For Dummies 978-0-470-48738-9 Scheda Tecnica

Navigare online o scaricare Scheda Tecnica per Manuali per software For Dummies 978-0-470-48738-9. For Dummies CompTIA A+ Certification All-In-One, 2nd Edition Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 28
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 0
Chapter 1: Fundamentals
of Security
Exam Objectives
Types of attacks
Physical security
Authentication and authorization
Data protection
O
ne of the most important skills to have if you are going to support net-
worked systems or systems connected to the Internet is the capability
of securing systems and networks. And even if you are not working in a net-
worked environment, you can apply these same skills to your customers
with home Internet machines. The bottom line is that you need a solid
understanding of network security.
I remember when a close friend of mine had his Web site totally replaced
by a hacker. My friend’s Web site files were replaced with inappropriate
content, and he wondered how on Earth someone had hacked his server. It
seems amazing now, but back then (circa 1994), a lot of companies did not
use firewalls because they were not aware of the risks involved in having a
computer connected directly to the Internet. Back then, people thought, “I
have a password on the administrator account, so I am secure.”
In this chapter, I introduce you to the basic concepts and terminology
used to help secure an environment. Be sure to read this chapter carefully
and make sure you understand the topics as you will be tested on security
topics on the A+ exams. Have fun with this topic area — it is very exciting!
Identifying Types of Attacks
To me, a hacker is someone with the technical expertise to bypass the secu-
rity of a network or an OS. A hacker knows how to use features of a piece
of software or hardware to gain access to restricted areas of a network and
then how to use those features against you and your system. For example,
most Web sites connect to a database behind the scenes so that you can
get a list of products when you visit their site. A hacker knows how to input
49_487389-bk09ch01.indd 103949_487389-bk09ch01.indd 1039 9/10/09 11:03 PM9/10/09 11:03 PM
COPYRIGHTED MATERIAL
Vedere la pagina 0
1 2 3 4 5 6 ... 27 28

Sommario

Pagina 1 - COPYRIGHTED MATERIAL

Chapter 1: Fundamentals of SecurityExam Objectives✓ Types of attacks✓ Physical security✓ Authentication and authorization✓ Data protectionOne of the m

Pagina 2 - Social engineering attacks

1048 Understanding Physical Securityroom is a hacker cannot boot off a bootable CD-ROM, which could bypass the OS entirely. After a hacker bypasses th

Pagina 3 - Network-based attacks

Book IXChapter 1Fundamentals of Security1049Understanding Physical Security ✦ Secure server placement. Lock your servers in a room for which only a se

Pagina 4 - Identifying Types of Attacks

1050 Understanding Authentication and Authorization Figure 1-5: A lockdown cable is used to secure computer equipment to a desk. Remembering ways to

Pagina 5 - Spoofing

Book IXChapter 1Fundamentals of Security1051Understanding Authentication and Authorizationthe user account database — which has a list of the username

Pagina 6 - Eavesdropping attack

1052 Understanding Authentication and Authorizationthe access token or one of the groups contained in the access token are also contained in the permi

Pagina 7 - Wireless attacks

Book IXChapter 1Fundamentals of Security1053Understanding Authentication and Authorizationcard reader that is connected to a computer, and then you en

Pagina 8 - Software-based attacks

1054 Methods of Securing Transmissions Figure 1-8: Using permissions to authorize which users are allowed to access the resource. In Figure 1-8, you c

Pagina 9 - Logic bomb

Book IXChapter 1Fundamentals of Security1055Methods of Securing TransmissionsMost Internet protocols, such as HTTP, send information in cleartext, and

Pagina 10 - Best practices

1056 Do Not Forget about Data Protectionencrypt and decrypt network traffic. Because of the configuration, it is an unlikely solution for a Web site b

Pagina 11 - Enabling

Book IXChapter 1Fundamentals of Security1057Do Not Forget about Data ProtectionHard drive destructionDestroying data that resides on a computer hard d

Pagina 12 - Authentication

1040 Identifying Types of Attacksdata into the site to manipulate your database server into executing the code that the hacker wants to execute — and

Pagina 13 - Generating the access token

1058 Do Not Forget about Data ProtectionBackup reviewYou can find out more about backups in Book VII, Chapter 3, but for the exam, here are some of th

Pagina 14 - Smart card

Book IXChapter 1Fundamentals of Security1059Do Not Forget about Data Protectionduring an incremental backup, because the backup process clears the arc

Pagina 15 - Using strong passwords

1060 Do Not Forget about Data Protectionby writing the data at the same time to two different disks, essentially taking less time to read or write to

Pagina 16

Book IXChapter 1Fundamentals of Security1061Do Not Forget about Data ProtectionCompliance and classificationPart of securing your computing environmen

Pagina 17 - Chapter 1

1062 Getting an A+ Data classification is assigned to the information based on the value of the information to the organization. Each classification

Pagina 18 - Destroying data

Fundamentals of SecurityPrep Test 1 What type of attack involves the hacker tricking a user through social contact?A ❍ Password attackB ❍ Eavesdrop

Pagina 19 - Backing up data

Fundamentals of Security 6 Which of the following are forms of biometrics? (Select all that apply.)A ❑ Fingerprint scanB ❑ Smart cardC ❑ Username

Pagina 20 - Backup review

Fundamentals of SecurityAnswers 1 D. Social engineering is a type of hack that involves contacting victims through phone or e-mail and tricking them i

Pagina 21 - Implementing RAID solutions

1066Book IX: Securing Systems49_487389-bk09ch01.indd 106649_487389-bk09ch01.indd 1066 9/10/09 11:03 PM9/10/09 11:03 PM

Pagina 22 - Data encryption

Book IXChapter 1Fundamentals of Security1041Identifying Types of Attacksthat a social engineering attack would be successful if the company does not e

Pagina 23 - Compliance and classification

1042 Identifying Types of Attacks ✦ One text file contains the most popular user accounts found on net-works, such as administrator, admin, and root.

Pagina 24 - Getting an A+

Book IXChapter 1Fundamentals of Security1043Identifying Types of Attacks To protect against password attacks, users should use strong passwords, whic

Pagina 25 - Fundamentals of Security

1044 Identifying Types of Attacks 2. All systems that were pinged reply to the modified source address — an unsuspecting victim. 3. The victim’s syste

Pagina 26

Book IXChapter 1Fundamentals of Security1045Identifying Types of AttacksMan-in-the-middleA man-in-the-middle attack involves the hacker monitoring net

Pagina 27

1046 Identifying Types of Attacks To protect against wireless attacks you should implement encryption proto-cols such as WPA2 and use an authenticatio

Pagina 28 - Book IX: Securing Systems

Book IXChapter 1Fundamentals of Security1047Understanding Physical Security Figure 1-3: Using NetBus to control a user’s computer. WormA worm is a vir

Commenti su questo manuale

Nessun commento