CompTIA Security+ Certification Study Guide, Third Edition: Exam SY0-201 3E

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them. The new exam covers six major topics: Systems Security, Network Infrastructure, Access Control, Assessments and Audits, Cryptography, and Organizational Security. This third edition has been updated to follow and cover the new exam objectives. After reading this book not only will you be able to pass the exam but you will have a working knowledge of cryptography, security legislation, vulnerability assessments, logical access control methods, and much more. *Complete exam-prep package includes full coverage of new Security+ objectives and two complete practice exams*Authored by a leading Microsoft security expert.*A good reference for both beginning security professionals and a seasoned IT person, this book goes beyond the exam objectives to cover the technology, and how that technology is currently being deployed in the business world and what the future of the technology may be. These insights provide the reader a look "inside" security, both today and in the future.

Author(s): Ido Dubrawsky
Edition: 3
Year: 2009

Language: English
Pages: 784

Half Title Page......Page 2
Title Page......Page 4
Copyright Page......Page 5
Contents......Page 6
About the Authors......Page 18
Part 1. Systems Security......Page 24
Introduction......Page 26
Privilege Escalation......Page 27
Viruses and Worms......Page 28
Spyware and Adware......Page 37
Rootkits and Botnets......Page 42
Logic Bombs......Page 44
BIOS......Page 45
USB Devices......Page 48
Cell Phones......Page 51
Removable Storage Devices......Page 53
Summary of Exam Objectives......Page 58
Security Threats......Page 59
Hardware and Peripheral Security Risks......Page 60
Exam Objectives Frequently Asked Questions......Page 61
Self Test......Page 62
Self Test Quick Answer Key......Page 65
Introduction......Page 66
MAC/DAC/RBAC......Page 67
Services......Page 71
File System......Page 72
Hotfixes/Patches......Page 74
Service Packs/Maintenance Updates......Page 76
Patch Management......Page 77
Windows Group Policies......Page 78
Creating a Policy......Page 79
Security Templates......Page 81
Configuration Baselines......Page 84
Running MBSA......Page 86
Server OS Hardening......Page 88
Nonessential Protocols......Page 89
FTP Servers......Page 90
DNS Servers......Page 91
File and Print Servers......Page 92
DHCP Servers......Page 94
Data Repositories......Page 95
Workstation OS......Page 98
General OS Hardening......Page 99
Exam Objectives Frequently Asked Questions......Page 100
Self Test......Page 101
Self Test Quick Answer Key......Page 104
Introduction......Page 106
Threats Are Moving “Up the Stack”......Page 107
Rationale......Page 108
Threat Modeling......Page 109
Browser......Page 111
Configuring Security Zones......Page 118
Buffer Overflows......Page 132
Instant Messaging (IM)......Page 135
Peer-to-Peer......Page 137
SMTP Open Relays......Page 139
Summary of Exam Objectives......Page 140
Exam Objectives Frequently Asked Questions......Page 141
Self Test......Page 142
References......Page 146
Host Intrusion Detection System......Page 148
Signature Based......Page 150
Behavior Based......Page 152
Personal Software Firewall......Page 155
Windows Vista Firewall......Page 156
Configuring the Windows Firewall......Page 157
Advanced Configuration of the Windows Firewall......Page 166
CheckPoint ZoneAlarm......Page 195
Antivirus......Page 205
Viruses, Worms, and Trojan Horses......Page 206
Spyware and Adware......Page 213
Prevention and Response......Page 215
Windows Defender......Page 216
Using Windows Defender......Page 217
How to Use the Windows Defender Software Explorer......Page 218
Antispam......Page 219
12Ghosts Popup-Killer......Page 221
Yahoo! Anti-Spy Toolbar......Page 222
Google Toolbar......Page 225
Summary of Exam Objectives......Page 226
Host Intrusion Detection System......Page 227
Antivirus......Page 228
Exam Objectives Frequently Asked Questions......Page 229
Self Test......Page 231
Self Test Quick Answer Key......Page 234
The Purpose of Virtualization......Page 236
Benefits of Virtualization......Page 237
Types of Virtualization......Page 240
Designing a Virtual Environment......Page 244
System Virtualization......Page 250
Application Virtualization......Page 253
Terminal Services (Remote Desktop Services)......Page 255
Application Streaming......Page 256
Summary of Exam Objectives......Page 258
System Virtualization......Page 260
Exam Objectives Frequently Asked Questions......Page 261
Self Test......Page 263
Self Test Quick Answer Key......Page 268
Part 2. Network Infrastructure......Page 270
Introduction......Page 272
Network Security Tools......Page 273
Intrusion Detection and Prevention Systems......Page 274
Installing WinDUMP for Packet Capture and Analysis......Page 277
Firewalls......Page 278
Honeypots......Page 285
Install a HoneyPot......Page 288
Network Ports, Services, and Threats......Page 290
Network Ports and Protocols......Page 291
Scanning for Vulnerabilities......Page 293
Network Threats......Page 297
ARP Spoofing......Page 300
Network Design Elements and Components......Page 304
What Is a DMZ?......Page 312
Subnets......Page 318
VLANs......Page 319
Network Address Translation......Page 320
Network Access Control/Network Access Protection......Page 323
Telephony......Page 324
General Network Security......Page 325
Exam Objectives Frequently Asked Questions......Page 326
Self Test......Page 327
Self Test Quick Answer Key......Page 330
Introduction......Page 332
Wireless Communications......Page 333
Spread Spectrum Technology......Page 334
Wireless Network Architecture......Page 336
CSMA/CD and CSMA/CA......Page 337
Service Set ID Broadcast......Page 338
Wireless Security Standards......Page 339
Security of 40-Bit versus 104-Bit Keys......Page 340
Wireless Application Protocol......Page 341
Authentication......Page 342
Rogue APs......Page 348
Data Emanation......Page 349
Summary of Exam Objectives......Page 350
Wireless Network Design......Page 352
Wireless Security Standards......Page 353
Exam Objectives Frequently Asked Questions......Page 354
Self Test......Page 356
References......Page 358
Part 3. Access Control......Page 360
Introduction......Page 362
Access Control......Page 363
Access Control Models......Page 364
Authentication Models and Components......Page 367
Separation of Duties......Page 372
Least Privilege......Page 373
MAC......Page 374
DAC......Page 376
Viewing DAC Settings......Page 377
Role-Based Access Control (RBAC)......Page 378
Security Groups......Page 380
Security Controls......Page 381
ACLs......Page 383
Domain Policies......Page 384
Logical Tokens......Page 385
Physical Access Security Methods......Page 386
Hardware Locks......Page 389
ID Badges......Page 390
Door Access Systems......Page 391
Mantrap......Page 392
Summary of Exam Objectives......Page 393
Access Control Methods and Models......Page 394
Exam Objectives Frequently Asked Questions......Page 395
Self Test......Page 398
Self Test Quick Answer Key......Page 402
Introduction to AAA......Page 404
Access Control......Page 405
Authentication Methods......Page 406
One-Factor......Page 407
Two-Factor......Page 409
Three-Factor......Page 410
Authentication Systems......Page 411
Biometrics......Page 412
RADIUS......Page 413
Kerberos......Page 416
LDAP......Page 419
Challenge Handshake Authentication Protocol......Page 425
TACACS/TACACS+......Page 426
Mutual Authentication......Page 428
802.1x Methods......Page 429
Extensible Authentication Protocol......Page 432
Protected EAP......Page 434
Summary of Exam Objectives......Page 436
Authentication Systems......Page 437
Exam Objectives Frequently Asked Questions......Page 438
Self Test......Page 439
Self Test Quick Answer Key......Page 442
Part 4. Assessments and Audits......Page 444
Conduct Risk Assessments and Implement Risk Mitigation......Page 446
Packet Sniffing......Page 447
Password Crackers......Page 451
Network Mapping Tools......Page 452
Use Monitoring Tools on Systems and Networks......Page 453
Workstations......Page 454
Performing a Simple Metasploit Attack......Page 455
Auditing Systems......Page 464
Configuring Auditing in Microsoft Windows......Page 466
Preventing Access to a Computer Using Password-Protected Screensavers......Page 474
Conduct Risk Assessments and Implement Risk Mitigation......Page 475
Exam Objectives Frequently Asked Questions......Page 476
Self Test......Page 477
References......Page 480
Part 5. Cryptopgraphy......Page 482
Introduction......Page 484
Symmetric Key Cryptography......Page 485
Hashes and Applications......Page 487
Digital Signatures......Page 491
Certificates......Page 492
Confidentiality, Integrity, and Availability—For All Your Security Needs......Page 496
Comparative Strength of Algorithms......Page 498
Key Management......Page 499
DES......Page 500
RSA......Page 502
One-Time Pads......Page 503
Transmission Encryption......Page 504
Protocols......Page 505
Cryptographic Protocols......Page 506
File and Folder Encryption......Page 517
E-mail......Page 519
Whole Disk Encryption......Page 520
TPM......Page 521
General Cryptography......Page 522
Cryptography in Operating Systems......Page 523
Exam Objectives Frequently Asked Questions......Page 524
Self Test......Page 527
Self Test Quick Answer Key......Page 530
Introduction......Page 532
PKI Encryption......Page 533
PKI Standards......Page 536
PKI Solutions......Page 537
Components of PKI......Page 539
Digital Certificates......Page 541
Reviewing a Digital Certificate......Page 542
Certificate Authority......Page 548
Certificate Revocation List (CRL)......Page 550
Key Escrow......Page 552
Recovery Agents......Page 554
Implementation......Page 556
Certificate Management......Page 557
Summary of Exam Objectives......Page 559
Recovery Agents......Page 560
Exam Objectives Frequently Asked Questions......Page 561
Self Test......Page 562
Self Test Quick Answer Key......Page 565
Part 6. Organizational Security......Page 566
Alternate Sites......Page 568
Cold Site......Page 570
Redundant Systems......Page 571
Servers......Page 572
Internet Service Provider......Page 573
Redundant Arrays of Inexpensive Disks......Page 574
Spare Parts......Page 575
Uninterruptible Power Supply......Page 577
Alternate Sites......Page 578
Redundant Arrays of Inexpensive Disks......Page 579
Backup Generator......Page 580
Exam Objectives Frequently Asked Questions......Page 581
Self Test......Page 582
Self Test Quick Answer Key......Page 585
Environmental Controls......Page 586
Fire Suppression......Page 587
HVAC......Page 589
Shielding......Page 591
Implementing Disaster Recovery and Incident Response Procedures......Page 593
Disaster Recovery......Page 594
Incident Response......Page 599
Defending against Social Engineering......Page 610
Environmental Controls......Page 616
Implementing Disaster Recovery and Incident Response Procedures......Page 617
Self Test......Page 619
Self Test Quick Answer Key......Page 623
Introduction......Page 624
Secure Disposal of Systems......Page 625
Retention/Storage......Page 626
Destruction......Page 627
Acceptable Use Policies......Page 628
Password Complexity......Page 630
Password Changes and Restrictions......Page 631
Administrator Accounts......Page 632
Information Classification......Page 633
Vacations......Page 635
Separation of Duties......Page 636
Privacy......Page 637
Due Care......Page 639
Due Process......Page 640
Service Level Agreements......Page 641
User Education and Awareness Training......Page 643
Communication......Page 644
User Awareness......Page 645
Education......Page 646
Security-Related HR Policies......Page 648
Summary of Exam Objectives......Page 650
Exam Objectives Fast Track......Page 651
Exam Objectives Frequently Asked Questions......Page 652
Self Test......Page 653
Self Test Quick Answer Key......Page 657
Appendix: Self Test......Page 658
Index......Page 764