10 Chapter 3 Controlling Access to Your Assets Controlling Physical Access Controlling Network Access Controlling Software Sources Summary Back to the Basics Review Questions
11 Chapter 4 Controlling Network Connections Understanding Network Architecture Auditing Networks Securing Networks Summary Back to the Basics Review Questions
12 Chapter 5 Encrypting Your Data at Rest What Is Encryption? Encryption Usage Patterns Encryption Technologies Summary Back to the Basics Review Questions
13 Chapter 6 Encrypting Your Moving Data Website Encryption Email Encryption Working with VPN Connections and Software Repositories Summary Back to the Basics Review Questions
14 Chapter 7 Risk Assessment Conducting Open Source Intelligence Gathering Accessing Public Vulnerability Databases Conducting Vulnerability Scans Conducting Penetration Tests Summary Back to the Basics Review Questions
15 Chapter 8 Configuring System Backups and Monitoring Why You Need to Get Backups Right the First Time Backup Types Multitier Backups Configuring Monitoring and Alerts Summary Back to the Basics Review Questions
16 Chapter 9 Resource Isolation Design Patterns Configuring Network Firewalling Working with Sandbox Environments Controlling Local System Access Summary Back to the Basics Review Questions
17 Appendix Answers to Review Questions Chapter 1: Using Digital Resources Responsibly Chapter 2: What are Vulnerabilities and Threats? Chapter 3: Controlling Access to Your Assets Chapter 4: Controlling Network Connections Chapter 5: Encrypting Your Data at Rest Chapter 6: Encrypting Your Moving Data Chapter 7: Risk Assessment Chapter 8: Configuring System Backups and Monitoring Chapter 9: Resource Isolation Design Patterns
18 Index
List of Illustrations
1 Chapter 3 Figure 3.1 The stages involved in booting a (Linux) computer using UEFIFigure 3.2 A typical account entry within a password managerFigure 3.3 The results of an email search of the HIBP databaseFigure 3.4 The results of a search of the HIBP database for a password stringFigure 3.5 Permission levels assigned to users and a user groupFigure 3.6 A simplified illustration of the contents of a TCP data packet including metadat...Figure 3.7 A typical network setup where a firewall device stands between the internet and ...Figure 3.8 An AWS EC2 security group permitting SSH and browser (HTTP) traffic into the res...
2 Chapter 4 Figure 4.1 A typical example of IP address allocations within a private subnetFigure 4.2 A NAT server translating IP addresses and managing