ebook img

Security Awareness: Applying Practical Security in Your World PDF

258 Pages·2017·5.94 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security Awareness: Applying Practical Security in Your World

(cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) Security Awareness: Applying Practical Security In Your World Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) Security Awareness: Applying Practical Security In Your World Fifth Edition Mark Ciampa, Ph.D. Australia(cid:129)Brazil(cid:129)Mexico(cid:129)Singapore(cid:129)UnitedKingdom(cid:129)UnitedStates Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version. Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) SecurityAwareness:ApplyingPractical ©2017,2014CengageLearning SecurityInYourWorld,FifthEdition WCN: 02-200-203 MarkCiampa ALLRIGHTSRESERVED.Nopartofthisworkcoveredbythecopyright SVP,GMSkills&GlobalProduct hereinmaybereproducedordistributedinanyformorbyanymeans, exceptaspermittedbyU.S.copyrightlaw,withoutthepriorwritten Management:DawnGerrain permissionofthecopyrightowner. ProductDirector:KathleenMcMahon Allscreenshots,unlessotherwisenoted,areusedwithpermission ProductTeamManager:KristinMcNary fromMicrosoftCorporation.Microsoft®isaregisteredtrademarkof SeniorDirector,Development: theMicrosoftCorporation. MarahBellegarde ProductDevelopmentManager:Leigh Forproductinformationandtechnologyassistance,contactusat Hefferon CengageLearningCustomer&SalesSupport,1-800-354-9706 SeniorContentDeveloper:MichelleRuelos Forpermissiontousematerialfromthistextorproduct, Cannistraci submitallrequestsonlineatwww.cengage.com/permissions. ProductAssistant:AbigailPufpaff Furtherpermissionsquestionscanbee-mailedto VicePresident,MarketingServices:Jennifer [email protected] AnnBaker MarketingDirector:MicheleMcTighe LibraryofCongressControlNumber:2015957517 SeniorProductionDirector:WendyTroeger ISBN:978-1-3055-0037-2 ProductionDirector:PattyStephan CengageLearning SeniorContentProjectManager:Brooke 20ChannelCenterStreet Greenhouse Boston,MA02210 ManagingArtDirector:JackPendleton USA CoverImage(s):©AlexMit/Shutterstock.com CengageLearningisaleadingproviderofcustomizedlearningsolutions withemployeesresidinginnearly40differentcountriesandsalesinmore than125countriesaroundtheworld.Findyourlocalrepresentativeat www.cengage.com CengageLearningproductsarerepresentedinCanadaby NelsonEducation,Ltd. TolearnmoreaboutCengageLearning,visitwww.cengage.com. Purchaseanyofourproductsatyourlocalcollegestoreoratourpreferred onlinestorewww.cengagebrain.com. NoticetotheReader Publisherdoesnotwarrantorguaranteeanyoftheproductsdescribedhereinorperformany independentanalysisinconnectionwithanyoftheproductinformationcontainedherein.Pub- lisherdoesnotassume,andexpresslydisclaims,anyobligationtoobtainandincludeinformation otherthanthatprovidedtoitbythemanufacturer.Thereaderisexpresslywarnedtoconsiderand adoptallsafetyprecautionsthatmightbeindicatedbytheactivitiesdescribedhereinandtoavoid allpotentialhazards.Byfollowingtheinstructionscontainedherein,thereaderwillinglyassumes allrisksinconnectionwithsuchinstructions.Thepublishermakesnorepresentationsorwarranties ofanykind,includingbutnotlimitedto,thewarrantiesoffitnessforparticularpurposeormer- chantability,norareanysuchrepresentationsimpliedwithrespecttothematerialsetforthherein, andthepublishertakesnoresponsibilitywithrespecttosuchmaterial.Thepublishershallnotbe liableforanyspecial,consequential,orexemplarydamagesresulting,inwholeorpart,fromthe readers’useof,orrelianceupon,thismaterial. Printed in the United States of America Print Number: 01 Print Year: 2015 Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:13)(cid:96)(cid:96)(cid:136)(cid:136)(cid:204)(cid:204)(cid:105)(cid:105)(cid:96)(cid:96)(cid:202)(cid:202)(cid:220)(cid:220)(cid:136)(cid:136)(cid:204)(cid:204)(cid:133)(cid:133)(cid:202)(cid:202)(cid:204)(cid:204)(cid:133)(cid:133)(cid:105)(cid:105)(cid:202)(cid:202)(cid:96)(cid:96)(cid:105)(cid:105)(cid:147)(cid:147)(cid:156)(cid:156)(cid:202)(cid:202)(cid:219)(cid:219)(cid:105)(cid:105)(cid:192)(cid:192)(cid:195)(cid:195)(cid:136)(cid:136)(cid:156)(cid:156)(cid:152)(cid:152)(cid:202)(cid:202)(cid:156)(cid:156)(cid:118)(cid:118)(cid:202)(cid:202) (cid:22)(cid:22)(cid:152)(cid:152)(cid:118)(cid:118)(cid:136)(cid:136)(cid:221)(cid:221)(cid:202)(cid:202)(cid:42)(cid:42)(cid:192)(cid:192)(cid:156)(cid:156)(cid:202)(cid:202)(cid:42)(cid:42)(cid:12)(cid:12)(cid:19)(cid:19)(cid:202)(cid:202)(cid:13)(cid:13)(cid:96)(cid:96)(cid:136)(cid:136)(cid:204)(cid:204)(cid:156)(cid:156)(cid:192)(cid:192)(cid:202)(cid:202) (cid:47)(cid:47)(cid:156)(cid:156)(cid:202)(cid:202)(cid:192)(cid:192)(cid:105)(cid:105)(cid:147)(cid:147)(cid:156)(cid:156)(cid:219)(cid:219)(cid:105)(cid:105)(cid:202)(cid:202)(cid:204)(cid:204)(cid:133)(cid:133)(cid:136)(cid:136)(cid:195)(cid:195)(cid:202)(cid:202)(cid:152)(cid:152)(cid:156)(cid:156)(cid:204)(cid:204)(cid:136)(cid:136)(cid:86)(cid:86)(cid:105)(cid:105)(cid:93)(cid:93)(cid:202)(cid:202)(cid:219)(cid:219)(cid:136)(cid:136)(cid:195)(cid:195)(cid:136)(cid:136)(cid:204)(cid:204)(cid:92)(cid:92)(cid:202)(cid:202) (cid:220)(cid:220)(cid:220)(cid:220)(cid:220)(cid:220)(cid:176)(cid:176)(cid:136)(cid:136)(cid:86)(cid:86)(cid:105)(cid:105)(cid:152)(cid:152)(cid:136)(cid:136)(cid:176)(cid:176)(cid:86)(cid:86)(cid:156)(cid:156)(cid:147)(cid:147)(cid:201)(cid:201)(cid:213)(cid:213)(cid:152)(cid:152)(cid:143)(cid:143)(cid:156)(cid:156)(cid:86)(cid:86)(cid:142)(cid:142)(cid:176)(cid:176)(cid:133)(cid:133)(cid:204)(cid:204)(cid:147)(cid:147) Brief Contents PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi CHAPTER 1 Introductionto Security... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. 1 CHAPTER 2 PersonalSecurity .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... . 37 CHAPTER 3 ComputerSecurity. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... . 75 CHAPTER 4 InternetSecurity. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 115 CHAPTER 5 MobileSecurity . .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 149 CHAPTER 6 Privacy.. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 183 GLOSSARY .. ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 217 INDEX. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 223 v Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) Table of Contents PREFACE. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... . xi CHAPTER 1 Introductionto Security... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. 1 ChallengesofSecuringInformation. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 3 Today’sAttacks . ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 4 DifficultiesinDefendingagainstAttacks.. .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... 7 WhatIsInformationSecurity? .. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 10 UnderstandingSecurity.. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 10 DefiningInformationSecurity .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 11 InformationSecurityTerminology... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 14 UnderstandingtheImportanceofInformationSecurity. .. ... .. ... ... .. ... ... .. ... ... .. .. 15 WhoAretheAttackers?... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 19 Cybercriminals.. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 20 ScriptKiddies... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 21 Brokers.. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 21 Insiders.. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 22 Cyberterrorists.. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 22 Hactivists .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 22 State-SponsoredAttackers... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 23 BuildingaComprehensiveSecurityStrategy ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 23 BlockAttacks... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 24 UpdateDefenses. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 24 MinimizeLosses. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 25 StayAlert .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 25 ChapterSummary.. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 25 KeyTerms ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 26 ReviewQuestions.. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 26 Hands-OnProjects . .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 30 CaseProjects.. ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 34 References. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 35 CHAPTER 2 PersonalSecurity .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... . 37 PersonalSecurityAttacks .. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 39 PasswordAttacks ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 40 AttacksUsingSocialEngineering ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 44 IdentityTheft... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 50 Social-NetworkingRisks. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 51 PersonalSecurityDefenses.. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 53 PasswordDefenses .. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 53 RecognizingPhishingAttacks. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 57 AvoidingIdentityTheft . ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 57 SettingSocial-NetworkingDefenses.. ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. .. 58 ChapterSummary.. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 60 KeyTerms ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... 62 vii Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147) viii TableofContents ReviewQuestions. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... . 62 Hands-OnProjects .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... . 65 CaseProjects. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... . 72 References. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... . 73 CHAPTER 3 ComputerSecurity... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... .. ... .. 75 AttacksUsingMalware .. ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... . 77 Circulation/Infection .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 77 Concealment .. ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 82 PayloadCapabilities .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 83 ComputerDefenses .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... . 91 ManagingPatches.. .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 91 ExaminingFirewalls .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 94 InstallingAntimalwareSoftware. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 96 MonitoringUserAccountControl(UAC).. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 97 CreatingDataBackups. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 99 RecoveringfromAttacks... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 101 ChapterSummary. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 102 KeyTerms .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 104 ReviewQuestions. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 104 Hands-OnProjects .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 108 CaseProjects. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 113 References. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 113 CHAPTER 4 InternetSecurity.. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... .. ... . 115 HowtheInternetWorks.. ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 117 TheWorldWideWeb . ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 117 Email.. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 119 InternetSecurityRisks ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 120 BrowserVulnerabilities. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 120 Malvertising... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 123 Drive-ByDownloads .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 125 Cookies .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 126 EmailRisks... ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 127 InternetDefenses.. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 130 SecuringtheWebBrowser.. ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 130 EmailDefenses. ... .. ... ... .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 133 InternetSecurityBestPractices.. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... 135 ChapterSummary. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 137 KeyTerms .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 138 ReviewQuestions. .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 139 Hands-OnProjects .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 142 CaseProjects. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 146 References. .. ... .. ... ... .. ... ... .. ... .. ... ... .. ... ... .. ... ... .. ... .. ... ... 147 Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. (cid:13)(cid:96)(cid:136)(cid:204)(cid:105)(cid:96)(cid:202)(cid:220)(cid:136)(cid:204)(cid:133)(cid:202)(cid:204)(cid:133)(cid:105)(cid:202)(cid:96)(cid:105)(cid:147)(cid:156)(cid:202)(cid:219)(cid:105)(cid:192)(cid:195)(cid:136)(cid:156)(cid:152)(cid:202)(cid:156)(cid:118)(cid:202) (cid:22)(cid:152)(cid:118)(cid:136)(cid:221)(cid:202)(cid:42)(cid:192)(cid:156)(cid:202)(cid:42)(cid:12)(cid:19)(cid:202)(cid:13)(cid:96)(cid:136)(cid:204)(cid:156)(cid:192)(cid:202) (cid:47)(cid:156)(cid:202)(cid:192)(cid:105)(cid:147)(cid:156)(cid:219)(cid:105)(cid:202)(cid:204)(cid:133)(cid:136)(cid:195)(cid:202)(cid:152)(cid:156)(cid:204)(cid:136)(cid:86)(cid:105)(cid:93)(cid:202)(cid:219)(cid:136)(cid:195)(cid:136)(cid:204)(cid:92)(cid:202) (cid:220)(cid:220)(cid:220)(cid:176)(cid:136)(cid:86)(cid:105)(cid:152)(cid:136)(cid:176)(cid:86)(cid:156)(cid:147)(cid:201)(cid:213)(cid:152)(cid:143)(cid:156)(cid:86)(cid:142)(cid:176)(cid:133)(cid:204)(cid:147)

Description:
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous edition
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.