Skip to search
Skip to main content
Catalog
Help
Feedback
Your Account
Library Account
Bookmarks
(
0
)
Search History
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Principles of computer security : CompTIA Security+ and beyond / Wm. Arthur Conklin [et al.]
Author
Conklin, Wm. Arthur (William Arthur)
[Browse]
Format
Book
Language
English
Εdition
Sixth edition.
Published/Created
New York : McGraw-Hill, [2022]
©2022
Description
1 online resource (1074 pages)
Details
Subject(s)
Computer networks
—
Security measures
—
Examinations
[Browse]
Computer security
—
Examinations
—
Study guides
[Browse]
Electronic data processing personnel
—
Certification
—
Study guides
[Browse]
Series
McGraw-Hill's AccessEngineeringLibrary
Summary note
Fully updated computer security essentials-mapped to the CompTIA Security+ SY0-601 exam Save 10% on any CompTIA exam voucher! Coupon code inside. Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. This thoroughly revised, full-color textbook covers how to secure hardware, systems, and software. It addresses new threats and cloud environments, and provides additional coverage of governance, risk, compliance, and much more. Written by a team of highly respected security educators, Principles of Computer Security: CompTIA Security+? and Beyond, Sixth Edition (Exam SY0-601) will help you become a CompTIA-certified computer security expert while also preparing you for a successful career. Find out how to: Ensure operational, organizational, and physical security Use cryptography and public key infrastructures (PKIs) Secure remote access, wireless networks, and virtual private networks (VPNs) Authenticate users and lock down mobile devices Harden network devices, operating systems, and applications Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing Combat viruses, worms, Trojan horses, and rootkits Manage e-mail, instant messaging, and web security Explore secure software development requirements Implement disaster recovery and business continuity measures Handle computer forensics and incident response Understand legal, ethical, and privacy issues Online content features: Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective Each chapter includes: Learning objectives Real-world examples Try This! and Cross Check exercises Tech Tips, Notes, and Warnings Exam Tips End-of-chapter quizzes and lab projects.
Bibliographic references
Includes bibliographical references and index.
Source of description
Description based on print version record.
Language note
In English.
Contents
Cover
About the Authors
Title Page
Copyright Page
Acknowledgments
About this Book
Contents at a Glance
Contents
Foreword
Preface
Introduction
Instructor Website
Chapter 1 Introduction and Security Trends
The Computer Security Problem
Definition of Computer Security
Historical Security Incidents
The Current Threat Environment
Infrastructure Attacks
Ransomware
Threats to Security
Viruses and Worms
Intruders
Insiders
Criminal Organizations
Nation-States, Terrorists, and Information Warfare
Brand-Name Attacks
Attributes of Actors
Internal/External
Level of Sophistication
Resources/Funding
Intent/Motivation
Security Trends
Targets and Attacks
Specific Target
Opportunistic Target
Minimizing Possible Avenues of Attack
Approaches to Computer Security
Cybersecurity Kill Chain
Threat Intelligence
Open Source Intelligence
Ethics
Additional References
Chapter 1 Review
Chapter 2 General Security Concepts
Basic Security Terminology
Security Basics
Security Tenets
Security Approaches
Security Principles
Formal Security Models
Confidentiality Models
Integrity Models
Chapter 2 Review
Chapter 3 Operational and Organizational Security
Policies, Procedures, Standards, and Guidelines
Organizational Policies
Change Management Policy
Change Control
Asset Management
Security Policies
Data Policies
Credential Policies
Password and Account Policies
Human Resources Policies
Code of Ethics
Job Rotation
Separation of Duties
Employee Hiring (Onboarding) and Promotions
Retirement, Separation, or Termination (Offboarding)
Exit Interviews
Onboarding/Offboarding Business Partners
Adverse Actions
Mandatory Vacations
Acceptable Use Policy.
Internet Usage Policy
E-mail Usage Policy
Social Media Analysis
Clean Desk Policy
Bring-Your-Own-Device (BYOD) Policy
Privacy Policy
Due Care and Due Diligence
Due Process
Incident Response Policies and Procedures
Security Awareness and Training
Diversity of Training Techniques
Security Policy Training and Procedures
User Training
Role-Based Training
Continuing Education
Compliance with Laws, Best Practices, and Standards
User Habits
Training Metrics and Compliance
Standard Operating Procedures
Third-Party Risk Management
Vendors
Supply Chain
Business Partners
Interoperability Agreements
Service Level Agreement (SLA)
Memorandum of Understanding (MOU)
Measurement Systems Analysis (MSA)
Business Partnership Agreement (BPA)
Interconnection Security Agreement (ISA)
NDA
End of Service Life (EOSL)
End of Life (EOL)
Chapter 3 Review
Chapter 4 The Role of People in Security
People-A Security Problem
Social Engineering
Tools
Principles (Reasons for Effectiveness)
Defenses
Attacks
Impersonation
Phishing
Smishing
Vishing
Spam
Spam over Internet Messaging (SPIM)
Spear Phishing
Whaling
Pharming
Dumpster Diving
Shoulder Surfing
Tailgating/Piggybacking
Eliciting Information
Prepending
Identity Fraud
Invoice Scams
Credential Harvesting
Reverse Social Engineering
Reconnaissance
Hoax
Watering Hole Attack
Typo Squatting
Influence Campaigns
Poor Security Practices
Password Selection
Piggybacking
Installing Unauthorized Hardware and Software
Data Handling
Physical Access by Non-Employees
Clean Desk Policies
People as a Security Tool
Security Awareness
Chapter 4 Review.
Chapter 5 Cryptography
Cryptography in Practice
Fundamental Methods
Comparative Strengths and Performance of Algorithms
Key Length
Cryptographic Objectives
Diffusion
Confusion
Obfuscation
Perfect Forward Secrecy
Security Through Obscurity
Historical Perspectives
Algorithms
Substitution Ciphers
One-Time Pads
Key Management
Random Numbers
Salting
Hashing Functions
Message Digest
SHA
RIPEMD
Hashing Summary
Symmetric Encryption
DES
3DES
AES
CAST
RC
Blowfish
Twofish
IDEA
ChaCha20
Cipher Modes
Authenticated Encryption with Associated Data (AEAD)
Block vs. Stream
Symmetric Encryption Summary
Asymmetric Encryption
Diffie-Hellman
RSA Algorithm
ElGamal
ECC
Asymmetric Encryption Summary
Symmetric vs. Asymmetric
Quantum Cryptography
Post-Quantum
Lightweight Cryptography
Homomorphic Encryption
For More Information
Chapter 5 Review
Chapter 6 Applied Cryptography
Cryptography Use
Confidentiality
Integrity
Authentication
Nonrepudiation
Digital Signatures
Digital Rights Management
Cryptographic Applications
Use of Proven Technologies
Cipher Suites
Secret Algorithms
Key Exchange
Key Escrow
Session Keys
Ephemeral Keys
Key Stretching
Transport Encryption
TLS v1.3
Data in Transit/Motion
Data at Rest
Data in Use/Processing
Implementation vs. Algorithm Selection
Common Use Cases
HMAC
S/MIME
IETF S/MIME History
IETF S/MIME v3 Specifications
PGP
How PGP Works
Steganography
Secure Protocols
DNSSEC
SSH
SRTP
LDAPS
FTPS
SFTP
SNMPv3
TLS
HTTPS
Secure POP/IMAP
IPSec
Secure Protocol Use Cases
Voice and Video
Time Synchronization
E-mail and Web
File Transfer
Directory Services.
Remote Access
Domain Name Resolution
Routing and Switching
Network Address Allocation
Subscription Services
Cryptographic Attacks
Birthday
Known Plaintext/Ciphertext
Chosen Cipher Text Attack
Weak Implementations
Meet-in-the-Middle Attacks
Replay
Downgrade
Collision
Password Attacks
Other Standards
FIPS
Common Criteria
ISO/IEC 27002 (Formerly ISO 17799)
Chapter 6 Review
Chapter 7 Public Key Infrastructure
The Basics of Public Key Infrastructures
Certificate Authorities
Registration Authorities
Local Registration Authorities
Public Certificate Authorities
In-house Certificate Authorities
Choosing Between a Public CA and an In-house CA
Outsourced Certificate Authorities
Online vs. Offline CA
Stapling
Pinning
Trust Models
Certificate Chaining
Hierarchical Trust Model
Peer-to-Peer Model
Hybrid Trust Model
Walking the Certificate Path
Digital Certificates
Certificate Classes
Certificate Extensions
Certificate Attributes
Certificate Formats
Certificate Lifecycles
Registration and Generation
CSR
Renewal
Suspension
Certificate Revocation
Key Destruction
Certificate Repositories
Sharing Key Stores
Trust and Certificate Verification
Centralized and Decentralized Infrastructures
Hardware Security Modules
Private Key Protection
Key Recovery
Certificate-Based Threats
PKIX and PKCS
PKIX Standards
PKCS
Why You Need to Know the PKIX and PKCS Standards
Stolen Certificates
ISAKMP
CMP
XKMS
CEP
Chapter 7 Review
Chapter 8 Physical Security
The Security Problem
Physical Security Safeguards
Walls and Guards
Lights and Signage
Physical Access Controls and Monitoring
Electronic Access Control Systems
Policies and Procedures.
Environmental Controls
Hot and Cold Aisles
Fire Suppression
Water-Based Fire Suppression Systems
Halon-Based Fire Suppression Systems
Clean-Agent Fire Suppression Systems
Handheld Fire Extinguishers
Fire Detection Devices
Electromagnetic Environment
Power Protection
UPS
Backup Power and Cable Shielding
Generator
Dual Supply
Managed Power Distribution Units (PDUs)
Drones/UAVs
Chapter 8 Review
Chapter 9 Network Fundamentals
Network Architectures
Network Topology
Wireless
Ad Hoc
Segregation/Segmentation/Isolation
Physical Separation
Enclaves
Logical (VLAN)
Virtualization
Airgaps
Zones and Conduits
Zero Trust
Security Zones
DMZ
Internet
East-West Traffic
Intranet
Extranet
Guest
Honeynets
Flat Networks
Network Protocols
Protocols
Packets
Internet Protocol
IP Packets
TCP vs. UDP
ICMP
IPv4 vs. IPv6
Expanded Address Space
Neighbor Discovery
Benefits of IPv6
Packet Delivery
Ethernet
Local Packet Delivery
ARP Attacks
Remote Packet Delivery
IP Addresses and Subnetting
Network Address Translation
Inter-Networking
MPLS
Software-Defined Networking (SDN)
Software-Defined Visibility (SDV)
Quality of Service (QoS)
Traffic Engineering
Route Security
Chapter 9 Review
Chapter 10 Infrastructure Security
Devices
Workstations
Servers
Mobile Devices
Device Security, Common Concerns
Network-Attached Storage
Removable Storage
Hypervisor
Application Cells/Containers
VM Sprawl Avoidance
VM Escape Protection
Snapshots
Patch Compatibility
Host Availability/Elasticity
Security Control Testing
Sandboxing
Networking
Network Interface Cards
Hubs
Bridges
Switches.
Port Security.
Show 407 more Contents items
ISBN
1-260-47432-1
OCLC
1281715169
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information