Intro infosec version 2
date post
15-Apr-2017Category
Technology
view
180download
1
Embed Size (px)
Transcript of Intro infosec version 2
1
INFORMATION SECURITY
BASICS:
FUNDAMENTAL READING FOR INFOSEC
INCLUDING THE CISSP, CISM, CCNA-
SECURITY CERTIFICATION EXAMS
RON MCFARLAND, PH.D.
http://www.wrinkledbrain.net
Copyright 2014-2017 by Ron McFarland Ph.D.
http://www.wrinkledbrain.net/
2
WHY I WROTE THIS BOOK
I wrote this book because many of my readers and
students have requested preliminary information about
information security as it pertains to the CISSP
(Certified Information Systems Security Professional),
the CISM (Certified Information Security Manager), the
CCNA-Security (Cisco Certified Networking Associate
Security), or other information security exams. Other
readers and learners who were either new or not as
familiar with the information security world have asked
for a fairly easy read that covers many of the
information security aspects that an information
technologist or an information systems.
This book is written in a broad-brush manner. That is, it
is my intention to introduce many of the topics covered
in either the CISSP, CISM or CCNA-Security realms. For
some readers, you might be planning on taking one of
these certification exams. And again, for others, you
wanted to find a quick read on many security topics so
that you are more familiar with the overall field. If this
describes you, this eBook is for you.
3
As a further note, while this eBook does cover many
(not all) of the CISSP, CISM and CCNA-Security aspects
and also discusses many Information Security (InfoSec)
topics in general, more detailed books on this subject
are available (with an appropriate heavier cost).
However, in the next several months, I plan on
publishing additional InfoSec, Networking, and Ethical
Hacking eBooks that can supplement your studies.
4
WHY YOU SHOULD READ THIS BOOK
This book will help you understand many of the
preliminary topics involved in the very rich and ever-
changing world of Information Security (InfoSec). I
wrote this eBook to assist you, the reader, in
understanding Information Security from the ground
up. The topics in this eBook cover many of the topics
found in as it pertains to the CISSP (Certified
Information Systems Security Professional), the CISM
(Certified Information Security Manager), the CCNA-
Security (Cisco Certified Networking Associate
Security), and other information security exams.
If you are new to the information security world or wish
to brush up on many of the topics in the InfoSec world,
this easy-to-read eBook is for you. It was my intention
to make this an easy read and enjoyable read as we
discuss many information security topics as you,
perhaps, prepare for an interview or prepare to take on
more extensive studying required of many of the
security-related certifications.
5
6
TABLE OF CONTENTS Why I Wrote This Book ............................................................................ 2
Why You Should Read This Book ......................................................... 4
Table of Contents ........................................................................................ 6
Introduction .................................................................................................. 7
Chapter 1. Introduction to Encryption .............................................. 9
Chapter 2. Introduction to Symmetric Key Algorithms .......... 40
Chapter 3. Malware ................................................................................. 53
Chapter 4. Firewalls ................................................................................ 73
Chapter 5. Denial of Service Attacks................................................ 86
Chapter 6. Cryptographic Tools...................................................... 103
Chapter 7. Wireless Security ............................................................ 116
Chapter 8. Operating System Security ......................................... 151
Chapter 9. Database Security ........................................................... 166
Chapter 10. Computer Auditing ..................................................... 183
Summary .................................................................................................. 199
References ............................................................................................... 201
About The Author ................................................................................. 211
Other Books By Ron McFarland ..................................................... 213
7
INTRODUCTION
Information Security is a hot topic and, for the
professional information technologist, is an important
set of skills to be proficient in. Further and more
importantly, since we are in this ever-expanding and
ever growing field of information technology and
information systems, having a certification or two in the
information security area can be a boost to our career.
On a very recent Internet search from a reputable
source (Global Knowledge:
http://www.globalknowledge.com/training/generic.as
p?pageid=3430 ), the CISSP (Certified Information
Systems Security Professional) offered by ISC2 was as
the second top-paying industry certification (followed
by the Project Management Professional PMP), which
further emphasizes the importance of the information
security field in the technology industry. Likewise, other
security-related certifications are as important in other
aspects of the information technology and information
security fields.
http://www.globalknowledge.com/training/generic.asp?pageid=3430http://www.globalknowledge.com/training/generic.asp?pageid=3430
8
This eBook starts out with a discussion of encryption
and a discussion on various malware, as one focus of
our discussion on securing systems. Also, well discuss
various types of system attacks as well as several
methods to prevent these. Further, well discuss a few
relevant hardware and software-related items like
firewalls, Intrusion Detection Systems (IDS), Intrusion
Protection Systems (IPS), honeypots, and methods of
control for our systems. Further, well discuss database
and programming related security topics like SQL-
injection and good programming practice. Also, well
discuss the relevance of auditing and secure
configuration as it pertains to information systems in
general with a security focus in mind.
And, as a reminder, if any or all of these topics are not
familiar, or if you feel a bit rusty with several (or all) of
these concepts, again, this eBook is for you. Well take a
measured approach to these topics (and a few more) as
we go through our discussion on information security.
Hang on for an interesting ride!
9
CHAPTER 1. INTRODUCTION TO
ENCRYPTION
I know that talking about encryption isnt a sexy topic.
Try talking about encryption at your next social event
and count the number of people who roll their eyes or
who immediately change the topic! However, if youre
reading this eBook, Im going to assume that youre one
of three types of people youre a geek (like me), youre
a wanna-be-geek (as I once was), or a student/learner
interested in information security (I suppose I fit this
category earlier on as well). Well start our discussion
about encryption since it is the basis of much of the
work done in information security.
In general, encryption (of a few flavors) of digitally
stored (also known as static data) and transmitted data
(also known as data in motion) has been important
since computers and networks were first used. Recently
the subject of information security and encryption has
become a topic of high public interest following the
release of documents by Edward Snowden which
10
detailed the various eaves-dropping programs by the
NSA (National Security Agency) and other intelligence
agencies that have been collecting organizational and
personal data for a number of years (NSA can be found
at: http://www.nsa.gov/).
First, lets generally discuss what encryption is and why
we do encryption. Many already know, either very
generally or more specifically, what encryption is, but
lets go through the specifics so as not to leave any stone
unturned. Next, lets talk about what a message is, in
terms of information systems or information
technology. This leads into a discussion about what a
key is, especially when we want to encrypt a message.
As a result of encryption, well derive a cipher, which is
essentially a scrambled message. After we get some of
these basic concepts handled, lets talk about both
symmetric key encryption and later about asymmetric
encryption so that we can get these important terms
understood. Well discuss the application of both
symmetric and asymmetric encryption throughout this
book, so lets get started with the details.
http://www.nsa.gov/
1