18,45 €
inkl. MwSt.
Versandfertig in über 4 Wochen
Andere Kunden interessierten sich auch für
- Mark BowdenWorm: The First Digital World War18,45 €
- Susan LandauListening in: Cybersecurity in an Insecure Age18,45 €
- Peter HassonThe Manipulators: Facebook, Google, Twitter, and Big Tech's War on Conservatives33,45 €
- Christopher HadnagyPhishing Dark Waters: The Offensive and Defensive Sides of Malicious E-Mails13,45 €
- Tony BinghamThe New Social Learning13,45 €
- Carolina SandovalDime Qué Posteas Y Te Diré Quién Eres18,45 €
- Sarah T. RobertsBehind the Screen: Content Moderation in the Shadows of Social Media28,45 €
-
-
-
Produktdetails
- Verlag: Brilliance Audio
- Gesamtlaufzeit: 999 Min.
- Erscheinungstermin: 1. Januar 2019
- Sprache: Englisch
- ISBN-13: 9781721376780
- Artikelnr.: 54611620
CHARLES J. BROOKS is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company. CHRISTOPHER GROW is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience. PHILIP CRAIG is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas. DONALD SHORT is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick.
Introduction xix
PART I SECURING THE INFRASTRUCTURE 1
Chapter 1 Infrastructure Security in the Real World 3
Security Challenges 3
Infrastructure Security Scenario 1 4
Infrastructure Security Scenario 2 6
Summary 8
Chapter 2 Understanding Access-Control and Monitoring Systems 9
A Quick Primer on Infrastructure Security 9
Access Control 12
Security Policies 14
Physical Security Controls 15
Locks and Keys 16
Standard Key-Locking Deadbolts 17
Solenoid-Operated Deadbolt Locks 18
Cipher Locks 19
Access-Control Gates 20
Sliding Gates 20
Swinging Gates 21
Control Relays 21
Authentication Systems 23
Magnetic Stripe Readers 24
Smart Cards 25
RFID Badges 26
Biometric Scanners 27
Remote-Access Monitoring 29
Opened- and Closed-Condition Monitoring 30
Automated Access-Control Systems 32
Hands-On Exercises 33
Discussion 34
Procedure 35
Review Questions 43
Chapter 3 Understanding Video Surveillance Systems 45
Video Surveillance Systems 45
Cameras 46
Hands-On Exercises 60
Discussion 61
Procedure 61
Review Questions 69
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
Intrusion-Detection and Reporting Systems 71
Security Controllers 74
Sensors 77
Vehicle-Detection Sensors 82
Fire-Detection Sensors 85
Output Devices 87
Hands-On Exercises 90
Discussion 90
Procedure 92
Review Questions 94
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
Summary Points 97
Security Challenge Scenarios 101
Infrastructure Security Scenario 1 101
Infrastructure Security Scenario 2 102
Professional Feedback 102
Review Questions 107
Exam Questions 109
PART II SECURING LOCAL HOSTS 113
Chapter 6 Local Host Security in the Real World 115
Security Challenges 115
Computing Device Security Scenario 1 116
Computing Device Security Scenario 2 117
Summary 120
Chapter 7 Securing Devices 121
The Three Layers of Security 121
Securing Host Devices 123
Securing Outer-Perimeter Portals 124
Additional Inner-Perimeter Access Options 127
Hands-On Exercises 137
Objectives 137
Procedure 137
Review Questions 148
Chapter 8 Protecting the Inner Perimeter 149
The Inner Perimeter 149
Operating Systems 151
Operating System Security Choices 168
Common Operating System Security Tools 169
Using Local Administrative Tools 177
Implementing Data Encryption 182
Hands-On Exercises 188
Objectives 188
Resources 188
Discussion 189
Procedures 190
Tables 200
Lab Questions 201
Chapter 9 Protecting Remote Access 203
Protecting Local Computing Devices 203
Using a Secure Connection 204
Establishing and Using a Firewall 204
Installing and Using Anti-Malware Software 205
Removing Unnecessary Software 205
Disabling Nonessential Services 205
Disabling Unnecessary OS Default Features 205
Securing the Web Browser 205
Applying Updates and Patches 20
PART I SECURING THE INFRASTRUCTURE 1
Chapter 1 Infrastructure Security in the Real World 3
Security Challenges 3
Infrastructure Security Scenario 1 4
Infrastructure Security Scenario 2 6
Summary 8
Chapter 2 Understanding Access-Control and Monitoring Systems 9
A Quick Primer on Infrastructure Security 9
Access Control 12
Security Policies 14
Physical Security Controls 15
Locks and Keys 16
Standard Key-Locking Deadbolts 17
Solenoid-Operated Deadbolt Locks 18
Cipher Locks 19
Access-Control Gates 20
Sliding Gates 20
Swinging Gates 21
Control Relays 21
Authentication Systems 23
Magnetic Stripe Readers 24
Smart Cards 25
RFID Badges 26
Biometric Scanners 27
Remote-Access Monitoring 29
Opened- and Closed-Condition Monitoring 30
Automated Access-Control Systems 32
Hands-On Exercises 33
Discussion 34
Procedure 35
Review Questions 43
Chapter 3 Understanding Video Surveillance Systems 45
Video Surveillance Systems 45
Cameras 46
Hands-On Exercises 60
Discussion 61
Procedure 61
Review Questions 69
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
Intrusion-Detection and Reporting Systems 71
Security Controllers 74
Sensors 77
Vehicle-Detection Sensors 82
Fire-Detection Sensors 85
Output Devices 87
Hands-On Exercises 90
Discussion 90
Procedure 92
Review Questions 94
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
Summary Points 97
Security Challenge Scenarios 101
Infrastructure Security Scenario 1 101
Infrastructure Security Scenario 2 102
Professional Feedback 102
Review Questions 107
Exam Questions 109
PART II SECURING LOCAL HOSTS 113
Chapter 6 Local Host Security in the Real World 115
Security Challenges 115
Computing Device Security Scenario 1 116
Computing Device Security Scenario 2 117
Summary 120
Chapter 7 Securing Devices 121
The Three Layers of Security 121
Securing Host Devices 123
Securing Outer-Perimeter Portals 124
Additional Inner-Perimeter Access Options 127
Hands-On Exercises 137
Objectives 137
Procedure 137
Review Questions 148
Chapter 8 Protecting the Inner Perimeter 149
The Inner Perimeter 149
Operating Systems 151
Operating System Security Choices 168
Common Operating System Security Tools 169
Using Local Administrative Tools 177
Implementing Data Encryption 182
Hands-On Exercises 188
Objectives 188
Resources 188
Discussion 189
Procedures 190
Tables 200
Lab Questions 201
Chapter 9 Protecting Remote Access 203
Protecting Local Computing Devices 203
Using a Secure Connection 204
Establishing and Using a Firewall 204
Installing and Using Anti-Malware Software 205
Removing Unnecessary Software 205
Disabling Nonessential Services 205
Disabling Unnecessary OS Default Features 205
Securing the Web Browser 205
Applying Updates and Patches 20
Introduction xix
PART I SECURING THE INFRASTRUCTURE 1
Chapter 1 Infrastructure Security in the Real World 3
Security Challenges 3
Infrastructure Security Scenario 1 4
Infrastructure Security Scenario 2 6
Summary 8
Chapter 2 Understanding Access-Control and Monitoring Systems 9
A Quick Primer on Infrastructure Security 9
Access Control 12
Security Policies 14
Physical Security Controls 15
Locks and Keys 16
Standard Key-Locking Deadbolts 17
Solenoid-Operated Deadbolt Locks 18
Cipher Locks 19
Access-Control Gates 20
Sliding Gates 20
Swinging Gates 21
Control Relays 21
Authentication Systems 23
Magnetic Stripe Readers 24
Smart Cards 25
RFID Badges 26
Biometric Scanners 27
Remote-Access Monitoring 29
Opened- and Closed-Condition Monitoring 30
Automated Access-Control Systems 32
Hands-On Exercises 33
Discussion 34
Procedure 35
Review Questions 43
Chapter 3 Understanding Video Surveillance Systems 45
Video Surveillance Systems 45
Cameras 46
Hands-On Exercises 60
Discussion 61
Procedure 61
Review Questions 69
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
Intrusion-Detection and Reporting Systems 71
Security Controllers 74
Sensors 77
Vehicle-Detection Sensors 82
Fire-Detection Sensors 85
Output Devices 87
Hands-On Exercises 90
Discussion 90
Procedure 92
Review Questions 94
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
Summary Points 97
Security Challenge Scenarios 101
Infrastructure Security Scenario 1 101
Infrastructure Security Scenario 2 102
Professional Feedback 102
Review Questions 107
Exam Questions 109
PART II SECURING LOCAL HOSTS 113
Chapter 6 Local Host Security in the Real World 115
Security Challenges 115
Computing Device Security Scenario 1 116
Computing Device Security Scenario 2 117
Summary 120
Chapter 7 Securing Devices 121
The Three Layers of Security 121
Securing Host Devices 123
Securing Outer-Perimeter Portals 124
Additional Inner-Perimeter Access Options 127
Hands-On Exercises 137
Objectives 137
Procedure 137
Review Questions 148
Chapter 8 Protecting the Inner Perimeter 149
The Inner Perimeter 149
Operating Systems 151
Operating System Security Choices 168
Common Operating System Security Tools 169
Using Local Administrative Tools 177
Implementing Data Encryption 182
Hands-On Exercises 188
Objectives 188
Resources 188
Discussion 189
Procedures 190
Tables 200
Lab Questions 201
Chapter 9 Protecting Remote Access 203
Protecting Local Computing Devices 203
Using a Secure Connection 204
Establishing and Using a Firewall 204
Installing and Using Anti-Malware Software 205
Removing Unnecessary Software 205
Disabling Nonessential Services 205
Disabling Unnecessary OS Default Features 205
Securing the Web Browser 205
Applying Updates and Patches 20
PART I SECURING THE INFRASTRUCTURE 1
Chapter 1 Infrastructure Security in the Real World 3
Security Challenges 3
Infrastructure Security Scenario 1 4
Infrastructure Security Scenario 2 6
Summary 8
Chapter 2 Understanding Access-Control and Monitoring Systems 9
A Quick Primer on Infrastructure Security 9
Access Control 12
Security Policies 14
Physical Security Controls 15
Locks and Keys 16
Standard Key-Locking Deadbolts 17
Solenoid-Operated Deadbolt Locks 18
Cipher Locks 19
Access-Control Gates 20
Sliding Gates 20
Swinging Gates 21
Control Relays 21
Authentication Systems 23
Magnetic Stripe Readers 24
Smart Cards 25
RFID Badges 26
Biometric Scanners 27
Remote-Access Monitoring 29
Opened- and Closed-Condition Monitoring 30
Automated Access-Control Systems 32
Hands-On Exercises 33
Discussion 34
Procedure 35
Review Questions 43
Chapter 3 Understanding Video Surveillance Systems 45
Video Surveillance Systems 45
Cameras 46
Hands-On Exercises 60
Discussion 61
Procedure 61
Review Questions 69
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
Intrusion-Detection and Reporting Systems 71
Security Controllers 74
Sensors 77
Vehicle-Detection Sensors 82
Fire-Detection Sensors 85
Output Devices 87
Hands-On Exercises 90
Discussion 90
Procedure 92
Review Questions 94
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
Summary Points 97
Security Challenge Scenarios 101
Infrastructure Security Scenario 1 101
Infrastructure Security Scenario 2 102
Professional Feedback 102
Review Questions 107
Exam Questions 109
PART II SECURING LOCAL HOSTS 113
Chapter 6 Local Host Security in the Real World 115
Security Challenges 115
Computing Device Security Scenario 1 116
Computing Device Security Scenario 2 117
Summary 120
Chapter 7 Securing Devices 121
The Three Layers of Security 121
Securing Host Devices 123
Securing Outer-Perimeter Portals 124
Additional Inner-Perimeter Access Options 127
Hands-On Exercises 137
Objectives 137
Procedure 137
Review Questions 148
Chapter 8 Protecting the Inner Perimeter 149
The Inner Perimeter 149
Operating Systems 151
Operating System Security Choices 168
Common Operating System Security Tools 169
Using Local Administrative Tools 177
Implementing Data Encryption 182
Hands-On Exercises 188
Objectives 188
Resources 188
Discussion 189
Procedures 190
Tables 200
Lab Questions 201
Chapter 9 Protecting Remote Access 203
Protecting Local Computing Devices 203
Using a Secure Connection 204
Establishing and Using a Firewall 204
Installing and Using Anti-Malware Software 205
Removing Unnecessary Software 205
Disabling Nonessential Services 205
Disabling Unnecessary OS Default Features 205
Securing the Web Browser 205
Applying Updates and Patches 20