SE/CIAMPA, CompTIA Security+ Information to Community Security Fundamentals, sixth Version ISBN-978-1-337-28878-1 ©20XX Designer: XXX Textual content & Cowl printer: Quad Graphics Binding: PB Trim: 7.375 x 9.125″ CMYK

Security+ Information to Community Security Fundam

entals

To register or entry your on-line studying answer or buy supplies to your course, go to www.cengagebrain.com.

Security+ Information to Community Security Fundamentals

INFORMATION SECURITY

Sixth Version

Mark Ciampa

Sixth Version

CIAMPA

Copyright 2018 Cengage Studying. All Rights Reserved. Is probably not copied, scanned, or duplicated, in complete or partly. WCN 02-200-203

CompTIA Security+ SY0-501 Examination Targets

Security+ Examination Area/Targets Chapter Bloom’s Taxonomy 1.zero: Threats, Assaults, and Vulnerabilities 1.1 Given a state of affairs, analyze indicators of compromise and decide the kind of

malware. 2 Analyze

1.2 Evaluate and distinction varieties of assaults. 2 three 5 eight

11 15

Perceive Analyze Perceive Apply/Perceive Create Apply

1.three Clarify risk actor varieties and attributes. 1 Analyze/Apply 1.four Clarify penetration testing ideas. 13 Apply 1.5 Clarify vulnerability scanning ideas. 13 Apply 1.6 Clarify the influence related to varieties of vulnerabilities. 1

three four 5 9

10

Perceive Perceive Perceive Perceive Perceive Perceive

2.zero: Applied sciences and Instruments 2.1 Set up and configure community elements, each hardware- and software-based,

to Help organizational safety. four 6 7 eight

Apply Analyze Apply Analyze/Consider

2.2 Given a state of affairs, use applicable software program instruments to evaluate the safety posture of a corporation.

eight 13 14

Consider Analyze/Consider Consider

2.three Given a state of affairs, troubleshoot frequent safety points. 15 Analyze 2.four Given a state of affairs, analyze and interpret output from safety applied sciences. 6

7 9

Analyze Analyze Analyze

2.5 Given a state of affairs, deploy cell gadgets securely. eight 10 11

Apply/Consider Analyze/Create Analyze

2.6 Given a state of affairs, implement safe protocols. four 5

Apply Analyze

three.zero: Structure and Design three.1 Clarify use instances and function for frameworks, greatest practices and safe

configuration guides. 1

15 Analyze Perceive

three.2 Given a state of affairs, implement safe community structure ideas. 6 7 eight

13

Analyze Apply Apply/Consider Apply

88781_ifc_hr.indd 2 eight/9/17 three:41 PM

Copyright 2018 Cengage Studying. All Rights Reserved. Is probably not copied, scanned, or duplicated, in complete or partly. WCN 02-200-203

Australia • Brazil • Mexico • Singapore • United Kingdom • United States

INFORMATION SECURITY

Mark Ciampa, Ph.D.

Sixth Version

SECURITY+ GUIDE TO NETWORK SECURITY

CompTIA ®

FUNDAMENTALS

88781_fm_hr_i-xxvi.indd 1 eight/16/17 7:00 PM

Copyright 2018 Cengage Studying. All Rights Reserved. Is probably not copied, scanned, or duplicated, in complete or partly. WCN 02-200-203

© 2018, 2015 Cengage Studying Until in any other case famous, all content material is © Cengage.

Security+ Information to Community Security Fundamentals, Sixth Version

Mark Ciampa

SVP, GM Expertise: Jonathan Lau

Product Workforce Supervisor: Kristin McNary

Affiliate Product Supervisor: Amy Savino

Govt Director of Improvement: Marah Bellegarde

Senior Product Improvement Supervisor: Leigh Hefferon

Senior Content material Developer: Michelle Ruelos Cannistraci

Product Helpant: Jake Toth

Advertising and marketing Director: Michelle McTighe

Manufacturing Director: Patty Stephan

Senior Content material Venture Supervisor: Brooke Greenhouse

Artwork Director: Diana Graham

Cowl picture(s): iStockPhoto.com/ supernitram

Printed in america of America Print Quantity: 01 Print Yr: 2017

ALL RIGHTS RESERVED. No a part of this work lined by the copy- proper herein could also be reproduced or distributed in any type or by any means, besides as permitted by U.S. copyright regulation, with out the prior written permission of the copyright proprietor.

Library of Congress Management Quantity: 2017950178

ISBN: 978-1-337-28878-1 LLF ISBN: 978-1-337-68585-6

Discover to the Reader Writer doesn’t warrant or assure any of the merchandise described herein or carry out any unbiased Assessment in reference to any of the product data contained herein. Writer doesn’t assume, and expressly disclaims, any obligation to acquire and embody data apart from that offered to it by the producer. The reader is expressly warned to think about and undertake all security precautions that could be indicated by the actions described herein and to keep away from all potential hazards. By following the directions contained herein, the reader willingly assumes all dangers in reference to such directions. The writer makes no representations or warranties of any type, together with however not restricted to, the warranties of health for explicit function or merchantability, nor are any such representations implied with respect to the fabric set forth herein, and the writer takes no duty with respect to such materials. The writer shall not be answerable for any particular, consequential, or exemplary damages ensuing, in complete or half, from the readers’ use of, or reliance upon, this materials.

Cengage 20 Channel Heart Road Boston, MA 02210 USA

Cengage is a number one supplier of custom-made studying options with workers residing in practically 40 totally different international locations and gross sales in additional than 125 international locations world wide. Discover your native consultant at www.cengage.com.

Cengage merchandise are represented in Canada by Nelson Training, Ltd.

To be taught extra about Cengage platforms and companies, go to www.cengage.com

Buy any of our merchandise at your native school retailer or at our most well-liked on-line retailer www.cengagebrain.com

For product data and expertise help, contact us at Cengage Studying Buyer & Gross sales Help, 1-800-354-9706.

For permission to make use of materials from this textual content or product, submit all requests on-line at www.cengage.com/permissions.

Additional permissions questions might be e-mailed to permissionrequest@cengage.com.

A few of the product names and firm names used on this e-book have been used for identification functions solely and could also be emblems or registered emblems of their respective producers and sellers. Home windows® is a registered trademark of Microsoft Company. Microsoft.is registered trademark of Microsoft Company in america and/or different international locations. Cengage is an unbiased entity from Microsoft Company and never affiliated with Microsoft in any method.

88781_fm_hr_i-xxvi.indd 2 eight/16/17 7:00 PM

Copyright 2018 Cengage Studying. All Rights Reserved. Is probably not copied, scanned, or duplicated, in complete or partly. WCN 02-200-203

Transient Contents INTRODUCTION…………………………………………………………………………………xv

PART 1

SECURITY AND ITS THREATS ………………………………………………………………..1

CHAPTER 1

Introduction to Security ……………………………………………………………………..three

CHAPTER 2

Malware and Social Engineering Assaults …………………………………………. 51

PART 2

CRYPTOGRAPHY ……………………………………………………………………………… 97

CHAPTER three

Fundamental Cryptography …………………………………………………………………………. 99

CHAPTER four

Superior Cryptography and PKI …………………………………………………… 145

PART three

NETWORK ATTACKS AND DEFENSES ………………………………………………. 189

CHAPTER 5

Networking and Server Assaults …………………………………………………….. 191

CHAPTER 6

Community Security Units, Design, and Know-how ……………………….. 233

CHAPTER 7

Administering a Safe Community …………………………………………………… 281

CH

Published by
Write
View all posts