Read more
Informationen zum Autor Darril Gibson, MCSE, MCITP, ITIL v3, Security+, CISSP, is the CEO of Security Consulting and Training, LLC. A Microsoft Certified Trainer since August, 1999, he regularly teaches, writes, and consults on a wide variety of security and technical topics. He has authored, coauthored, or contributed to 14 books on a wide range of topics that include Server 2008, Windows 7, SQL Server, CompTIA Security+, and security. Klappentext Learn Windows Security Quickly and Easily This full-color guide covers the basics of securing a Windows operating system and prepares you to take the Microsoft Technology Associate Exam 98-367, Security Fundamentals. You'll learn essential security principles, then quickly get up to speed on malware, NTFS permissions, firewalls, encryption, and much more. This is the ideal book, whether you're aspiring to be an IT professional, or just brushing up on the basics. Learn these Windows security essentials?and more: Understanding how risk and threat impact security principles Recognizing malware in all its forms Defending against social engineering attacks Identifying the three aspects of user authentication Securing access using NTFS permissions Protecting clients, servers, and networks Understanding encryption, certificates, and PKIs Preparing for MTA Exam 98-367, Security Fundamentals This striking Essentials book maximizes skill acquisition and knowledge retention with: Chapter-opening learning objectives Full coverage of all exam topics Four-color screenshots and illustrations Essentials and Beyond?summaries and additional suggested exercises Chapter review questions Zusammenfassung Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. Inhaltsverzeichnis Introduction xix Chapter 1 Understanding Core Security Principles 1 Understanding Risk 1 Exploring the Security Triad 4 Protecting Against Loss of Confidentiality 5 Protecting Against Loss of Availability 5 Protecting Against Loss of Integrity 6 Implementing a Defense-in-Depth Security Strategy 7 Enforcing the Principle of Least Privilege 9 Hardening a Server 10 Reducing the Attack Surface 11 Keeping a System Updated 14 Enabling the Firewall 16 Installing Antivirus Software 16 The Essentials and Beyond 16 Chapter 2 Understanding Malware and Social Engineering 19 Comparing Malware 19 Viruses 21 Worms 22 Trojan Horses 23 Buffer-Overflow Attacks 25 Spyware 26 Understanding the Threat 27 Protecting Against Malware 28 Using Antivirus Software 29 Using Microsoft Security Essentials on Desktops 31 Thwarting Social-Engineering Attacks 34 Social Engineering in Person 34 Social Engineering with a Phone Call 34 Recognizing Phishing Attempts 35 Recognizing Pharming 38 Protecting Email 39 The Essentials and Beyond 41 Chapter 3 Understanding User Authentication 43 Comparing the Three Factors of Authentication 44 Using Passwords for Authentication 45 Comparing Password Attack Methods 45 Creating Strong Passwords 47 Enforcing Strong Passwords 49 Exploring Account Lockout Policies 51 Unlocking an Account 53 Resetting a Password 55 Changing a Password 57 Creating a Password-Reset Disk 58 Using Smart Cards and Token Devices for Authentication 59 Using Biometrics for Authentication 60 Starting Applications with Run As Administrator 61 Preventing Time Skew with Kerberos 63 Identifying RADIUS Capabilities 64 Identifying Unsecure Authentication Protocols 65 LM 66 NTLM (NTLMv1) 66 The Essentials and Beyond 67...
List of contents
Introduction.
Chapter 1 Understanding Core Security Principles.
Chapter 2 Understanding Malware and Social Engineering.
Chapter 3 Understanding User Authentication.
Chapter 4 Securing Access with Permissions.
Chapter 5 Using Audit Policies and Network Auditing.
Chapter 6 Protecting Clients and Servers.
Chapter 7 Protecting a Network.
Chapter 8 Understanding Wireless Security.
Chapter 9 Understanding Physical Security.
Chapter 10 Enforcing Confidentiality with Encryption.
Chapter 11 Understanding Certificates and a PKI.
Chapter 12 Understanding Internet Explorer Security.
Appendix A Answers to Review Questions.
Appendix B Microsoft's Certification Program.
Index.