logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004

Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004 (Paperback, 4)

제프 파커 (지은이)
John Wiley & Sons Inc
110,250원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
71,660원 -35% 0원
720원
70,940원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004
eBook 미리보기

책 정보

· 제목 : Casp+ Comptia Advanced Security Practitioner Study Guide: Exam Cas-004 (Paperback, 4) 
· 분류 : 외국도서 > 컴퓨터 > 자격증 > 자격증 일반
· ISBN : 9781119803164
· 쪽수 : 592쪽
· 출판일 : 2022-10-11

목차

Introduction xxv

Assessment Test xxxv

Chapter 1 Risk Management 1

Risk Terminology 4

The Risk Assessment Process 6

Asset Identification 6

Information Classification 8

Risk Assessment 9

Risk Assessment Options 14

Implementing Controls 16

Policies Used to Manage Employees 17

Pre-Employment Policies 18

Employment Policies 18

End of Employment and Termination Procedures 20

Cost-Benefit Analysis 21

Continuous Monitoring 22

Enterprise Security Architecture Frameworks and Governance 23

Training and Awareness for Users 24

Best Practices for Risk Assessments 25

Business Continuity Planning and Disaster Recovery 27

Reviewing the Effectiveness of Existing Security Controls 28

Conducting Lessons Learned and After-Action Reviews 30

Creation, Collection, and Analysis of Metrics 31

Metrics 31

Trend Data 32

Analyzing Security Solutions to Ensure They Meet Business Needs 32

Testing Plans 33

Internal and External Audits 34

Using Judgment to Solve Difficult Problems 35

Summary 35

Exam Essentials 36

Review Questions 38

Chapter 2 Configure and Implement Endpoint Security Controls 43

Hardening Techniques 45

Address Space Layout Randomization Use 47

Hardware Security Module and Trusted Platform Module 48

Trusted Operating Systems 52

Compensating Controls 55

Summary 57

Exam Essentials 58

Review Questions 59

Chapter 3 Security Operations Scenarios 63

Threat Management 66

Types of Intelligence 66

Threat Hunting 67

Threat Emulation 67

Actor Types 67

Intelligence Collection Methods 71

Open-Source

Intelligence 71

Human Intelligence and Social Engineering 73

Frameworks 74

MITRE Adversarial Tactics, Techniques and Common Knowledge 74

ATT&CK for Industrial Control Systems 75

Cyber Kill Chain 76

Diamond Model of Intrusion Analysis 76

Indicators of Compromise 77

Reading the Logs 77

Intrusion Detection and Prevention 78

Notifications and Responses to IoCs 79

Response 80

Summary 85

Exam Essentials 85

Review Questions 86

Chapter 4 Security Ops: Vulnerability Assessments and Operational Risk 91

Terminology 97

Vulnerability Management 98

Security Content Automation Protocol 103

Self-Assessment vs. Third-Party Vendor Assessment 105

Patch Management 108

Information Sources 110

Tools 112

Assessments 124

Penetration Testing 129

Assessment Types 131

Vulnerabilities 134

Buffer Overflow 134

Integer Overflow 135

Memory Leaks 136

Race Conditions (TOC/TOU) 136

Resource Exhaustion 137

Data Remnants 138

Use of Third-Party Libraries 138

Code Reuse 138

Cryptographic Vulnerabilities 138

Broken Authentication 139

Security Misconfiguration 140

Inherently Vulnerable System/Application 140

Client-Side Processing vs. Server-Side Processing 141

Attacks 145

Proactive Detection 153

Incident Response 153

Countermeasures 153

Deceptive Technology 154

USB Key Drops 155

Simulation 155

Security Data Analytics 155

Application Control 156

Allow and Block Lists 157

Security Automation 157

Physical Security 158

Summary 159

Exam Essentials 160

Review Questions 161

Chapter 5 Compliance and Vendor Risk 165

Shared Responsibility in Cloud Computing 168

Cloud Service/Infrastructure Models 169

Cloud Computing Providers and Hosting Options 169

Benefits of Cloud Computing 171

Security of On-Demand/Elastic Cloud Computing 174

Geographic Location 175

Infrastructure 175

Compute 175

Storage 175

Networking 176

Managing and Mitigating Risk 182

Security Concerns of Integrating Diverse Industries 185

Regulations, Accreditations, and Standards 187

PCI DSS 187

GDPR 190

ISO 192

CMMI 193

NIST 194

COPPA 195

CSA-STAR 196

HIPAA, SOX, and GLBA 197

Contract and Agreement Types 198

Third-Party Attestation of Compliance 202

Legal Considerations 203

Summary 204

Exam Essentials 205

Review Questions 206

Chapter 6 Cryptography and PKI 211

The History of Cryptography 216

Cryptographic Goals and Requirements 217

Supporting Security Requirements 218

Compliance and Policy Requirements 219

Privacy and Confidentiality Requirements 219

Integrity Requirements 220

Nonrepudiation 220

Risks with Data 221

Data at Rest 221

Data in Transit 222

Data in Process/Data in Use 222

Hashing 223

Message Digest 225

Secure Hash Algorithm 225

Message Authentication Code 226

Hashed Message Authentication Code 226

RACE Integrity Primitives Evaluation Message Digest 226

Poly1305 226

Symmetric Algorithms 227

Data Encryption Standard 230

Triple DES 231

Rijndael and the Advanced Encryption Standard 231

ChaCha 232

Salsa20 232

International Data Encryption Algorithm 232

Rivest Cipher Algorithms 233

Counter Mode 233

Asymmetric Encryption 233

Diffie–Hellman 235

RSA 236

Elliptic Curve Cryptography 237

ElGamal 238

Hybrid Encryption and Electronic Data Exchange (EDI) 238

Public Key Infrastructure Hierarchy 239

Certificate Authority 240

Registration Authority 241

Digital Certificates 241

Certificate Revocation List 243

Certificate Types 243

Certificate Distribution 244

The Client’s Role in PKI 245

Implementation of Cryptographic Solutions 247

Application Layer Encryption 248

Transport Layer Encryption 249

Internet Layer Controls 250

Additional Authentication Protocols 251

Cryptocurrency 252

Digital Signatures 252

Recognizing Cryptographic Attacks 254

Troubleshooting Cryptographic Implementations 256

Summary 259

Exam Essentials 259

Review Questions 261

Chapter 7 Incident Response and Forensics 265

The Incident Response Framework 268

Event Classifications 268

Triage Events 269

Pre-Escalation Tasks 270

The Incident Response Process 270

Response Playbooks and Processes 273

Communication Plan and Stakeholder Management 274

Forensic Concepts 277

Principles, Standards, and Practices 278

The Forensic Process 279

Forensic Analysis Tools 283

File Carving Tools 284

Binary Analysis Tools 284

Analysis Tools 286

Imaging Tools 288

Hashing Utilities 289

Live Collection vs. Postmortem Tools 290

Summary 294

Exam Essentials 294

Review Questions 295

Chapter 8 Security Architecture 301

Security Requirements and Objectives for a Secure Network Architecture 310

Services 310

Segmentation 334

Deperimeterization/Zero Trust 344

Merging Networks from Various Organizations 352

Software-Defined Networking 357

Organizational Requirements for Infrastructure Security Design 358

Scalability 358

Resiliency 359

Automation 359

Containerization 360

Virtualization 361

Content Delivery Network 361

Integrating Applications Securely into an Enterprise Architecture 362

Baseline and Templates 362

Software Assurance 367

Considerations of Integrating Enterprise Applications 370

Integrating Security into the Development Life Cycle 373

Data Security Techniques for Securing Enterprise Architecture 384

Data Loss Prevention 384

Data Loss Detection 387

Data Classification, Labeling, and Tagging 388

Obfuscation 390

Anonymization 390

Encrypted vs. Unencrypted 390

Data Life Cycle 391

Data Inventory and Mapping 391

Data Integrity Management 391

Data Storage, Backup, and Recovery 392

Security Requirements and Objectives for Authentication and Authorization Controls 394

Credential Management 394

Password Policies 396

Federation 398

Access Control 399

Protocols 401

Multifactor Authentication 403

One-Time Passwords 404

Hardware Root of Trust 404

Single Sign-On 405

JavaScript Object Notation Web Token 405

Attestation and Identity Proofing 406

Summary 406

Exam Essentials 407

Review Questions 410

Chapter 9 Secure Cloud and Virtualization 415

Implement Secure Cloud and Virtualization Solutions 418

Virtualization Strategies 419

Deployment Models and Considerations 425

Service Models 429

Cloud Provider Limitations 433

Extending Appropriate On-Premises Controls 433

Storage Models 439

How Cloud Technology Adoption Impacts Organization Security 445

Automation and Orchestration 445

Encryption Configuration 445

Logs 446

Monitoring Configurations 447

Key Ownership and Location 448

Key Life-Cycle Management 448

Backup and Recovery Methods 449

Infrastructure vs. Serverless Computing 450

Software-Defined Networking 450

Misconfigurations 451

Collaboration Tools 451

Bit Splitting 461

Data Dispersion 461

Summary 461

Exam Essentials 462

Review Questions 463

Chapter 10 Mobility and Emerging Technologies 467

Emerging Technologies and Their Impact on Enterprise Security and Privacy 471

Artificial Intelligence 472

Machine Learning 472

Deep Learning 472

Quantum Computing 473

Blockchain 473

Homomorphic Encryption 474

Distributed Consensus 475

Big Data 475

Virtual/Augmented Reality 475

3D Printing 476

Passwordless Authentication 476

Nano Technology 477

Biometric Impersonation 477

Secure Enterprise Mobility Configurations 478

Managed Configurations 479

Deployment Scenarios 486

Mobile Device Security Considerations 487

Security Considerations for Technologies, Protocols, and Sectors 495

Embedded Technologies 495

ICS/Supervisory Control and Data Acquisition 496

Protocols 498

Sectors 499

Summary 500

Exam Essentials 500

Review Questions 501

Appendix Answers to Review Questions 505

Chapter 1: Risk Management 506

Chapter 2: Configure and Implement Endpoint Security Controls 507

Chapter 3: Security Operations Scenarios 509

Chapter 4: Security Ops: Vulnerability Assessments and Operational Risk 511

Chapter 5: Compliance and Vendor Risk 513

Chapter 6: Cryptography and PKI 514

Chapter 7: Incident Response and Forensics 516

Chapter 8: Security Architecture 519

Chapter 9: Secure Cloud and Virtualization 522

Chapter 10: Mobility and Emerging Technologies 524

Index 529

저자소개

제프 파커 (지은이)    정보 더보기
노련한 보안 전문가이자 기술문서 저자다. 20년 경력을 디지털 이큅먼트 사에서 시작했고, 컴팩과 휴렛팩커드를 거치는 과정에서 복잡한 기업 환경에 대해 주로 컨설팅했다. HP에 있는 동안 관심 분야를 시스템에서 보안으로 옮겼다. 오로지 IT 보안 분야가 배움과 공유에 대한 끝없는 갈증을 채워줄 수 있었다. '할 수 있는 한 자격증 많이 따기' 단계를 마치고, UN 기관, 정부 서비스, 대기업을 포함한 고객사에 서비스를 제공한 것에 가장 자부심을 느끼고 있다. IT와는 거리가 먼 학위를 갖고 있지만, 늦은 것을 만회하려고 집에 있는 연구실에서 고군분투한다. 가족과 함께 캐나다 노버 스코셔 주의 핼리팩스에서 인생을 즐기며 산다. 정말 재밌게도 이 책 집필 프로젝트의 종료와 대망의 신규 프로젝트 시기를 맞췄다. 이제 할 일은 새 강아지를 집에서 훈련시키기 프로젝트다.
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책