |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (4) |
|
Software Security Testing |
|
|
143 | (1) |
|
Analyzing and Testing Code |
|
|
143 | (1) |
|
Injection Vulnerabilities |
|
|
144 | (1) |
|
|
145 | (3) |
|
|
148 | (1) |
|
Command Injection Attacks |
|
|
149 | (1) |
|
Exploiting Authentication Vulnerabilities |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (3) |
|
Exploiting Authorization Vulnerabilities |
|
|
154 | (1) |
|
Insecure Direct Object References |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
Exploiting Web Application Vulnerabilities |
|
|
157 | (1) |
|
Cross-Site Scripting (XSS) |
|
|
158 | (2) |
|
|
160 | (1) |
|
Application Security Controls |
|
|
161 | (1) |
|
|
162 | (1) |
|
Web Application Firewalls |
|
|
163 | (1) |
|
|
163 | (3) |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
175 | (4) |
|
Chapter 7 Cryptography and the Public Key Infrastructure |
|
|
179 | (50) |
|
An Overview of Cryptography |
|
|
180 | (1) |
|
|
181 | (5) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Asymmetric Key Algorithms |
|
|
193 | (3) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (2) |
|
|
199 | (1) |
|
Advanced Encryption Standard |
|
|
200 | (1) |
|
|
200 | (3) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Digital Signature Standard |
|
|
209 | (1) |
|
Public Key Infrastructure |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
Certificate Generation and Destruction |
|
|
212 | (3) |
|
|
215 | (1) |
|
Asymmetric Key Management |
|
|
216 | (1) |
|
|
217 | (3) |
|
Emerging Issues in Cryptography |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (2) |
|
|
224 | (5) |
|
Chapter 8 Identity and Access Management |
|
|
229 | (28) |
|
|
230 | (1) |
|
Authentication and Authorization |
|
|
231 | (1) |
|
Authentication and Authorization Technologies |
|
|
232 | (4) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Multifactor Authentication |
|
|
237 | (2) |
|
|
239 | (2) |
|
|
241 | (2) |
|
Knowledge-Based Authentication |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
Account Policies and Controls |
|
|
245 | (3) |
|
|
248 | (1) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (4) |
|
Chapter 9 Resilience and Physical Security |
|
|
257 | (28) |
|
Building Cybersecurity Resilience |
|
|
258 | (2) |
|
Storage Resiliency: Backups and Replication |
|
|
260 | (6) |
|
Response and Recovery Controls |
|
|
266 | (3) |
|
Physical Security Controls |
|
|
269 | (1) |
|
|
269 | (9) |
|
|
278 | (1) |
|
|
279 | (2) |
|
|
281 | (4) |
|
Chapter 10 Cloud and Virtualization Security |
|
|
285 | (38) |
|
|
286 | (1) |
|
|
287 | (2) |
|
|
289 | (1) |
|
|
289 | (4) |
|
|
293 | (2) |
|
Shared Responsibility Model |
|
|
295 | (3) |
|
Cloud Standards and Guidelines |
|
|
298 | (2) |
|
|
300 | (1) |
|
|
300 | (2) |
|
Cloud Infrastructure Components |
|
|
302 | (1) |
|
|
302 | (2) |
|
|
304 | (3) |
|
|
307 | (4) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
Cloud Access Security Brokers |
|
|
314 | (1) |
|
|
314 | (2) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (2) |
|
|
318 | (5) |
|
Chapter 11 Endpoint Security |
|
|
323 | (38) |
|
|
324 | (1) |
|
Preserving Boot Integrity |
|
|
325 | (1) |
|
|
326 | (6) |
|
Hardening Endpoints and Systems |
|
|
332 | (1) |
|
|
333 | (2) |
|
Operating System Hardening |
|
|
335 | (1) |
|
Hardening the Windows Registry |
|
|
336 | (1) |
|
Configuration, Standards, and Schemas |
|
|
336 | (2) |
|
Disk Security and Sanitization |
|
|
338 | (3) |
|
File Manipulation and Other Useful Command-Line Tools |
|
|
341 | (2) |
|
Scripting, Secure Transport, and Shells |
|
|
343 | (1) |
|
Securing Embedded and Specialized Systems |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (2) |
|
Securing the Internet of Things |
|
|
348 | (1) |
|
|
349 | (1) |
|
Communication Considerations |
|
|
350 | (1) |
|
Security Constraints of Embedded Systems |
|
|
351 | (1) |
|
|
352 | (2) |
|
|
354 | (2) |
|
|
356 | (5) |
|
Chapter 12 Network Security |
|
|
361 | (58) |
|
Designing Secure Networks |
|
|
363 | (2) |
|
|
365 | (1) |
|
|
366 | (1) |
|
Port Security and Port-Level Protections |
|
|
367 | (2) |
|
Port Spanning/Port Mirroring |
|
|
369 | (1) |
|
|
370 | (1) |
|
Network Appliances and Security Tools |
|
|
371 | (6) |
|
Network Security, Services, and Management |
|
|
377 | (5) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (5) |
|
Attacking and Assessing Networks |
|
|
389 | (1) |
|
|
389 | (2) |
|
Domain Name System Attacks |
|
|
391 | (2) |
|
|
393 | (1) |
|
Distributed Denial-of-Service Attacks |
|
|
394 | (4) |
|
Network Reconnaissance and Discovery Tools and Techniques |
|
|
398 | (13) |
|
|
411 | (1) |
|
|
412 | (2) |
|
|
414 | (5) |
|
Chapter 13 Wireless and Mobile Security |
|
|
419 | (30) |
|
Building Secure Wireless Networks |
|
|
420 | (1) |
|
|
421 | (4) |
|
|
425 | (1) |
|
Attacks Against Wireless Networks |
|
|
426 | (4) |
|
|
430 | (2) |
|
Controller and Access Point Security |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
434 | (2) |
|
Managing Secure Mobile Devices |
|
|
436 | (1) |
|
Mobile Device Deployment Methods |
|
|
436 | (2) |
|
|
438 | (4) |
|
Specialized Mobile Device Security Tools |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
443 | (2) |
|
|
445 | (4) |
|
Chapter 14 Incident Response |
|
|
449 | (36) |
|
|
450 | (1) |
|
The Incident Response Process |
|
|
451 | (6) |
|
Attack Frameworks and Identifying Attacks |
|
|
457 | (4) |
|
Incident Response Data and Tools |
|
|
461 | (1) |
|
Security Information and Event Management Systems |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
465 | (8) |
|
|
473 | (4) |
|
|
477 | (1) |
|
|
478 | (2) |
|
|
480 | (5) |
|
Chapter 15 Digital Forensics |
|
|
485 | (26) |
|
Digital Forensic Concepts |
|
|
486 | (1) |
|
Legal Holds and e-Discovery |
|
|
487 | (1) |
|
Conducting Digital Forensics |
|
|
488 | (1) |
|
|
489 | (4) |
|
|
493 | (3) |
|
Validating Forensic Data Integrity |
|
|
496 | (3) |
|
|
499 | (1) |
|
Forensic Suites and a Forensic Case Example |
|
|
499 | (5) |
|
|
504 | (1) |
|
Digital Forensics and Intelligence |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
505 | (2) |
|
|
507 | (4) |
|
Chapter 16 Security Policies, Standards, and Compliance |
|
|
511 | (28) |
|
Understanding Policy Documents |
|
|
512 | (1) |
|
|
512 | (3) |
|
|
515 | (2) |
|
|
517 | (1) |
|
|
518 | (1) |
|
Exceptions and Compensating Controls |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
Job Rotation and Mandatory Vacations |
|
|
521 | (1) |
|
|
522 | (1) |
|
Onboarding and Offboarding |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
Third-Party Risk Management |
|
|
523 | (1) |
|
Winding Down Vendor Relationships |
|
|
524 | (1) |
|
Complying with Laws and Regulations |
|
|
524 | (1) |
|
Adopting Standard Frameworks |
|
|
525 | (1) |
|
NIST Cybersecurity Framework |
|
|
525 | (3) |
|
NIST Risk Management Framework |
|
|
528 | (1) |
|
|
529 | (2) |
|
Benchmarks and Secure Configuration Guides |
|
|
531 | (1) |
|
Security Control Verification and Quality Control |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
535 | (4) |
|
Chapter 17 Risk Management and Privacy |
|
|
539 | (26) |
|
|
540 | (1) |
|
|
541 | (1) |
|
|
542 | (1) |
|
|
543 | (4) |
|
|
547 | (1) |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
549 | (1) |
|
|
550 | (2) |
|
Disaster Recovery Planning |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
Sensitive Information Inventory |
|
|
554 | (1) |
|
Information Classification |
|
|
554 | (2) |
|
Data Roles and Responsibilities |
|
|
556 | (1) |
|
|
557 | (1) |
|
Privacy Enhancing Technologies |
|
|
557 | (1) |
|
Privacy and Data Breach Notification |
|
|
558 | (1) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
560 | (5) |
|
Appendix Answers to Review Questions |
|
|
565 | (38) |
|
Chapter 1 Today's Security Professional |
|
|
566 | (1) |
|
Chapter 2 Cybersecurity Threat Landscape |
|
|
567 | (2) |
|
|
569 | (3) |
|
Chapter 4 Social Engineering, Physical, and Password Attacks |
|
|
572 | (2) |
|
Chapter 5 Security Assessment and Testing |
|
|
574 | (2) |
|
|
576 | (2) |
|
Chapter 7 Cryptography and the Public Key Infrastructure |
|
|
578 | (1) |
|
Chapter 8 Identity and Access Management |
|
|
579 | (3) |
|
Chapter 9 Resilience and Physical Security |
|
|
582 | (2) |
|
Chapter 10 Cloud and Virtualization Security |
|
|
584 | (2) |
|
Chapter 11 Endpoint Security |
|
|
586 | (3) |
|
Chapter 12 Network Security |
|
|
589 | (2) |
|
Chapter 13 Wireless and Mobile Security |
|
|
591 | (3) |
|
Chapter 14 Incident Response |
|
|
594 | (2) |
|
Chapter 15 Digital Forensics |
|
|
596 | (2) |
|
Chapter 16 Security Policies, Standards, and Compliance |
|
|
598 | (2) |
|
Chapter 17 Risk Management and Privacy |
|
|
600 | (3) |
Index |
|
603 | |