An accessible introduction to cybersecurity concepts and practices
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
* Learn security and surveillance fundamentals
* Secure and protect remote access and devices
* Understand network topologies, protocols, and strategies
* Identify threats and mount an effective defense
Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
Autorentext
CHARLES J. BROOKS is co-owner and vice president of Educational Technologies Group Inc., as well as co-owner of eITPrep LLP, an online training company.
CHRISTOPHER GROW is the president of A.C.C.N.S. Consulting and the Technichal Services manager for Educational Technologies Group L.L.C. with 20+ years of IT/IS and cyber security experience.
PHILIP CRAIG is the founder of BlackByte Cyber Security, LLC, a consultancy supporting the Pacific Northwest National Laboratory (PNNL) research and national security agendas.
DONALD SHORT is the President of One World Telecommunications, Inc., an Internet Service Provider in Kennewick.
Klappentext
An easy-to-use and comprehensive introduction to cybersecurity
Cybersecurity Essentials provides a comprehensive introduction, with expert coverage of essential topics required for entry-level cybersecurity certifications. It covers the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. The authorsnoted security expertssummarize the fundamental concepts of each challenge and include real-world scenarios that show how these vulnerabilities look in everyday computing. The text offers a summary of the key concepts, review questions, and hands-on exercises designed to help assess an understanding of key concepts.
Learn these fundamentals of security infrastructureand more:
- Basic security and surveillance systems
- Intrusion detection and reporting systems
- Local host security
- Securing devices
- Protecting the inner perimeter
- Protecting remote access
- Local network Security
- Network topologies and protocols
This Essentials book features:
- Chapter-opening learning objectives
- Essentials and Beyondsummaries and additional suggested exercises
- Hands-on exercises
Zusammenfassung
An accessible introduction to cybersecurity concepts and practices
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills.
Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
- Learn security and surveillance fundamentals
- Secure and protect remote access and devices
- Understand network topologies, protocols, and strategies
- Identify threats and mount an effective defense
Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
Inhalt
Introduction xix
PART I SECURING THE INFRASTRUCTURE 1
Chapter 1 Infrastructure Security in the Real World 3
Security Challenges 3
Infrastructure Security Scenario 1 4
Infrastructure Security Scenario 2 6
Summary 8
Chapter 2 Understanding Access-Control and Monitoring Systems 9
A Quick Primer on Infrastructure Security 9
Access Control 12
Security Policies 14
Physical Security Controls 15
Locks and Keys 16
Standard Key-Locking Deadbolts 17
Solenoid-Operated Deadbolt Locks 18
Cipher Locks 19
Access-Control Gates 20
Sliding Gates 20
Swinging Gates 21
Control Relays 21
Authentication Systems 23
Magnetic Stripe Readers 24
Smart Cards 25
RFID Badges 26
Biometric Scanners 27
Remote-Access Monitoring 29
Opened- and Closed-Condition Monitoring 30
Automated Access-Control Systems 32
Hands-On Exercises 33
Discussion 34
Procedure 35
Review Questions 43
Chapter 3 Understanding Video Surveillance Systems 45
Video Surveillance Systems 45
Cameras 46
Hands-On Exercises 60
Discussion 61
Procedure 61
Review Questions 69
Chapter 4 Understanding Intrusion-Detection and Reporting Systems 71
Intrusion-Detection and Reporting Systems 71
Security Controllers 74
Sensors 77
Vehicle-Detection Sensors 82
Fire-Detection Sensors 85
Output Devices 87
Hands-On Exercises 90
Discussion 90
Procedure 92
Review Questions 94
Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises 97
Summary Points 97
Security Challenge Scenarios 101
Infrastructure Security Scenario 1 101
Infrastructure Security Scenario 2 102
Professional Feedback 102
Review Questions 107
Exam Questions 109
PART II SECURING LOCAL HOSTS 113
Chapter 6 Local Host Security in the Real World 115
Security Challenges 115
Computing Device Security Scenario 1 116
Computing Device Security Scenario 2 117
Summary 120
Chapter 7 Securing Devices 121
The Three Layers of Security 121
Securing Host Devices 123
Securing Outer-Perimeter Portals 124
Additional Inner-Perimeter Access Options 127
Hands-On Exercises 137
Objectives 137
Procedure 137
Review Questions 148
Chapter 8 Protecting the Inner Pe…