Introduction |
|
xv | |
|
Chapter 1 Introduction to Information Security |
|
|
1 | (36) |
|
|
2 | (1) |
|
What Is Information Security? |
|
|
3 | (1) |
|
Information Security Terminology |
|
|
3 | (3) |
|
Critical Characteristics of Information |
|
|
6 | (1) |
|
|
7 | (1) |
|
Balancing Information Security and Access |
|
|
8 | (1) |
|
|
9 | (1) |
|
Threats to Information Security |
|
|
10 | (1) |
|
|
11 | (1) |
|
Attacks on Information Security |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks |
|
|
14 | (1) |
|
|
15 | (1) |
|
Man-in-the-Middle Attacks |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Security Professionals and the Organization |
|
|
18 | (1) |
|
|
18 | (1) |
|
Information Security Project Team |
|
|
19 | (1) |
|
Information Security Policy, Standards, and Practices |
|
|
19 | (2) |
|
Enterprise Information Security Policy (EISP) |
|
|
21 | (1) |
|
Issue-Specific Security Policy (ISSP) |
|
|
22 | (2) |
|
Systems-Specific Policy (SysSP) |
|
|
24 | (1) |
|
Frameworks and Industry Standards in Information Security |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
27 | (1) |
|
IETF Security Architecture |
|
|
28 | (1) |
|
Benchmarking and Best Business Practices |
|
|
28 | (9) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (2) |
|
Chapter 2 Introduction To Networking |
|
|
37 | (50) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
Getting the Message Across |
|
|
40 | (4) |
|
Combining Multiple Signals |
|
|
44 | (1) |
|
Impedance to Communications |
|
|
45 | (1) |
|
|
45 | (2) |
|
Networks Categorized by Components |
|
|
47 | (1) |
|
Networks Categorized by Size |
|
|
47 | (1) |
|
Networks Categorized by Topology |
|
|
48 | (1) |
|
Networks Categorized by Media |
|
|
48 | (1) |
|
|
48 | (1) |
|
The Internet Society (ISOC) |
|
|
49 | (1) |
|
Internet Assigned Numbers Authority (IANA) |
|
|
49 | (1) |
|
American National Standards Institute (ANSI) |
|
|
49 | (1) |
|
International Telecommunications Union (ITU) |
|
|
49 | (1) |
|
Institute of Electrical and Electronics Engineers (IEEE) |
|
|
50 | (1) |
|
Telecommunications Industry Association (TIA) |
|
|
50 | (1) |
|
International Organization for Standardization (ISO) |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (6) |
|
|
58 | (5) |
|
|
63 | (5) |
|
|
68 | (5) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (3) |
|
The Internet, WWW, and TCP/IP |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (7) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (46) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
92 | (3) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Book or Running Key Cipher |
|
|
99 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
104 | (3) |
|
Hybrid Cryptography Systems |
|
|
107 | (1) |
|
|
108 | (2) |
|
Multiple Encryption Methods |
|
|
110 | (1) |
|
|
110 | (1) |
|
Securing Network Communications with IPSec and SSH |
|
|
111 | (2) |
|
Securing Web Communications with SSI and S-HTTP |
|
|
113 | (1) |
|
Securing E-Mail with S/MIME and PGP |
|
|
114 | (3) |
|
Securing Wireless Networks with WEP and WPA |
|
|
117 | (1) |
|
Next-Generation Wireless Protocols |
|
|
118 | (1) |
|
|
119 | (1) |
|
Public Key Infrastructure (PKI) |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
Defending Against Attacks |
|
|
126 | (7) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
131 | (2) |
|
Chapter 4 Firewall Technologies and Administration |
|
|
133 | (38) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Restricting Access to the Network |
|
|
137 | (1) |
|
|
138 | (1) |
|
Preventing Malicious Traffic from Leaving the Network |
|
|
138 | (2) |
|
Protecting Critical Resources |
|
|
140 | (1) |
|
|
140 | (1) |
|
Providing for Authentication |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Packet-Filtering Firewalls |
|
|
142 | (6) |
|
Application-Level Gateways |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (7) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Dual-Homed Host Firewalls |
|
|
160 | (1) |
|
Screened Subnet Firewalls (with DMZ) |
|
|
161 | (1) |
|
|
162 | (9) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (3) |
|
|
169 | (2) |
|
Chapter 5 Network Authentication and Remote Access Using VPN |
|
|
171 | (42) |
|
|
172 | (1) |
|
|
173 | (1) |
|
Categories of Access Control |
|
|
174 | (4) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (2) |
|
Implementing Authentication |
|
|
182 | (7) |
|
|
189 | (1) |
|
|
190 | (1) |
|
VPN Components and Operations |
|
|
191 | (2) |
|
Essential Activities of VPNs |
|
|
193 | (4) |
|
|
197 | (1) |
|
|
197 | (2) |
|
|
199 | (2) |
|
Tunneling Protocols Used with VPNs |
|
|
201 | (2) |
|
|
203 | (1) |
|
Benefits and Drawbacks of VPNs |
|
|
204 | (9) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Chapter 6 Network Monitoring and Intrusion Detection and Prevention Systems |
|
|
213 | (52) |
|
|
214 | (1) |
|
Network-Monitoring Software: Packet Sniffers |
|
|
215 | (1) |
|
Capturing Network Traffic |
|
|
215 | (1) |
|
|
215 | (2) |
|
|
217 | (3) |
|
Intrusion Detection and Prevention Systems |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (2) |
|
|
224 | (8) |
|
|
232 | (2) |
|
|
234 | (3) |
|
Selecting IDPS Approaches and Products |
|
|
237 | (3) |
|
IDPS Product Features and Quality |
|
|
240 | (2) |
|
Strengths and Limitations of IDPSs |
|
|
242 | (1) |
|
Deployment and Implementation of an IDPS |
|
|
243 | (8) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Active Intrusion Prevention |
|
|
253 | (12) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (5) |
|
|
260 | (5) |
|
Chapter 7 Wireless Network Security |
|
|
265 | (38) |
|
|
266 | (2) |
|
Wireless Technologies and Standards |
|
|
268 | (1) |
|
Wireless Modulation Technologies |
|
|
268 | (1) |
|
|
269 | (2) |
|
Wi-Fi Alliance Certifications |
|
|
271 | (1) |
|
|
271 | (2) |
|
Wireless Architectures and Topologies |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (4) |
|
|
278 | (3) |
|
Wireless Security Protocols |
|
|
281 | (1) |
|
Wired Equivalent Privacy (WEP) |
|
|
281 | (1) |
|
Wi-Fi Protected Access (WPA and WPA2) |
|
|
282 | (1) |
|
|
283 | (3) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Bluetooth Security Concerns |
|
|
289 | (1) |
|
Bluetooth Security Solutions |
|
|
290 | (13) |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (5) |
|
|
300 | (3) |
|
Chapter 8 Security of Web Applications |
|
|
303 | (44) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (2) |
|
|
307 | (3) |
|
|
310 | (2) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (4) |
|
|
319 | (1) |
|
Web Client/Server Architecture |
|
|
319 | (2) |
|
Web Programming Languages |
|
|
321 | (6) |
|
Threats and Vulnerabilities in Web Applications |
|
|
327 | (1) |
|
|
328 | (1) |
|
Cross-Site Scripting (XSS) |
|
|
329 | (1) |
|
Broken Authentication and Session Management |
|
|
330 | (1) |
|
Insecure Direct Object References |
|
|
331 | (1) |
|
Cross-Site Request Forgery (CSRF) |
|
|
332 | (1) |
|
Security Misconfiguration |
|
|
333 | (1) |
|
Insecure Cryptographic Storage |
|
|
333 | (1) |
|
Failure to Restrict URL Access |
|
|
334 | (1) |
|
Insufficient Transport Layer Protection |
|
|
334 | (1) |
|
Unvalidated Redirects and Forwards |
|
|
334 | (1) |
|
|
335 | (12) |
|
|
335 | (2) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (5) |
|
|
343 | (4) |
|
Chapter 9 Network Vulnerability Assessment |
|
|
347 | (48) |
|
|
348 | (1) |
|
|
348 | (1) |
|
Defects in Software or Firmware |
|
|
349 | (5) |
|
Errors in Configuration or Implementation |
|
|
354 | (1) |
|
Weaknesses in Processes and Procedures |
|
|
355 | (1) |
|
Finding Vulnerabilities on the Network |
|
|
356 | (1) |
|
Scanning and Analysis Tools |
|
|
356 | (16) |
|
|
372 | (2) |
|
Recommended Vulnerability Assessment Methodology |
|
|
374 | (2) |
|
Addressing Vulnerabilities |
|
|
376 | (1) |
|
|
377 | (7) |
|
Vulnerability Risk Assessment |
|
|
384 | (11) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (3) |
|
|
392 | (3) |
|
Chapter 10 Auditing, Monitoring, and Logging |
|
|
395 | (46) |
|
|
396 | (1) |
|
Monitoring Network Systems |
|
|
397 | (1) |
|
|
398 | (6) |
|
|
404 | (1) |
|
|
405 | (8) |
|
Log Management Technology |
|
|
413 | (2) |
|
Configuration and Change Management (CCM) |
|
|
415 | (1) |
|
|
415 | (2) |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
419 | (3) |
|
Systems Certification, Accreditation, and Authorization |
|
|
422 | (1) |
|
Auditing for Government and Classified Information Systems |
|
|
422 | (3) |
|
Auditing and the ISO 27000 Series |
|
|
425 | (3) |
|
|
428 | (13) |
|
|
430 | (2) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (5) |
|
|
438 | (3) |
|
Chapter 11 Contingency Planning and Networking Incident Response |
|
|
441 | (50) |
|
|
442 | (1) |
|
What Is Contingency Planning? |
|
|
443 | (2) |
|
Stages and Components of Contingency Planning |
|
|
445 | (6) |
|
Data and Application Resumption |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
451 | (3) |
|
Threats to Stored Information |
|
|
454 | (2) |
|
|
456 | (1) |
|
|
457 | (4) |
|
Network-Attached Storage and Storage Area Networks |
|
|
461 | (1) |
|
Service Level Agreements (SLAs) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
Develop IR Planning Policy |
|
|
465 | (1) |
|
Integrate the Business Impact Analysis (BIA) |
|
|
465 | (1) |
|
Identify Preventive Controls Unique to IR |
|
|
466 | (1) |
|
Organize the Computer Security Incident Response Team (CSIRT) |
|
|
466 | (1) |
|
Create IR Contingency Strategies |
|
|
466 | (1) |
|
Develop the Incident Response (IR) Plan |
|
|
467 | (12) |
|
Ensure Plan Testing, Training, and Exercises |
|
|
479 | (2) |
|
|
481 | (10) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
484 | (5) |
|
|
489 | (2) |
|
Chapter 12 Digital Forensics |
|
|
491 | (36) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
493 | (1) |
|
Interacting with Law Enforcement |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
496 | (1) |
|
|
497 | (1) |
|
Dedicated Team or Outsource? |
|
|
498 | (1) |
|
|
499 | (1) |
|
Digital Forensics Methodology |
|
|
500 | (1) |
|
|
501 | (2) |
|
|
503 | (14) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (7) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (2) |
Glossary |
|
527 | (14) |
Index |
|
541 | |