Introduction |
|
xix | |
|
Chapter 1 Understanding Core Security Principles |
|
|
1 | (18) |
|
|
1 | (3) |
|
Exploring the Security Triad |
|
|
4 | (3) |
|
Protecting Against Loss of Confidentiality |
|
|
5 | (1) |
|
Protecting Against Loss of Availability |
|
|
5 | (1) |
|
Protecting Against Loss of Integrity |
|
|
6 | (1) |
|
Implementing a Defense-in-Depth Security Strategy |
|
|
7 | (2) |
|
Enforcing the Principle of Least Privilege |
|
|
9 | (1) |
|
|
10 | (6) |
|
Reducing the Attack Surface |
|
|
11 | (3) |
|
|
14 | (2) |
|
|
16 | (1) |
|
Installing Antivirus Software |
|
|
16 | (1) |
|
The Essentials and Beyond |
|
|
16 | (3) |
|
Chapter 2 Understanding Malware and Social Engineering |
|
|
19 | (24) |
|
|
19 | (9) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Protecting Against Malware |
|
|
28 | (6) |
|
|
29 | (2) |
|
Using Microsoft Security Essentials on Desktops |
|
|
31 | (3) |
|
Thwarting Social-Engineering Attacks |
|
|
34 | (5) |
|
Social Engineering in Person |
|
|
34 | (1) |
|
Social Engineering with a Phone Call |
|
|
34 | (1) |
|
Recognizing Phishing Attempts |
|
|
35 | (3) |
|
|
38 | (1) |
|
|
39 | (2) |
|
The Essentials and Beyond |
|
|
41 | (2) |
|
Chapter 3 Understanding User Authentication |
|
|
43 | (26) |
|
Comparing the Three Factors of Authentication |
|
|
44 | (1) |
|
Using Passwords for Authentication |
|
|
45 | (14) |
|
Comparing Password Attack Methods |
|
|
45 | (2) |
|
Creating Strong Passwords |
|
|
47 | (2) |
|
Enforcing Strong Passwords |
|
|
49 | (2) |
|
Exploring Account Lockout Policies |
|
|
51 | (2) |
|
|
53 | (2) |
|
|
55 | (2) |
|
|
57 | (1) |
|
Creating a Password-Reset Disk |
|
|
58 | (1) |
|
Using Smart Cards and Token Devices for Authentication |
|
|
59 | (1) |
|
Using Biometrics for Authentication |
|
|
60 | (1) |
|
Starting Applications with Run As Administrator |
|
|
61 | (2) |
|
Preventing Time Skew with Kerberos |
|
|
63 | (1) |
|
Identifying RADIUS Capabilities |
|
|
64 | (1) |
|
Identifying Unsecure Authentication Protocols |
|
|
65 | (2) |
|
|
66 | (1) |
|
|
66 | (1) |
|
The Essentials and Beyond |
|
|
67 | (2) |
|
Chapter 4 Securing Access with Permissions |
|
|
69 | (26) |
|
Comparing NTFS Permissions |
|
|
69 | (12) |
|
Identifying Basic NTFS Permissions |
|
|
70 | (1) |
|
Identifying Advanced NTFS Permissions |
|
|
71 | (4) |
|
|
75 | (1) |
|
Enabling and Disabling Permission Inheritance |
|
|
76 | (3) |
|
|
79 | (2) |
|
|
81 | (1) |
|
Exploring Share Permissions |
|
|
81 | (6) |
|
Identifying Share Permissions |
|
|
83 | (2) |
|
Combining NTFS and Share Permissions |
|
|
85 | (2) |
|
Identifying Active Directory Permissions |
|
|
87 | (4) |
|
Viewing Active Directory Users and Computers |
|
|
87 | (1) |
|
Comparing NTFS and Active Directory Permissions |
|
|
88 | (1) |
|
Viewing Active Directory Permissions |
|
|
88 | (3) |
|
Assigning Registry Permissions |
|
|
91 | (2) |
|
The Essentials and Beyond |
|
|
93 | (2) |
|
Chapter 5 Using Audit Policies and Network Auditing |
|
|
95 | (26) |
|
|
96 | (9) |
|
Exploring Object Access Auditing |
|
|
99 | (2) |
|
Comparing Account Logon and Logon Events |
|
|
101 | (1) |
|
Exploring Directory Service Access Auditing |
|
|
102 | (1) |
|
Understanding Account Management Auditing |
|
|
103 | (1) |
|
Understanding System Events Auditing |
|
|
103 | (1) |
|
Understanding Privilege Use Auditing |
|
|
104 | (1) |
|
Understanding Policy Change Auditing |
|
|
105 | (1) |
|
Understanding Process Tracking |
|
|
105 | (1) |
|
|
105 | (5) |
|
Enabling Object Access Auditing |
|
|
107 | (1) |
|
Enabling Directory Service Access Auditing |
|
|
108 | (2) |
|
Viewing Audit Information |
|
|
110 | (1) |
|
|
111 | (3) |
|
|
113 | (1) |
|
Securing Audit Information |
|
|
113 | (1) |
|
Auditing a Network with MBSA |
|
|
114 | (3) |
|
|
116 | (1) |
|
|
116 | (1) |
|
The Essentials and Beyond |
|
|
117 | (4) |
|
Chapter 6 Protecting Clients and Servers |
|
|
121 | (26) |
|
Understanding User Account Control |
|
|
122 | (3) |
|
Understanding the Dimmed Desktop |
|
|
123 | (1) |
|
Modifying User Account Control |
|
|
123 | (2) |
|
|
125 | (5) |
|
Updating Systems with Automatic Updates |
|
|
126 | (2) |
|
Updating Systems with WSUS or SCCM |
|
|
128 | (1) |
|
Using Group Policy to Configure Clients |
|
|
129 | (1) |
|
|
130 | (5) |
|
Understanding Offline Folders |
|
|
130 | (2) |
|
Encrypting Offline Folders |
|
|
132 | (1) |
|
Using Software-Restriction Policies |
|
|
133 | (2) |
|
|
135 | (5) |
|
|
136 | (1) |
|
|
136 | (3) |
|
Using Read-Only Domain Controllers |
|
|
139 | (1) |
|
Exploring DNS Security Issues |
|
|
140 | (4) |
|
Protecting Against Email Spoofing with SPF Records |
|
|
141 | (1) |
|
Understanding Dynamic Updates |
|
|
141 | (1) |
|
Using Secure Dynamic Updates |
|
|
142 | (2) |
|
The Essentials and Beyond |
|
|
144 | (3) |
|
Chapter 7 Protecting a Network |
|
|
147 | (24) |
|
Identifying Common Attack Methods |
|
|
147 | (6) |
|
|
148 | (1) |
|
Distributed Denial of Service |
|
|
149 | (1) |
|
|
149 | (2) |
|
|
151 | (1) |
|
|
151 | (2) |
|
|
153 | (6) |
|
Comparing Hardware-Based and Software-Based Firewalls |
|
|
154 | (1) |
|
|
155 | (2) |
|
Isolating Servers on Perimeter Networks |
|
|
157 | (2) |
|
|
159 | (1) |
|
Isolating a Network with NAT |
|
|
159 | (1) |
|
Exploring Network Access Protection |
|
|
159 | (5) |
|
Understanding NAP Components |
|
|
160 | (2) |
|
Evaluating Client Health with VPN Enforcement |
|
|
162 | (1) |
|
Using Other NAP Enforcement Methods |
|
|
163 | (1) |
|
Identifying NAP Requirements |
|
|
163 | (1) |
|
Identifying Protocol Security Methods |
|
|
164 | (4) |
|
|
165 | (1) |
|
Comparing Tunneling Protocols |
|
|
166 | (1) |
|
|
167 | (1) |
|
The Essentials and Beyond |
|
|
168 | (3) |
|
Chapter 8 Understanding Wireless Security |
|
|
171 | (22) |
|
Comparing Wireless Devices |
|
|
171 | (3) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
Comparing Wireless Security Methods |
|
|
174 | (9) |
|
Understanding Encryption Keys |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
Wi-Fi Protected Access Version 2 |
|
|
177 | (1) |
|
Extended Authentication Protocol |
|
|
178 | (1) |
|
Viewing Windows 7 Wireless Settings |
|
|
179 | (4) |
|
Configuring Wireless Routers |
|
|
183 | (6) |
|
Changing the Default Administrator Password |
|
|
183 | (1) |
|
|
183 | (2) |
|
To Broadcast or Not to Broadcast |
|
|
185 | (2) |
|
|
187 | (2) |
|
Configuring Windows 7 for Wireless |
|
|
189 | (1) |
|
The Essentials and Beyond |
|
|
190 | (3) |
|
Chapter 9 Understanding Physical Security |
|
|
193 | (22) |
|
Comparing Site Security and Computer Security |
|
|
194 | (6) |
|
Understanding the Importance of Physical Security |
|
|
194 | (2) |
|
Controlling Physical Access |
|
|
196 | (3) |
|
Using Switches Instead of Hubs |
|
|
199 | (1) |
|
Using Group Policy to Enhance Computer Security |
|
|
200 | (11) |
|
Understanding Default GPOs |
|
|
200 | (1) |
|
Designing OUs and GPOs to Manage Users and Computers |
|
|
201 | (1) |
|
|
202 | (1) |
|
Moving Objects into an OU |
|
|
203 | (1) |
|
Creating GPOs to Manage Users and Computers |
|
|
203 | (1) |
|
Understanding Security Settings in a GPO |
|
|
204 | (2) |
|
Disabling Log On Locally with Group Policy |
|
|
206 | (3) |
|
Controlling Removable Storage Access with Group Policy |
|
|
209 | (2) |
|
Exploring Mobile Device Security |
|
|
211 | (2) |
|
Protecting Mobile Devices Against Malware |
|
|
212 | (1) |
|
Minimizing Risks with Bluetooth Devices |
|
|
212 | (1) |
|
The Essentials and Beyond |
|
|
213 | (2) |
|
Chapter 10 Enforcing Confidentiality with Encryption |
|
|
215 | (26) |
|
Comparing Encryption Methods |
|
|
216 | (9) |
|
Understanding Symmetric Encryption |
|
|
216 | (2) |
|
|
218 | (1) |
|
Understanding Asymmetric Encryption |
|
|
219 | (3) |
|
Using Certificates to Share Public Keys |
|
|
222 | (1) |
|
|
223 | (2) |
|
|
225 | (6) |
|
|
226 | (2) |
|
|
228 | (3) |
|
|
231 | (4) |
|
Encrypting and Decrypting Files with EFS |
|
|
232 | (1) |
|
Understanding the Recovery Agent |
|
|
233 | (1) |
|
Understanding Behavior When Files Are Moved or Copied |
|
|
233 | (2) |
|
Exploring BitLocker Drive Encryption |
|
|
235 | (3) |
|
Understanding BitLocker Requirements |
|
|
235 | (1) |
|
Understanding Recovery Keys |
|
|
236 | (1) |
|
|
237 | (1) |
|
The Essentials and Beyond |
|
|
238 | (3) |
|
Chapter 11 Understanding Certificates and a PKI |
|
|
241 | (16) |
|
Understanding a Certificate |
|
|
241 | (10) |
|
Comparing Public and Private Keys |
|
|
243 | (2) |
|
Understanding Certificate Errors |
|
|
245 | (3) |
|
Viewing Certificate Properties |
|
|
248 | (3) |
|
Exploring the Components of a PKI |
|
|
251 | (4) |
|
Understanding the Certificate Chain |
|
|
252 | (2) |
|
Comparing Certificate Services |
|
|
254 | (1) |
|
The Essentials and Beyond |
|
|
255 | (2) |
|
Chapter 12 Understanding Internet Explorer Security |
|
|
257 | (20) |
|
Exploring Browser Settings |
|
|
257 | (12) |
|
Understanding IE Enhanced Security Configuration |
|
|
259 | (1) |
|
Selecting Cookies Settings |
|
|
260 | (2) |
|
Manipulating the Pop-up Blocker |
|
|
262 | (1) |
|
Using InPrivate Filtering and InPrivate Browsing |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
266 | (2) |
|
Exploring Advanced Security Settings |
|
|
268 | (1) |
|
|
269 | (3) |
|
Using IE Tools to Identify Malicious Websites |
|
|
272 | (1) |
|
Understanding the SmartScreen Filter |
|
|
272 | (1) |
|
|
273 | (1) |
|
The Essentials and Beyond |
|
|
273 | (4) |
|
APPENDIX A Answers to Review Questions |
|
|
277 | (10) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
APPENDIX B Microsoft's Certification Program |
|
|
287 | (6) |
|
Certification Objectives Map |
|
|
288 | (5) |
Index |
|
293 | |