Computer Security Fundamentals
Total Page:16
File Type:pdf, Size:1020Kb
Computer Security Fundamentals Fourth Edition Dr. Chuck Easttom Computer Security Fundamentals, Fourth Edition Editor-in-Chief Mark Taub Copyright © 2020 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by Product Line Manager any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from Brett Bartow the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no Senior Editor responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the James Manly information contained herein. ISBN-13: 978-0-13-577477-9 Development Editor ISBN-10: 0-13-577477-2 Christopher Cleveland Library of Congress control number: 2019908181 Managing Editor ScoutAutomatedPrintCode Sandra Schroeder Trademarks Project Editor All terms mentioned in this book that are known to be trademarks or service marks have been Mandie Frank appropriately capitalized. Pearson cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Indexer ® ® ® Microsoft Windows , and Microsoft Office are registered trademarks of the Microsoft Corporation in Erika Millen the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Proofreader Abigail Manheim Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or Technical Editor fitness is implied. The information provided is on an “as is” basis. The author and the publisher shall have Akhil Behl neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. Publishing Coordinator Microsoft and/or its respective suppliers make no representations about the suitability of the information Cindy Teeters contained in the documents and related graphics published as part of the services for any purpose all such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its Designer respective suppliers hereby disclaim all warranties and conditions with regard to this information, including Chuti Prasertsith all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or Compositor profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection codeMantra with the use or performance of information available from the services. The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified. iii Credits Figure Number Attribution/Credit Line Figure 2-1 Screenshot of Command prompt © Microsoft 2019 Figure 2-2 Screenshot of Command prompt © Microsoft 2019 Figure 2-3 Screenshot of Command prompt © Microsoft 2019 Figure 2-4 Screenshot of Command prompt © Microsoft 2019 Figure 2-5 Screenshot of Command prompt © Microsoft 2019 Figure 2-6 Screenshot of Command prompt © Microsoft 2019 Figure 2-7 Screenshot of Command prompt © Microsoft 2019 Figure 2-8 Screenshot of Command prompt © Microsoft 2019 Figure 2-9 Screenshot of Command prompt © Microsoft 2019 Figure 3-1 Screenshot of windows © Microsoft 2019 Figure 3-2 Screenshot of windows © Microsoft 2019 Figure 3-3 Screenshot of windows © Microsoft 2019 Figure 3-4 Screenshot of windows © Microsoft 2019 Figure 3-5 Screenshot of windows © Microsoft 2019 Figure 4-1 Screenshot of Command prompt © Microsoft 2019 Figure 4-2 Screenshot of LOIC © Praetox Technologies Figure 4-3 Screenshot of XOIC © Praetox Technologies Figure 5-1 Screenshot of Command prompt © Microsoft 2019 Figure 5-2 Screenshot of Counterexploitation © CEXX.ORG Figure 5-3 Screenshot of SpywareGuide © 2003-2011, Actiance, Inc. Figure 5-4 Screenshot of SpywareGuide © 2003-2011, Actiance, Inc. Figure 5-5 Screenshot of SpywareGuide © 2003-2011, Actiance, Inc. Figure 5-6 Screenshot of Norton Security © 1995 - 2019 Symantec Corporation Figure 5-7 Screenshot of McAfee AntiVirus © 2019 McAfee, LLC Figure 5-8 Screenshot of Avast © 1988-2019 Copyright Avast Software s.r.o Figure 5-9 Screenshot of AVG © 1988-2019 Copyright Avast Software s.r.o Figure 5-10 Screenshot of Malwarebytes © 2019 Malwarebytes Figure 5-11 Screenshot of Windows © Microsoft 2019 Figure 6-1 Screenshot of Netcraft © 1995-2019 Netcraft Ltd Figure 6-2 Screenshot of WayBackMachine BETA © Internet Archive Figure 6-3 Screenshot of Zenmap © NMAP.ORG Figure 6-4 Screenshot of Cain © Cain and Abel Figure 6-5 Screenshot of Shodan © 2013-2019 Shodan Figure 6-6 Screenshot of Shodan © 2013-2019 Shodan Figure 6-8 Screenshot of OphCrack © 2019 Slashdot Media Figure 6-9 Screenshot of TeraBIT Virus Maker © TeraBIT Virus Maker Figure 6-11 Screenshot of Yahoo © 2019 Verizon Media Figure 6-12 Screenshot of Peoples Drug Store © 2019 Digital Pharmacist Inc. Figure 7-2 New Africa/Shutterstock Figure 7-4 Reed Kaestner/Getty Images Figure 7-5 Screenshot of VeraCrypt © IDRIX Figure 7-6 Screenshot of windows © Microsoft 2019 Figure 8-2 Chuck Easttom Figure 9-1 Screenshot of Windows 10 Firewall © Microsoft 2019 Figure 9-2 Screenshot of Snort Installation © 2019 Cisco Figure 9-7 Screenshot of Windows-style library © Microsoft 2019 Figure 11-1 Screenshot of Shutting Down a Service in Windows © Microsoft 2019 Figure 11-2 Screenshot of Disabled services © Microsoft 2019 Figure 11-4 Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019 Figure 11-5 Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019 Figure 11-6 Screenshot of Microsoft Baseline Security Analyzer © Microsoft 2019 Figure 11-7 Screenshot of Nessus © 2019 Tenable Figure 11-8 Screenshot of Nessus © 2019 Tenable Figure 11-9 Screenshot of Nessus © 2019 Tenable Figure 11-10 Screenshot of Nessus © 2019 Tenable Figure 11-11 Screenshot of Nessus © 2019 Tenable Figure 11-12 Screenshot of OWASP ZAP © OWASP Figure 11-13 Screenshot of OWASP ZAP © OWASP Figure 11-14 Screenshot of shodan © 2013-2019 Shodan® Figure 11-15 Screenshot of shodan © 2013-2019 Shodan® Figure 12-1 Dan Grytsku/123RF Figure 12-2 Screenshot of Sinn Fein © Sinn Féin Figure 12-3 Screenshot of BBC News © 2019 BBC Figure 12-4 Screenshot of Cyberterrorism Preparedness Act Figure 12-5 Screenshot of Cyberterrorism Preparedness Act Figure 12-6 Screenshot of Tech Law Journal Figure 12-7 Screenshot of The Peoples drug store Figure 12-8 Screenshot of ccPal Store Figure 13-1 Screenshot of Yahoo © 2019 Verizon Media Figure 13-2 Screenshot of Yahoo © 2019 Verizon Media Figure 13-3 Screenshot of Yahoo © 2019 Verizon Media Figure 13-4 Screenshot of Infobel © 1995 - 2019 Kapitol Figure 13-6 Screenshot of Federal Bureau of Investigation Figure 13-7 Screenshot of Texas Department of Public Safety © 2000- 2019 Texas Department of Public Safety. Figure 13-8 Screenshot of Oklahoma Figure 13-9 Screenshot of Google access ©2019 Google Figure 14-1 Screenshot of FTK Imager © Copyright 2019 AccessData Figure 14-2 Screenshot of FTK Imager © Copyright 2019 AccessData Figure 14-3 Screenshot of FTK Imager © Copyright 2019 AccessData Figure 14-4 Screenshot of FTK Imager © Copyright 2019 AccessData Figure 14-5 Screenshot of FTK Imager © Copyright 2019 AccessData Figure 14-6 Screenshot of OSForensics Copyright © 2019 PassMark® Software Figure 14-7 Screenshot of OSForensics Copyright © 2019 PassMark® Software Figure 14-8 Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC Figure 14-9 Screenshot of DiskDigger Copyright © 2010-2019 Defiant Technologies, LLC Figure 14-10 pio3/Shutterstock Figure 14-11 Screenshot of OSForensics Copyright © 2019 PassMark® Software Figure 14-12 Screenshot of Command Prompt © Microsoft 2019 Figure 14-13 Screenshot of Command Prompt © Microsoft 2019 Figure 14-14 Screenshot of Command Prompt © Microsoft 2019 Figure 14-15 Screenshot of Command Prompt © Microsoft 2019 Figure 14-16 Screenshot of Windows registry © Microsoft 2019 Figure 14-17 Screenshot of Windows registry © Microsoft 2019 Figure 15-10 Screenshot of Microsoft Excel © Microsoft 2019 Cover gintas77/Shutterstock Contents at a Glance Introduction .......................................................... xxvi 1 Introduction to Computer Security ...................................... 2 2 Networks and the Internet ............................................ 32 3 Cyber Stalking, Fraud, and Abuse ...................................... 66 4 Denial of Service Attacks ............................................. 96 5 Malware .......................................................... 120 6 Techniques Used by Hackers ......................................... 152 7 Industrial Espionage in Cyberspace ................................... 182 8 Encryption .......................................................