Download Complete Principles of Computer Security: CompTIA Security+ and Beyond Conklin PDF for All Chapters
Download Complete Principles of Computer Security: CompTIA Security+ and Beyond Conklin PDF for All Chapters
com
https://textbookfull.com/product/principles-of-computer-
security-comptia-security-and-beyond-conklin/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/comptia-security-all-in-one-exam-
guide-exam-sy0-501-wm-arthur-conklin/
textboxfull.com
CompTIA security all in one exam guide Exam SY0 501 Fifth
Edition Conklin
https://textbookfull.com/product/comptia-security-all-in-one-exam-
guide-exam-sy0-501-fifth-edition-conklin/
textboxfull.com
https://textbookfull.com/product/computer-security-principles-and-
practice-4th-edition-william-stallings/
textboxfull.com
https://textbookfull.com/product/comptia-security-guide-to-network-
security-fundamentals-mark-ciampa/
textboxfull.com
CompTIA Security 3rd Edition Anonymous
https://textbookfull.com/product/comptia-security-3rd-edition-
anonymous/
textboxfull.com
https://textbookfull.com/product/principles-of-security-and-trust-
lujo-bauer/
textboxfull.com
https://textbookfull.com/product/computer-security-javier-lopez/
textboxfull.com
https://textbookfull.com/product/principles-of-information-
security-6th-edition-whitman/
textboxfull.com
Color profile: Disabled
BaseTech
Composite Default screen / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
A Objectives Map:
CompTIA Security+
Topic Chapter(s)
1.0 Systems Security
1.1 Differentiate among various systems security threats.
Privilege escalation 15
Virus 15, 16
Worm 15, 16
Trojan 15, 16
Spyware 15, 16
Spam 15, 16
Adware 15, 16
Rootkits 15
Botnets 15
Logic bomb 15
1.2 Explain the security risks pertaining to system hardware and peripherals.
BIOS 10
USB devices 10
Cell phones 10
Removable storage 10
Network attached storage 10
1.3 Implement OS hardening practices and procedures to achieve workstation and server security.
Hotfixes 10, 14
Service packs 10, 14
Patches 10, 14
Patch management 10, 14
Group policies 14
Security templates 14
Configuration baselines 14
1.4 Carry out the appropriate procedures to establish application security.
ActiveX 17
Java 17
Scripting 17
Browser 17
Buffer overflows 17, 18
640
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
Cookies 17
SMTP open relays 17, 18
Instant messaging 16, 17
P2P 17
Input validation 17, 18
Cross-site scripting (XSS) 17
1.5 Implement security applications.
HIDS 13
Personal software firewalls 10, 13
Antivirus 10, 13
Anti-spam 10, 13
Popup blockers 10, 13
1.6 Explain the purpose and application of virtualization technology.
10
2.0 Network Infrastructure
2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.
Antiquated protocols 11
TCP/IP hijacking 11, 15
Null sessions 15
Spoofing 15
Man-in-the-middle 15
Replay 15
DOS 15
DDOS 15
Domain Name Kiting 15
DNS poisoning 15
ARP poisoning 15
2.2 Distinguish between network design elements and components.
DMZ 9
VLAN 9
NAT 9
Network interconnections 9
NAC 10
Subnetting 9
Telephony 3, 10
2.3 Determine the appropriate use of network security tools to facilitate network security.
NIDS 10, 13
NIPS 10, 13
Firewalls 10, 13
641
Appendix A: Objectives Map: CompTIA Security+
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
Proxy servers 10, 13
Honeypot 10, 13
Internet content filters 13
Protocol analyzers 10, 13
2.4 Apply the appropriate network tools to facilitate network security.
NIDS 10, 13
Firewalls 10, 13
Proxy servers 10, 13
Internet content filters 13
Protocol analyzers 10, 13
2.5 Explain the vulnerabilities and mitigations associated with network devices.
Privilege escalation 10
Weak passwords 10
Back doors 10
Default accounts 10
DOS 10
2.6 Explain the vulnerabilities and mitigations associated with various transmission media.
Vampire taps 10
2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking.
Data emanation 3, 12
War driving 12
SSID broadcast 12
Blue jacking 12
Bluesnarfing 12
Rogue access points 12
Weak encryption 12
3.0 Access Control
3.1 Identify and apply industry best practices for access control methods.
Implicit deny 1
Least privilege 1, 18, 19
Separation of duties 1, 19
Job rotation 1
3.2 Explain common access control models and the differences between each.
MAC 1, 11, 22
DAC 1, 11, 22
Role & Rule based access control 1, 11, 22
3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate
rights and privileges.
2, 11, 22
642
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
3.4 Apply appropriate security controls to file and print resources.
2, 22
3.5 Compare and implement logical access control methods.
ACL 2, 11, 22
Group policies 2, 11, 22
Password policy 2, 4, 22
Domain password policy 2, 11, 22
User names and passwords 2, 4, 22
Time of day restrictions 2, 22
Account expiration 2, 4, 22
Logical tokens 2, 11, 22
3.6 Summarize the various authentication models and identify the components of each.
One, two and three-factor authentication 11
Single sign-on 11, 22
3.7 Deploy various authentication models and identify the components of each.
Biometric reader 3, 11
RADIUS 11
RAS 11
LDAP 11
Remote access policies 11
Remote authentication 11
VPN 11
Kerberos 11
CHAP 11
PAP 11
Mutual 11
802.1x 11
TACACS 11
3.8 Explain the difference between identification and authentication (identity proofing).
11
3.9 Explain and apply physical access security methods.
Physical access logs/lists 8
Hardware locks 8
Physical access control – ID badges 8
Door access systems 8
Man-trap 8
Physical tokens 8
Video surveillance – camera types and positioning 8
4.0 Assessments & Audits
4.1 Conduct risk assessments and implement risk mitigation.
14
643
Appendix A: Objectives Map: CompTIA Security+
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
4.2 Carry out vulnerability assessments using common tools.
Port scanners 14
Vulnerability scanners 14
Protocol analyzers 14
OVAL 17
Password crackers 15
Network mappers 14
4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability
scanning.
14
4.4 Use monitoring tools on systems and networks and detect security-related anomalies.
Performance monitor 14
Systems monitor 14
Performance baseline 14
Protocol analyzers 14
4.5 Compare and contrast various types of monitoring methodologies.
Behavior-based 13
Signature-based 13
Anomaly-based 13
4.6 Execute proper logging procedures and evaluate the results.
Security application 14
DNS 14
System 14
Performance 14
Access 14
Firewall 13
Antivirus 14
4.7 Conduct periodic audits of system security settings.
User access and rights review 2, 19
Storage and retention policies 19
Group policies 19
5.0 Cryptography
5.1 Explain general cryptography concepts.
Key management 5, 6, 7
Steganography 5
Symmetric key 5
Asymmetric key 5
Confidentiality 5
Integrity and availability 5
644
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
Non-repudiation 5
Comparative strength of algorithms 5
Digital signatures 5
Whole disk encryption 5
Trusted Platform Module (TPM) 5
Single vs. Dual sided certificates 5, 6
Use of proven technologies 5
5.2 Explain basic hashing concepts and map various algorithms to appropriate applications.
SHA 5, 23
MD5 5, 23
LANMAN 5
NTLM 5
5.3 Explain basic encryption concepts and map various algorithms to appropriate applications.
DES 5
3DES 5
RSA 5
PGP 5
Elliptic curve 5
AES 5
AES256 5
One time pad 5
Transmission encryption (WEP TKIP, etc.) 5, 7
5.4 Explain and implement protocols.
SSL/TLS 5,
S/MIME 5, 7, 16
PPTP 5, 7, 11
HTTP vs. HTTPS vs. SHTTP 5, 7
L2TP 5, 11
IPSEC 5, 7, 11
SSH 5, 11
5.5 Explain core concepts of public key cryptography.
Public Key Infrastructure (PKI) 6, 16
Recovery agent 6
Public key 6
Private keys 6
Certificate Authority (CA) 6
Registration 6
Key escrow 6
Certificate Revocation List (CRL) 6
Trust models 6
645
Appendix A: Objectives Map: CompTIA Security+
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
5.6 Implement PKI and certificate management.
Public Key Infrastructure (PKI) 6, 16
Recovery agent 6
Public key 6
Private keys 6
Certificate Authority (CA) 6
Registration 6
Key escrow 6
Certificate Revocation List (CRL) 6
6.0 Organizational Security
6.1 Explain redundancy planning and its components.
Hot site 19
Cold site 19
Warm site 19
Backup generator 19
Single point of failure 19
RAID 19
Spare parts 19
Redundant servers 19
Redundant ISP 19
UPS 19
Redundant connections 19
6.2 Implement disaster recovery procedures.
Planning 19
Disaster recovery exercises 19
Backup techniques and practices – storage 19
Schemes 19
Restoration 19
6.3 Differentiate between and execute appropriate incident response procedures.
Forensics 19, 23
Chain of custody 19, 23
First responders 19, 23
Damage and loss control 19, 23
Reporting – disclosure of 19, 23
6.4 Identify and explain applicable legislation and organizational policies.
Secure disposal of computers 2
Acceptable use policies 2, 19
Password complexity 2, 4
Change management 2, 19
Classification of information 2, 19
646
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
Topic Chapter(s)
Mandatory vacations 2, 4, 19
Personally Identifiable Information (PII) 2, 25
Due care 2, 19
Due diligence 2, 19
Due process 2, 19
SLA 2, 19
Security-related HR policy 2, 4
User education and awareness training 2, 4
6.5 Explain the importance of environmental controls.
Fire suppression 3, 8
HVAC 3, 8
Shielding 3, 8
6.6 Explain the concept of and how to reduce the risks of social engineering.
Phishing 2, 4
Hoaxes 2, 4
Shoulder surfing 2, 4
Dumpster diving 2, 4
User education and awareness training 2, 4
647
Appendix A: Objectives Map: CompTIA Security+
P:\010Comp\BaseTech\375-8\App.vp
Monday, November 09, 2009 10:49:45 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Appendix
B About the CD
T he CD-ROM included with this book comes complete with MasterExam, the electronic version of the book, and
Session #1 of LearnKey’s online training. The software is easy to install on any Windows 2000/XP/Vista computer
and must be installed to access the MasterExam feature. You may, however, browse the electronic book directly from the
CD without installing the software. To register for LearnKey’s online training or the bonus MasterExam, simply click the
Bonus MasterExam link on the main launch page and follow the directions to the free online registration.
System Requirements
Software requires Windows 2000 or higher and Internet Explorer 6.0 or above and 20MB of hard disk space for full
installation. The electronic book requires Adobe Reader. To access the online training from LearnKey, you must
have Windows Media Player 9 or higher and Adobe Flash Player 9 or higher.
MasterExam
MasterExam provides you with a simulation of the actual exam. The number of questions, the type of questions,
and the time allowed are intended to be an accurate representation of the exam environment. You have the option
to take an open-book exam, including hints, references, and answers, a closed-book exam, or the timed
MasterExam simulation.
When you launch MasterExam, a digital clock display will appear in the bottom-right corner of your screen.
The clock will continue to count down to zero unless you choose to end the exam before the time expires.
648
P:\010Comp\BaseTech\375-8\AppB.vp
Thursday, November 12, 2009 3:21:25 PM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter B
■ Electronic Book
The entire contents of the textbook are provided as a PDF. Adobe Reader
has been included on the CD.
■ Help
A help file is provided through the Help button on the main page in the
lower-left corner. Individual help features are also available through
MasterExam and LearnKey’s online training.
■ Removing Installation(s)
MasterExam is installed to your hard drive. For best results removing the
program, select the Start | All Programs | LearnKey | Uninstall option to
remove MasterExam.
■ Technical Support
For questions regarding the content of the electronic book or MasterExam,
please visit www.mhprofessional.com or e-mail customer.service@mcgraw-
hill.com. For customers outside the 50 United States, e-mail international_
cs@mcgraw-hill.com.
649
Appendix B: About the CD
P:\010Comp\BaseTech\375-8\AppB.vp
Thursday, November 12, 2009 3:21:26 PM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
1 Introduction and
Security Trends
Security is mostly a superstition.
It does not exist in nature, nor
do the children of men as a whole
experience it. Avoiding danger is
no safer in the long run than
outright exposure. Life is either a
daring adventure or nothing.
—HELEN KELLER
P:\010Comp\BaseTech\375-8\ch01.vp
Tuesday, November 17, 2009 2:54:22 PM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Security Incidents
By examining some of the computer-related crimes that have been commit-
ted over the last 20 or so years, we can better understand the threats and se-
curity issues that surround our computer systems and networks. Electronic
crime can take a number of different forms but the ones we will examine
here fall into two basic categories: crimes in which the computer was the tar-
get, and incidents in which a computer was used to perpetrate the act (for
example, there are many different ways to conduct bank fraud, one of which
uses computers to access the records that banks process and maintain).
We will start our tour of computer crimes with the 1988 Internet worm
(Morris worm), one of the first real Internet crime cases. Prior to 1988 crimi-
nal activity was chiefly centered on unauthorized access to computer sys-
tems and networks owned by the telephone company and companies which
provided dial-up access for authorized users. Virus activity also existed
prior to 1988, having started in the early 1980s.
1
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:57 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Morris actually intended that his creation cause the impact that it did at the
time. The worm infected roughly 10 percent of the machines then connected
to the Internet (which amounted to approximately 6000 infected machines)
and caused an estimated $100 million in damage, though this number has
been the subject of wide debate. The worm carried no malicious payload,
the program being obviously a “work in progress,” but it did wreak havoc
because it continually reinfected computer systems until they could no lon-
ger run any programs. The worm took advantage of known vulnerabilities
in several programs to gain access to new hosts and then copied itself over.
Morris was eventually convicted under Title 10 United States Code Section
1030 for releasing the worm and was sentenced to three years’ probation, a
$10,000 fine, and 400 hours of community service.
2
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:58 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
3
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:58 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
the body of the message usually generated enough user curiosity that many
people opened the document and thus infected their system, which in turn sent
the same message to 50 of their acquaintances. As a final action, if the minute of
the current hour when the macro was run matched the day of the month, the
macro inserted “Twenty-two points, plus triple-word-score, plus fifty points
for using all my letters. Game’s over. I’m outta here.” into the current docu-
ment. Smith, who plead guilty, was ultimately fined $5000 and sentenced to
20 months in jail for the incident. Because the macro code is easy to modify,
there have been many variations of the Melissa virus. Recipients could avoid
infection by Melissa simply by not opening the attached file.
4
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:58 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
scheme actually ended up helping to eliminate the worm, because soon after
it was released on the 19th, the worm stopped trying to infect systems. This
provided a period of time when systems could be rebooted and patched be-
fore they were infected again.
5
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:58 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Conficker (2008–2009)
In late 2008 and early 2009, security experts became alarmed when it was
discovered that millions of systems attached to the Internet were infected
with the Downadup worm. Also known as Conficker, the worm was first
detected in November 2008 and was believed to have originated in Ukraine.
Infected systems were not initially damaged beyond having their antivirus
solution updates blocked. What alarmed experts was the fact that infected
systems could be used in a secondary attack on other systems or networks.
Each of these infected systems was part of what is known as a bot network
and could be used to cause a DoS attack on a target or be used for the for-
warding of spam e-mail to millions of users. It was widely believed that this
network of subverted systems would be activated on April 1, 2009, and
would result in the widespread loss of data and system connectivity. As it
turned out, very little damage was done on that date, though millions of dol-
lars were spent in responding to the millions of infected systems.
6
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:59 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Threats to Security
The incidents described in the previous section provide a glimpse into the
many different threats that face administrators as they attempt to protect
their computer systems and networks. There are, of course, the normal natu-
ral disasters that organizations have faced for years. In today’s highly net-
worked world, however, new threats have developed that we did not have
to worry about 50 years ago.
There are a number of ways that we can break down the various threats.
One way to categorize them is to separate threats that come from outside of
the organization from those that are internal. Another is to look at the vari-
ous levels of sophistication of the attacks, from those by “script kiddies” to
those by “elite hackers.” A third is to examine the level of organization of the
various threats, from unstructured threats to highly structured threats. All
of these are valid approaches, and they in fact overlap each other. The fol-
lowing sections examine threats from the perspective of where the attack
comes from.
Intruders
The act of deliberately accessing computer systems and networks without
authorization is generally referred to as hacking, with individuals who con-
duct this activity being referred to as hackers. The term hacking also applies
to the act of exceeding one’s authority in a system. This would include
7
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:50:59 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
authorized users who attempt to gain access to files they aren’t permitted to
access or who attempt to obtain permissions that they have not been
granted. While the act of breaking into computer systems and networks has
been glorified in the media and movies, the physical act does not live up to
the Hollywood hype. Intruders are, if nothing else, extremely patient, since
the process to gain access to a system takes persistence and dogged determi-
nation. The attacker will conduct many preattack activities in order to ob-
tain the information needed to determine which attack will most likely be
successful. Generally, by the time an attack is launched, the attacker will
have gathered enough information to be very confident that the attack will
succeed. If it doesn’t, the attacker will gather additional information and
take a different approach (though launching the first attack may alert secu-
rity personnel). Generally, attacks by an individual or even a small group of
attackers fall into the unstructured threat category. Attacks at this level gen-
erally are conducted over short periods of time (lasting at most a few
months), do not involve a large number of individuals, have little financial
backing, and are accomplished by insiders or outsiders who do not seek col-
lusion with insiders.
Intruders, or those who are attempting to conduct an intrusion, defi-
nitely come in many different varieties and have varying degrees of sophis-
tication (see Figure 1.1). At the low end technically are what are generally
referred to as script kiddies, individuals who do not have the technical exper-
tise to develop scripts or discover new vulnerabilities in software but who
have just enough understanding of computer systems to be able to down-
load and run scripts that others have developed. These individuals gener-
ally are not interested in attacking specific targets, but instead simply want
to find any organization that may not have patched a newly discovered vul-
nerability for which the script kiddie has located a script to
exploit the vulnerability. It is hard to estimate how many of
the individuals performing activities such as probing net-
works or scanning individual systems are part of this
group, but it is undoubtedly the fastest growing group and
the vast majority of the “unfriendly” activity occurring on
the Internet is probably carried out by these individuals.
At the next level are those people who are capable of
writing scripts to exploit known vulnerabilities. These indi-
viduals are much more technically competent than script
kiddies and account for an estimated 8 to 12 percent of ma-
licious Internet activity. At the top end of this spectrum are
those highly technical individuals, often referred to as elite
hackers, who not only have the ability to write scripts that
exploit vulnerabilities but also are capable of discovering
new vulnerabilities. This group is the smallest of the lot,
• Figure 1.1 Distribution of attacker skill levels however, and is responsible for, at most, only 1 to 2 percent
of intrusive activity.
Insiders
It is generally acknowledged by security professionals that insiders are
more dangerous in many respects than outside intruders. The reason for
this is simple—insiders have the access and knowledge necessary to cause
immediate damage to an organization. Most security is designed to protect
8
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:00 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
against outside intruders and thus lies at the boundary between the organi-
zation and the rest of the world. Insiders may actually already have all the Tech Tip
access they need to perpetrate criminal activity such as fraud. In addition to The Inside Threat
unprecedented access, insiders also frequently have knowledge of the secu- One of the hardest threats that se-
rity systems in place and are better able to avoid detection. Attacks by insid- curity professionals will have to
ers are often the result of employees who have become disgruntled with address is that of the insider.
their organization and are looking for ways to disrupt operations. It is also Since employees already have ac-
possible that an “attack” by an insider may be an accident and not intended cess to the organization and its
as an attack at all. An example of this might be an employee who deletes a assets, additional mechanisms
critical file without understanding its critical nature. need to be in place to detect at-
Employees are not the only insiders that organizations need to be con- tacks by insiders and to lessen the
cerned about. Often, numerous other individuals have physical access to ability of these attacks to succeed.
company facilities. Custodial crews frequently have unescorted access
throughout the facility, often when nobody else is around. Other individu-
als, such as contractors or partners, may have not only physical access to the
organization’s facilities but also access to computer systems and networks.
Criminal Organizations
As businesses became increasingly reliant upon computer systems and net-
works, and as the amount of financial transactions conducted via the
Internet increased, it was inevitable that criminal organizations would
eventually turn to the electronic world as a new target to exploit. Criminal
activity on the Internet at its most basic is no different from criminal activity
in the physical world. Fraud, extortion, theft, embezzlement, and forgery all
take place in the electronic environment.
One difference between criminal groups and the “average” hacker is the
level of organization that criminal elements employ in their attack. Criminal
groups typically have more money to spend on accomplishing the criminal
activity and are willing to spend extra time accomplishing the task provided
the level of reward at the conclusion is great enough. With the tremendous
amount of money that is exchanged via the Internet on a daily basis, the
level of reward for a successful attack is high enough to interest criminal ele-
ments. Attacks by criminal organizations usually fall into the structured
threat category, which is characterized by a greater amount of planning, a
longer period of time to conduct the activity, more financial backing to ac-
complish it, and possibly corruption of, or collusion with, insiders.
9
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:00 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Security Trends
The biggest change that has occurred in security over the last 30 years has
been the change in the computing environment from large mainframes to a
highly interconnected network of much smaller systems (smaller is a rela-
tive term here because the computing power of desktop computers exceeds
the power of many large mainframes of 30 years ago). What this has meant
for security is a switch from an environment in which everything was fairly
contained and people operated in a closed environment to one in which ac-
cess to a computer can occur from almost anywhere on the planet. This has,
for obvious reasons, greatly complicated the job of the security professional.
The type of individual who attacks a computer system or network has
also evolved over the last 30 years. There was, of course, the traditional in-
telligence service operator paid by a particular country to obtain secrets
from other government computer systems. These people still exist. What
has increased dramatically is the number of nonaffiliated intruders. As dis-
cussed earlier, the rise of the “script kiddie” has greatly multiplied the num-
ber of individuals who probe organizations looking for vulnerabilities to
exploit. This is actually the result of another recent trend: as the level of so-
phistication of attacks has increased, the level of knowledge necessary to
10
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:00 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
■ Avenues of Attack
There are two general reasons a particular computer system is attacked: ei-
ther it is specifically targeted by the attacker, or it is an opportunistic target.
In the first case, the attacker has chosen the target not because of the hard-
ware or software the organization is running but for another reason, per-
haps a political reason. An example of this type of attack would be an
individual in one country attacking a government system in another. Alter-
natively, the attacker may be targeting the organization as part of a
hacktivist attack. An example, in this case, might be an attacker who defaces
the web site of a company that sells fur coats because the attacker feels that
using animals in this way is unethical. Perpetrating some sort of electronic
fraud is another reason a specific system might be targeted. Whatever the
reason, an attack of this nature is decided upon before the attacker knows
what hardware and software the organization has.
11
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:01 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
12
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:01 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
13
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:01 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Types of Attacks
There are a number of ways that a computer system or network can be at-
tacked (this topic will be covered in greater detail in Chapter 15). If success-
ful, the attack may produce one of the following: a loss of confidentiality, if
information is disclosed to individuals not authorized to see it; a loss of in-
tegrity, if information is modified by individuals not authorized to change
it; or a loss of availability, if information or the systems processing it are not
available for use by authorized users when they need the information.
14
Principles of Computer Security: CompTIA Security+ and Beyond
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:01 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
Chapter 1 Review
■ Chapter Summary
After reading this chapter and completing the quizzes, ■ Numerous web sites exist that provide information
you should understand the following regarding on vulnerabilities in specific application programs
security trends. and operating systems.
■ The first step an administrator can take to
List and Discuss Recent Trends in Computer Security minimize possible attacks is to ensure that all
■ Fifty years ago, few people had access to a patches for the operating system and applications
computer system or network, so securing them are installed.
was a relatively easy matter.
■ There are many different ways to attack computers Describe Various Types of Threats That Exist for
and networks to take advantage of what has made Computers and Networks
shopping, banking, investment, and leisure ■ There are a number of different threats to security,
pursuits a simple matter of “dragging and including viruses and worms, intruders, insiders,
clicking” for many people. criminal organizations, terrorists, and information
■ The biggest change that has occurred in security warfare conducted by foreign countries.
over the last 30 years has been the change in the ■ There are two general reasons a particular
computing environment from large mainframes to computer system is attacked: it is specifically
a highly interconnected network of much smaller targeted by the attacker, or it is a target of
systems. opportunity.
■ Targeted attacks are more difficult and take more
Describe Simple Steps to Take to Minimize the time than attacks on a target of opportunity
Possibility of an Attack on a System
■ The steps an attacker takes in attempting to Discuss Recent Computer Crimes That Have Been
penetrate a targeted network are similar to the ones Committed
that a security consultant performing a penetration ■ The different types of electronic crime fall into two
test would take. main categories: crimes in which the computer was
■ A ping sweep simply sends a “ping” (an ICMP the target of the attack, and incidents in which the
echo request) to the target machine. computer was a means of perpetrating a criminal
■ A port scan will help identify which ports are act.
open, thus giving an indication of which services ■ One significant trend observed over the last several
may be running on the targeted machine. years has been the increase in the number of
computer attacks.
15
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:02 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
■ Key Terms
critical infrastructures (10) information warfare (9)
elite hackers (8) ping sweep (12)
hacker (7) port scan (12)
hacking (7) script kiddies (8)
hacktivist (11) structured threat (9)
highly structured threat (9) unstructured threat (8)
16
Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:02 AM
Color profile: Disabled
Composite Default screen
BaseTech / Principles of Computer Security: CompTIA Security+™ and Beyond / Gregory B. White / 375-8 / Chapter 1
■ Multiple-Choice Quiz
1. Which threats are characterized by possibly long 5. Which of the following is generally viewed as the
periods of preparation (years is not uncommon), first Internet worm to have caused significant
tremendous financial backing, a large and damage and to have “brought the Internet
organized group of attackers, and attempts to down”?
subvert insiders or to plant individuals inside a A. Melissa
potential target in advance of a planned attack?
B. The “Love Bug”
A. Unstructured threats
C. The Morris worm
B. Structured threats
D. Code Red
C. Highly structured threats
6. Which of the following individuals was
D. Nation-state information warfare threats convicted of various computer crimes and was
2. Which of the following is an attempt to find and known for his ability to conduct successful social
attack a site that has hardware or software that is engineering attacks?
vulnerable to a specific exploit? A. Kevin Mitnick
A. Target of opportunity attack B. Vladimir Levin
B. Targeted attack C. Timothy Lloyd
C. Vulnerability scan attack D. David Smith
D. Information warfare attack 7. According to the CSI/FBI survey, which of the
3. Which of the following threats has not grown following statistics decreased in 2003?
over the last decade as a result of increasing A. The number of organizations reporting the
numbers of Internet users? Internet as a point of attack
A. Viruses B. The number of organizations that have
B. Hackers reported unauthorized use of their systems
C. Denial-of-service attacks C. The average loss as a result of theft of
D. All of these have seen an increase over the proprietary information
last decade. D. Both B and C
4. The rise of which of the following has greatly 8. Which virus/worm was credited with reaching
increased the number of individuals who probe global proportions in less than ten minutes?
organizations looking for vulnerabilities to A. Code Red
exploit?
B. The Morris worm
A. Virus writers
C. Melissa
B. Script kiddies
D. Slammer
C. Hackers
D. Elite hackers
17
Chapter 1: Introduction and Security Trends
P:\010Comp\BaseTech\375-8\ch01.vp
Saturday, November 07, 2009 9:51:02 AM
Another Random Scribd Document
with Unrelated Content
deux grands médecins, Masséna, Augereau, le remontent à
Castiglione (4 août 96).
Paris crut que c’était la fin de la guerre. Mais non l’Europe,
puisque en octobre, l’envoyé anglais Malmesbury dit à Paris que « la
France ne pouvait espérer de paix, à moins de rendre tout : l’Italie,
les Pays-Bas, le Rhin. »
Donc ces grandes victoires de Bonaparte ont eu peu d’effet. Tout
lui reste à recommencer. Le déluge barbare qui sans cesse fond sur
lui des Alpes ne peut être arrêté. A peine il vient à bout des
Allemands de Wurmser, qu’il a sur les bras le torrent des Slaves et
Hongrois d’Alvinzi. Ces brillants coups n’expliquent rien, si l’on ne se
rend pas bien compte de la force lointaine qui, par des canaux peu
connus, leur opposait sans cesse la vaillante barbarie du Danube.
Cette roue épouvantable avait son grand moteur à Londres, où
Pitt, assis sur la masse docile des créanciers de l’État, professait,
faisait croire l’axiome de Price : « Plus on emprunte et plus on est
riche. »
Obscur et poétique mystère de richesse insondable !
L’or qu’on y puisait sans mesure allait fasciner ce monde
héroïque et sauvage. Et tout n’arrivait pas : beaucoup restait à Bâle,
chez un agent anglais qui, de là à Strasbourg, à Lyon, et surtout à
Paris, soldait les traîtres et les espions, des Fauche et des Pichegru,
etc.
Mais Pitt avait deux poches. De la seconde (étrange abîme) nous
avons vu sortir à flots le torrent des faux assignats, chefs-d’œuvre
de gravure, que Puisaye fabriquait, et qui, le jour, la nuit, lancés en
France sur des barques légères, animaient, ravivaient
incessamment l’incendie vendéen. En vain éteint par Hoche, il
gagnait sous la terre. A Paris, à Lyon, et dans tout le Midi.
Combien de temps durerait ce grand mensonge en deux parties :
l’emprunt illimité sans base, et le faux assignat ? C’est ce qu’il fallait
voir. Était-ce au loin, par des succès en Italie, qu’on pourrait espérer
d’arrêter la machine ? C’était l’idée de Bonaparte. Ou, par un coup
hardi, traversant le détroit et secondant les Irlandais ? Ce fut l’idée
de Hoche, sa tentative audacieuse.
PARLEMENT.
D’HASTINGS. — 1785-95.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com