Home Page Icon
Home Page
Table of Contents for
Final Review
Close
Final Review
by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Copyright
About the Authors
Acknowledgments
Tell Us What You Think!
How to Use This Book
Introduction
Exam Preparation
Information Security Essentials
Introduction
Understanding the Need for Security Controls
Basic Security Threats and Principles
Where Attacks Can Come From
Assessing and Valuing Security
Identifying the Elements of Security
Understanding Security Trade-Offs and Drawbacks
Case Study: San Diego Security Company
Chapter Summary
Apply Your Knowledge
Fundamentals of TCP/IP
Introduction
Basic TCP/IP Principles
IP Protocols and Services
How Hackers Exploit TCP/IP
Network-Level Topics
Case Study: Key and Tumbler Safes
Chapter Summary
Apply Your Knowledge
Introduction
AAA Overview: Access Control, Authentication, and Accounting
Security Administration—The Importance of a Security Policy
Keeping Up with and Enforcing Security Policies
Risk Assessment
Why Data Classification Is Important
The Importance of Change Management
Performing Vulnerability Assessments
Chapter Summary
Apply Your Knowledge
Intrusion Detection and Prevention
Introduction
Necessary Components to Good Security
Intrusion Detection Systems Fundamentals
Discussion on Firewall Architectures
Administration of Firewalls
Understanding Incident Handling
Setting Up a Honeypot to Attract the Intruder
Using Vulnerability Scanners
Network Sniffers
Chapter Summary
Apply Your Knowledge
System Security Using Firewalls
Introduction
Introduction to Firewalls
Types of Firewalls
Firewall Architecture Review
Introduction to VPNs
Case Study: Assigning Group Membership
Chapter Summary
Apply Your Knowledge
Disaster Planning and Recovery
Introduction
Assembling the Project Team
Business Continuity Versus Disaster Recovery
The Disaster Recovery Plan
Step-by-Step Procedures
Case Study: Designing a Disaster Recovery Plan
Chapter Summary
Apply Your Knowledge
Intrusions, Attacks, and Countermeasures
Introduction
Attack Methods and Countermeasures
Incident Basics
General Incident-Handling Principles
Handling Specific Incidents
Computer Data Forensics
Case Study: Hacker Attack!
Chapter Summary
Apply Your Knowledge
Operating System Security
Introduction
General Operating System Security
Windows Security Basics
Unix Security Basics
Case Study: Assigning Group Membership
Chapter Summary
Apply Your Knowledge
Cryptography and Public Key Infrastructure
Introduction
Brief History of Cryptography
Uses of Cryptography in Information Security
Types of Encryption
Digital Certificates
Hashing and Hash Functions
Digital Signatures
Managing the Encryption Keys
Introduction to PKI
Case Study: Using Encryption Technologies to Secure a Small Network
Apply Your Knowledge
Computer Law and Ethics
Introduction
Categories of Intellectual Property Law
Types of Computer Crime
Basics of Computer Investigation and Forensics
Technology Export and Import Issues
Computer Ethics
How to Protect You and Your Company
Case Study: Investigating a Computer Crimes Case
Chapter Summary
Apply Your Knowledge
Final Review
Fast Facts
Introductory Note: Learn Key Terms!
Define, Specify, or Identify Examples of Essential Security Practices
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Apply Your Knowledge
Next
Next Chapter
Fast Facts
Part II: Final Review
Fast Facts
Study and Exam Preparation Tips
Practice Exam
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset