Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

CompTIA Security study guide
PREMIUM
Số trang
552
Kích thước
10.6 MB
Định dạng
PDF
Lượt xem
1000

CompTIA Security study guide

Nội dung xem thử

Mô tả chi tiết

Wiley Publishing, Inc.

CompTIA Security+™

Study Guide

Third Edition

Mike Pastore

Emmett Dulaney

3668fm.fm Page i Thursday, March 16, 2006 9:16 AM

Acquisitions and Development Editor: Jeff Kellum

Technical Editor: Warren Wytostek

Production Editor: Angela Smith

Copy Editor: Liz Welch

Production Manager: Tim Tate

Vice President and Executive Group Publisher: Richard Swadley

Vice President and Executive Publisher: Joseph B. Wikert

Vice President and Publisher: Neil Edde

Permissions Editor: Shannon Walters

Media Development Specialist: Kit Malone

Book Designer: Judy Fung

Compositor: Craig Woods, Happenstance Type-O-Rama

Proofreader: WordOne

Indexer: Ted Laux

Cover Designer: Archer Design

Cover Image: Photodisc and Victor Arre

Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN-13: 978-0-4700-3668-6

ISBN-10: 0-4700-3668-0

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any

means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections

107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or

authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood

Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should

be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256,

(317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties

with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties,

including without limitation warranties of fitness for a particular purpose. No warranty may be created or

extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for

every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal,

accounting, or other professional services. If professional assistance is required, the services of a competent pro￾fessional person should be sought. Neither the publisher nor the author shall be liable for damages arising here￾from. The fact that an organization or Website is referred to in this work as a citation and/or a potential source

of further information does not mean that the author or the publisher endorses the information the organization

or Website may provide or recommendations it may make. Further, readers should be aware that Internet Web￾sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer

Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be

available in electronic books.

Library of Congress Cataloging-in-Publication Data is available from the publisher.

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John

Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without

written permission. CompTIA Security+ is a trademark of the Computing Technology Industry Association. All

other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any

product or vendor mentioned in this book.

10 9 8 7 6 5 4 3 2 1

3668fm.fm Page ii Thursday, March 16, 2006 9:16 AM

Sybex is an independent entity from CompTIA and is not affiliated with CompTIA in any manner. Neither

CompTIA nor Sybex warrants that use of this publication will ensure passing the relevant exam. Security+ is

either a registered trademark or trademark of CompTIA in the United States and/or other countries.

The logo of the CompTIA Authorized Quality Curriculum (CAQC) program and the status of this or other

training material as “Authorized” under the CompTIA Authorized Quality Curriculum program signifies that,

in CompTIA’s opinion, such training material covers the content of the CompTIA’s related certification exam.

CompTIA has not reviewed or approved the accuracy of the contents of this training material and specifically

disclaims any warranties of merchantability or fitness for a particular purpose. CompTIA makes no guarantee

concerning the success of persons using any such “Authorized” or other training material in order to prepare

for any CompTIA certification exam.

The contents of this training material were created for the CompTIA Security+ exam covering CompTIA

certification objectives that were current as of 2002.

How to Become CompTIA Certified:

This training material can help you prepare for and pass a related CompTIA certification exam or exams. In order

to achieve CompTIA certification, you must register for and pass a CompTIA certification exam or exams.

In order to become CompTIA certified, you must:

(1) Select a certification exam provider. For more information please visit http://www.comptia.org/certification/

general_information/exam_locations.aspx.

(2) Register for and schedule a time to take the CompTIA certification exam(s) at a convenient location.

(3) Read and sign the Candidate Agreement, which will be presented at the time of the exam(s). The text of the

Candidate Agreement can be found at http://www.comptia.org/certification/general_information/candidate_

agreement.aspx.

(4) Take and pass the CompTIA certification exam(s).

For more information about CompTIA’s certifications, such as their industry acceptance, benefits, or program

news, please visit http://www.comptia.org/certification.

CompTIA is a non-profit information technology (IT) trade association. CompTIA’s certifications are designed by

subject matter experts from across the IT industry. Each CompTIA certification is vendor-neutral, covers multiple

technologies, and requires demonstration of skills and knowledge widely sought after by the IT industry.

To contact CompTIA with any questions or comments:

Please call + 1 630-678-8300

[email protected]

Sybex is an independent entity from CompTIA and is not affiliated with CompTIA in any manner. Neither

CompTIA nor Sybex warrants that use of this publication will ensure passing the relevant exam. Security+ is

either a registered trademark or trademark of CompTIA in the United States and/or other countries.

3668fm.fm Page iii Thursday, March 16, 2006 9:16 AM

To Our Valued Readers:

Thank you for looking to Sybex for your Security+ exam prep needs. We at Sybex are proud

of our reputation for providing certification candidates with the practical knowledge and

skills needed to succeed in the highly competitive IT marketplace. Certification candidates

have come to rely on Sybex for accurate and accessible instruction on today’s crucial tech￾nologies and business skills.

Just as CompTIA is committed to establishing measurable standards for certifying IT security

professionals by means of the Security+ certification, Sybex is committed to providing those

individuals with the knowledge needed to meet those standards.

The authors and editors have worked hard to ensure that the new edition of the CompTIA

Security+ Study Guide you hold in your hands is comprehensive, in-depth, and pedagogi￾cally sound. We’re confident that this book will exceed the demanding standards of the cer￾tification marketplace and help you, the Security+ certification candidate, succeed in your

endeavors.

As always, your feedback is important to us. If you believe you’ve identified an error in the

book, please send a detailed e-mail to [email protected]. And if you have general com￾ments or suggestions, feel free to drop me a line directly at [email protected]. At Sybex we're

continually striving to meet the needs of individuals preparing for certification exams.

Good luck in pursuit of your Security+ certification!

Neil Edde

Vice President & Publisher

Wiley Publishing, Inc.

3668fm.fm Page iv Thursday, March 16, 2006 9:16 AM

Contents at a Glance

Introduction xv

Assessment Test xxix

Chapter 1 General Security Concepts 1

Chapter 2 Identifying Potential Risks 51

Chapter 3 Infrastructure and Connectivity 103

Chapter 4 Monitoring Activity and Intrusion Detection 165

Chapter 5 Implementing and Maintaining a Secure Network 211

Chapter 6 Securing the Network and Environment 253

Chapter 7 Cryptography Basics, Methods, and Standards 301

Chapter 8 Security Policies and Procedures 369

Chapter 9 Security Management 419

Glossary 455

Index 495

3668fm.fm Page v Thursday, March 16, 2006 9:16 AM

3668fm.fm Page vi Thursday, March 16, 2006 9:16 AM

Contents

Introduction xv

Assessment Test xxix

Chapter 1 General Security Concepts 1

Understanding Information Security 4

Securing the Physical Environment 5

Examining Operational Security 7

Working with Management and Policies 9

Understanding the Goals of Information Security 13

Comprehending the Security Process 14

Appreciating Antivirus Software 14

Implementing Access Control 14

Understanding Authentication 16

Understanding Networking Services and Protocols 22

Distinguishing Between Security Topologies 24

Setting Design Goals 25

Creating Security Zones 27

Working with Newer Technologies 31

Business Concerns to Be Aware Of 34

Summary 39

Exam Essentials 40

Hands-On Labs 43

Lab 1.1: Update a Linux System 43

Lab 1.2: Update a Windows-Based System 43

Review Questions 44

Answers to Review Questions 48

Chapter 2 Identifying Potential Risks 51

Calculating Attack Strategies 52

Types of Access Attacks 53

Recognizing Modification and Repudiation Attacks 55

Identifying Denial-of-Service (DoS) and Distributed DoS

(DDoS) Attacks 55

Recognizing Common Attacks 57

Back Door Attacks 57

Spoofing Attacks 58

Man-in-the-Middle Attacks 59

Replay Attacks 60

Password-Guessing Attacks 61

3668fm.fm Page vii Thursday, March 16, 2006 9:16 AM

viii Contents

Identifying TCP/IP Security Concerns 61

Working with the TCP/IP Protocol Suite 63

Encapsulation 66

Working with Protocols and Services 67

Recognizing TCP/IP Attacks 70

Understanding Software Exploitation 76

Surviving Malicious Code 78

Viruses 78

Trojan Horses 85

Logic Bombs 85

Worms 86

Antivirus Software 87

Understanding Social Engineering 88

An Introduction to Auditing Processes and Files 90

Summary 91

Exam Essentials 92

Hands-On Labs 95

Lab 2.1: Identify Running Processes

on a Windows-Based Machine 95

Lab 2.2: Identify Running Processes

on a Linux-Based Machine 95

Review Questions 97

Answers to Review Questions 101

Chapter 3 Infrastructure and Connectivity 103

Understanding Infrastructure Security 105

Working with Hardware Components 106

Working with Software Components 108

Understanding the Different Network Infrastructure Devices 109

Firewalls 109

Hubs 114

Routers 114

Switches 116

Wireless Access Points 117

Modems 119

Remote Access Services 119

Telecom/PBX Systems 120

Virtual Private Networks 122

Monitoring and Diagnosing Networks 123

Network Monitors 123

Securing Workstations and Servers 125

Understanding Mobile Devices 127

3668fm.fm Page viii Thursday, March 16, 2006 9:16 AM

Contents ix

Understanding Remote Access 128

Using the Point-to-Point Protocol 128

Tunneling Protocols 129

802.1x Wireless Protocols 130

RADIUS 130

TACACS/+ 131

Securing Internet Connections 132

Working with Ports and Sockets 132

Working with E-mail 133

Working with the Web 134

Working with the File Transfer Protocol 139

Understanding SNMP and

Other TCP/IP Protocols 141

The Basics of Cabling, Wires, and Communications 142

Coax 142

Unshielded Twisted Pair and Shielded Twisted Pair 146

Fiber Optic 147

Infrared 148

Radio Frequencies 148

Microwave Systems 149

Employing Removable Media 151

Tape 151

CD-R 152

Hard Drives 153

Diskettes 153

Flash Cards 153

Smart Cards 154

Summary 154

Exam Essentials 156

Hands-On Labs 157

Lab 3.1: Examine the Windows Routing Table 157

Lab 3.2: Examine the Linux Routing Table 157

Review Questions 158

Answers to Review Questions 162

Chapter 4 Monitoring Activity and Intrusion Detection 165

Monitoring the Network 167

Recognizing the Different Types of Network Traffic 168

Monitoring Network Systems 173

Understanding Intrusion Detection Systems 174

Working with a Network-Based IDS 178

3668fm.fm Page ix Thursday, March 16, 2006 9:16 AM

x Contents

Working with a Host-Based IDS 183

Utilizing Honey Pots 184

Understanding Incident Response 186

Working with Wireless Systems 191

Wireless Transport Layer Security 191

IEEE 802.11x Wireless Protocols 192

WEP/WAP 192

Wireless Vulnerabilities to Know 193

Understanding Instant Messaging’s Features 194

IM Vulnerabilities 195

Controlling Privacy 195

Working with 8.3 File Naming 195

Understanding Packet Sniffing 196

Understanding Signal Analysis and Intelligence 197

Footprinting 197

Scanning 198

Summary 198

Exam Essentials 199

Hands-On Labs 201

Lab 4.1: View the Active TCP and UDP Ports 201

Lab 4.2: Run Windows Network Monitor 201

Lab 4.3: Install snort in Linux 202

Lab 4.4: Make File Extensions Visible in Windows XP 202

Lab 4.5: Monitor Network Traffic in Linux 202

Review Questions 204

Answers to Review Questions 208

Chapter 5 Implementing and Maintaining a Secure Network 211

Overview of Network Security Threats 213

Defining Security Baselines 215

Hardening the OS and NOS 217

Configuring Network Protocols 218

Hardening Microsoft Windows 2000 220

Hardening Microsoft Windows XP 222

Hardening Windows Server 2003 222

Hardening Unix/Linux 223

Hardening Novell NetWare 224

Hardening Apple Macintosh 225

Hardening Filesystems 225

Updating Your Operating System 228

Hardening Network Devices 229

Updating Network Devices 230

Configuring Routers and Firewalls 230

3668fm.fm Page x Thursday, March 16, 2006 9:16 AM

Contents xi

Hardening Applications 231

Hardening Web Servers 232

Hardening E-Mail Servers 233

Hardening FTP Servers 234

Hardening DNS Servers 234

Hardening NNTP Servers 235

Hardening File and Print Servers and Services 236

Hardening DHCP Services 237

Working with Data Repositories 238

Summary 241

Exam Essentials 243

Hands-On Labs 244

Lab 5.1: Install OpenLDAP on a SuSE Server 244

Lab 5.2: Work with Performance Monitor and Windows 244

Lab 5.3: Work with Unix/Linux Networking 245

Lab 5.4: Install and Configure the E-mail Service on a

SuSE Server 245

Review Questions 246

Answers to Review Questions 250

Chapter 6 Securing the Network and Environment 253

Understanding Physical and Network Security 254

Implementing Access Control 254

Understanding Social Engineering 261

Scanning the Environment 264

Understanding Business Continuity Planning 271

Undertaking Business Impact Analysis 272

Assessing Risk 273

Developing Policies, Standards, and Guidelines 275

Implementing Policies 276

Incorporating Standards 277

Following Guidelines 278

Working with Security Standards and ISO 17799 279

Classifying Information 280

Public Information 281

Private Information 282

Roles in the Security Process 284

Information Access Controls 285

Summary 289

Exam Essentials 291

Hands-On Lab 293

Lab 6.1: Test Social Engineering 293

Review Questions 294

Answers to Review Questions 298

3668fm.fm Page xi Thursday, March 16, 2006 9:16 AM

xii Contents

Chapter 7 Cryptography Basics, Methods, and Standards 301

An Overview of Cryptography 303

Understanding Physical Cryptography 304

Understanding Mathematical Cryptography 306

Understanding Quantum Cryptography 308

Uncovering the Myth of Unbreakable Codes 309

Understanding Cryptographic Algorithms 310

The Science of Hashing 310

Working with Symmetric Algorithms 312

Working with Asymmetric Algorithms 313

Using Cryptographic Systems 315

Confidentiality 315

Integrity 315

Authentication 318

Nonrepudiation 319

Access Control 319

Using Public Key Infrastructure 320

Using a Certificate Authority 321

Working with Registration Authorities and Local

Registration Authorities 322

Implementing Certificates 324

Understanding Certificate Revocation 325

Implementing Trust Models 326

Preparing for Cryptographic Attacks 330

Understanding Cryptography Standards and Protocols 332

The Origins of Encryption Standards 332

PKIX/PKCS 336

X.509 337

SSL and TLS 338

CMP 339

S/MIME 340

SET 340

SSH 340

PGP 343

HTTPS 343

S-HTTP 344

IPSec 344

FIPS 344

Common Criteria 345

WTLS 345

WEP 345

ISO 17799 345

3668fm.fm Page xii Thursday, March 16, 2006 9:16 AM

Contents xiii

Understanding Key Management and the Key Life Cycle 346

Comparing Centralized and Decentralized Key Generation 346

Storing and Distributing Keys 348

Using Key Escrow 350

Key Expiration 351

Revoking Keys 351

Suspending Keys 352

Recovering and Archiving Keys 352

Renewing Keys 354

Destroying Keys 355

Key Usage 355

Summary 356

Exam Essentials 358

Hands-On Labs 361

Lab 7.1: Hash Rules in Windows Server 2003 361

Lab 7.2: SSL Settings in Windows Server 2003 361

Lab 7.3: Encrypting a File System in Linux 362

Lab 7.4: Look for Errors in IPSec Performance Statistics 362

Review Questions 363

Answers to Review Questions 367

Chapter 8 Security Policies and Procedures 369

Understanding Business Continuity 371

Utilities 371

High Availability 372

Disaster Recovery 378

Reinforcing Vendor Support 390

Service-Level Agreements (SLAs) 390

Code Escrow 392

Generating Policies and Procedures 393

Human Resource Policies 393

Business Policies 397

Certificate Policies 398

Incident-Response Policies 400

Enforcing Privilege Management 401

User and Group Role Management 401

Privilege Escalation 403

Single Sign-On 403

Privilege Decision Making 404

Auditing 405

Access Control 407

Summary 408

Exam Essentials 409

3668fm.fm Page xiii Thursday, March 16, 2006 9:16 AM

xiv Contents

Hands-On Labs 411

Lab 8.1: Use Automated System Recovery in Windows

Server 2003 411

Lab 8.2: Create a Rescue Disk in Linux 411

Lab 8.3: Create a Backup with SuSE Linux 411

Review Questions 413

Answers to Review Questions 417

Chapter 9 Security Management 419

Understanding Computer Forensics 420

Methodology of a Forensic Investigation 421

Enforcing the Chain of Custody 423

Preserving Evidence 424

Collecting Evidence 425

Understanding Security Management 426

Drafting Best Practices and Documentation 426

Understanding Security Awareness and Education 433

Using Communication and Awareness 433

Providing Education 433

Staying on Top of Security 436

Websites 437

Trade Publications 438

Regulating Privacy and Security 440

Health Insurance Portability and Accountability Act 440

Gramm-Leach-Bliley Act of 1999 440

Computer Fraud and Abuse Act 441

Family Educational Rights and Privacy Act 441

Computer Security Act of 1987 442

Cyberspace Electronic Security Act 442

Cyber Security Enhancement Act 442

Patriot Act 442

Familiarizing Yourself with International Efforts 443

Summary 444

Exam Essentials 445

Hands-On Labs 447

Lab 9.1: Configure Windows Automatic Updates 447

Lab 9.2: Configure Linux Automatic Updates 447

Review Questions 448

Answers to Review Questions 452

Glossary 455

Index 495

3668fm.fm Page xiv Thursday, March 16, 2006 9:16 AM

Introduction

If you’re preparing to take the Security+ exam, you’ll undoubtedly want to find as much infor￾mation as you can concerning computer and physical security. The more information you have

at your disposal and the more hands-on experience you gain, the better off you’ll be when

attempting the exam. This study guide was written with that in mind. We have attempted to

dispense as much information as we can about computer security. The key was to provide

enough information that you’ll be prepared for the test but not so much that you’ll be over￾loaded with information outside the scope of the exam.

This book presents the material at an intermediate technical level. Experience with and

understanding of security concepts, operating systems, and applications systems will help you

get a full understanding of the challenges facing you as a security professional.

We’ve included review questions at the end of each chapter to give you a taste of what it’s

like to take the exam. If you’re already working in the security field, we recommend that you

check out these questions first to gauge your level of expertise. You can then use the book

mainly to fill in the gaps in your current knowledge. This study guide will help you round out

your knowledge base before tackling the exam.

If you can answer 80 percent or more of the review questions correctly for a given chapter,

you can probably feel safe moving on to the next chapter. If you’re unable to answer that many

correctly, reread the chapter and try the questions again. Your score should improve.

Don’t just study the questions and answers! The questions on the actual

exam will be different from the practice questions included in this book and

on the CD. The exam is designed to test your knowledge of a concept or objec￾tive, so use this book to learn the objective behind the question.

Before You Begin

Before you begin studying for the exam, it’s imperative that you understand a few things

about the Security+ certification. Security+ is a certification-for-life from CompTIA granted

to those who obtain a passing score on a single entry-level exam. In addition to being a

stand-alone certification that can be added to your resume, Security+ can also be used as an

elective in Microsoft’s MCSA and MCSE tracks, and it counts as credit toward the security

specializations Microsoft offers.

When you’re studying for any exam, the first step in preparation should always be to find

out as much as possible about the test; the more you know up front, the better you can plan

your study. The current exam number, and the one this book is written to, is SY0-101; it con￾sists of 100 questions. You have 90 minutes to take the exam, and the passing score is 764 on

a scale from 100 to 900. Both Pearson VUE and Thompson Prometric testing centers admin￾ister the exam throughout the United States and several other countries.

3668book.fm Page xv Wednesday, March 15, 2006 10:57 PM

Tải ngay đi em, còn do dự, trời tối mất!