Chapter 1: Introduction to Computer Security
How Seriously Should You Take Threats to Network Security?
Assessing the Likelihood of an Attack on Your Network
How Do Legal Issues Impact Network Security?
Chapter 2: Networks and the Internet
The Physical Connection: Local Networks
Advanced Network Communications Topics
Media Access Control (MAC) Addresses
Chapter 3: Cyber Stalking, Fraud, and Abuse
How to Evaluate Cyber Stalking
Protecting Yourself Against Cybercrime
Protecting Against Investment Fraud
Protecting Against Identity Theft
Protecting Against Auction Fraud
Protecting Against Online Harassment
Chapter 4: Denial of Service Attacks
Distributed Reflection Denial of Service Attacks
Common Tools Used for DoS Attacks
Real-World Examples of DoS Attacks
How to Defend Against DoS Attacks
The Sasser Virus/Buffer Overflow
How Is Spyware Delivered to a Target System?
Detecting and Eliminating Viruses and Spyware
Chapter 6: Techniques Used by Hackers
The NSA Information Assessment Methodology
PCI Penetration Testing Standard
Chapter 7: Industrial Espionage in Cyberspace
Real-World Examples of Industrial Espionage
Example 2: University Trade Secrets
Example 5: Foreign Governments and Economic Espionage
Trends in Industrial Espionage
Spyware Used in Industrial Espionage
Steganography Used in Industrial Espionage
Protecting Against Industrial Espionage
Single-Key (Symmetric) Encryption
Modification of Symmetric Methods
Public Key (Asymmetric) Encryption
Legitimate Versus Fraudulent Encryption Methods
Steganography Methods and Tools
Cryptography Used on the Internet
Quantum Computing Cryptography
Chapter 9: Computer Security Technology
How Does a Virus Scanner Work?
Benefits and Limitations of Firewalls
Commercial and Free Firewall Products
Point-to-Point Tunneling Protocol
Installing/Uninstalling Software
Final Thoughts on User Policies
Defining System Administration Policies
Standards, Guidelines, and Procedures
Disaster Recovery and Business Continuity Standards
Payment Card Industry Data Security Standards
Chapter 11: Network Scanning and Vulnerability Scanning
Securing an Individual Workstation
Chapter 12: Cyber Terrorism and Information Warfare
Actual Cases of Cyber Terrorism
China’s Advanced Persistent Threat
Supervisory Control and Data Acquisitions (SCADA)
Defense Against Cyber Terrorism
Terrorist Recruiting and Communication
Court Records and Criminal Checks
Chapter 14: Introduction to Forensics
Image a Drive with Forensic Toolkit
Can You Ever Conduct Forensics on a Live Machine?
U.S. Secret Service Forensics Guidelines
Scientific Working Group on Digital Evidence
Locard’s Principle of Transference
Finding Evidence in the Browser
Finding Evidence in System Logs
Mobile Forensics: Cell Phone Concepts
The Need for Forensic Certification
Chapter 15: Cybersecurity Engineering
Defining Cybersecurity Engineering
Cybersecurity and Systems Engineering
Applying Engineering to Cybersecurity