Professional Documents
Culture Documents
CC Certified in Cybersecurity All-in-One Exam Guide Steven Bennett full chapter instant download
CC Certified in Cybersecurity All-in-One Exam Guide Steven Bennett full chapter instant download
CC Certified in Cybersecurity All-in-One Exam Guide Steven Bennett full chapter instant download
https://ebookmass.com/product/cc-certified-in-cybersecurity-all-
in-one-exam-guide-steven-bennett/
https://ebookmass.com/product/cciso-certified-chief-information-
security-officer-all-in-one-exam-guide-steve-bennett/
https://ebookmass.com/product/aws-certified-security-specialty-
all-in-one-exam-guide-exam-scs-c01-tracy-pierce/
https://ebookmass.com/product/aws-certified-cloud-practitioner-
all-in-one-exam-guide-exam-clf-c01-daniel-carter/
AWS Certified Developer Associate All-in-One Exam Guide
(Exam DVA-C01) Kamesh Ganesan
https://ebookmass.com/product/aws-certified-developer-associate-
all-in-one-exam-guide-exam-dva-c01-kamesh-ganesan/
https://ebookmass.com/product/ceh-certified-ethical-hacker-all-
in-one-exam-guide-5th-edition-walker/
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-daniel-carter/
https://ebookmass.com/product/gpen-giac-certified-penetration-
tester-all-in-one-exam-guide-raymond-nutting/
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-3rd-edition-daniel-carter/
OceanofPDF.com
ABOUT THE AUTHORS
OceanofPDF.com
OceanofPDF.com
Copyright © 2023 by McGraw Hill. All rights reserved. Except as
permitted under the Copyright Act of 1976, no part of this publication may
be reproduced or distributed in any form or by any means, or stored in a
database or retrieval system, without the prior written permission of
publisher, with the exception that the program listings may be entered,
stored, and executed in a computer system, but they may not be reproduced
for publication.
ISBN: 978-1-26-520394-8
MHID: 1-26-520394-6
The material in this eBook also appears in the print version of this title:
ISBN: 978-1-26-520381-8, MHID: 1-26-520381-4.
All trademarks are trademarks of their respective owners. Rather than put a
trademark symbol after every occurrence of a trademarked name, we use
names in an editorial fashion only, and to the benefit of the trademark
owner, with no intention of infringement of the trademark. Where such
designations appear in this book, they have been printed with initial caps.
TERMS OF USE
This is a copyrighted work and McGraw Hill (“McGraw Hill”) and its
licensors reserve all rights in and to the work. Use of this work is subject to
these terms. Except as permitted under the Copyright Act of 1976 and the
right to store and retrieve one copy of the work, you may not decompile,
disassemble, reverse engineer, reproduce, modify, create derivative works
based upon, transmit, distribute, disseminate, sell, publish or sublicense the
work or any part of it without McGraw Hill’s prior consent. You may use
the work for your own noncommercial and personal use; any other use of
the work is strictly prohibited. Your right to use the work may be terminated
if you fail to comply with these terms.
McGraw Hill and its licensors do not warrant or guarantee that the
functions contained in the work will meet your requirements or that its
operation will be uninterrupted or error free. Neither McGraw Hill nor its
licensors shall be liable to you or anyone else for any inaccuracy, error or
omission, regardless of cause, in the work or for any damages resulting
therefrom. McGraw Hill has no responsibility for the content of any
information accessed through the work. Under no circumstances shall
McGraw Hill and/or its licensors be liable for any indirect, incidental,
special, punitive, consequential or similar damages that result from the use
of or inability to use the work, even if any of them has been advised of the
possibility of such damages. This limitation of liability shall apply to any
claim or cause whatsoever whether such claim or cause arises in contract,
tort or otherwise.
OceanofPDF.com
In memory of Scout Bennett.
OceanofPDF.com
CONTENTS AT A GLANCE
Index
OceanofPDF.com
CONTENTS
Acknowledgments
Introduction
Chapter 1 Security Principles
Security Fundamentals
The CAI Triad
Authentication
Message Authenticity and Nonrepudiation
Privacy
Information Assurance
Elements of a Typical Cyberattack
1. Conduct Research
2. Identify Targets
3. Exploit Targets
4. Do Bad Things
Elements of a Typical Security Program
Risk Management
Security Governance and Management
Security Controls
Professional Ethics
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 2 Access Controls Concepts
Access Control Fundamentals
Access Control Concepts
Access Control Practices
Identification, Authentication, Authorization, and
Accountability
Identity and Access Management
Identity and Access Management Lifecycle
Privileged Accounts
Logical Access Controls
Access Control Models
Identity Management Technologies
Monitoring Logical Access
Physical Access Control
Preventing and Controlling Physical Access
Monitoring Physical Access
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 3 Network Security
Network Fundamentals
Network Types
Wired and Wireless Networks
System Addresses
Network Devices and Terminology
Networking in Action
Protocols
Ports
OSI Model
TCP/IP
IP Addressing
Network Threats and Attacks
Conducting Research
Identifying Targets
Exploiting Targets
Doing Bad Things
Network Defenses
Firewalls
Network Security Architecture Elements
Network Access Control
E-mail and Web Application Filtering
Network Operations Elements
Wireless Security
Internet of Things Security
Security Assessments and Testing
Network Infrastructure
On-Premises Datacenter Infrastructure
Cloud Infrastructure
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 4 Security Operations
Data Security
Data Lifecycle
Cryptography
Logging and Monitoring
System Hardening
Patch Management
Configuration Baselines
Configuration Management
Best Practice Security Policies
CC-Recommended Security Policies
Security Awareness Training
Components of Security Awareness Training
Security Awareness Training Topics
Chapter Review
Quick Review
Questions
Questions and Answers
Chapter 5 Business Continuity (BC), Disaster Recovery (DR) &
Incident Response Concepts
Incident Response
Incident Response Terminology
Incident Response Governance Elements
Incident Response Process
Business Continuity Management
Business Continuity Program Purpose and Governance
Business Continuity Plan
Business Continuity Activation
Disaster Recovery
IT Facility Recovery
User Environment Recovery
Data Recovery
Chapter Review
Quick Review
Questions
Questions and Answers
Appendix About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Technical Support
Glossary
Index
OceanofPDF.com
ACKNOWLEDGMENTS
The authors wish to thank their family members for their support, without
which this book would not be possible.
We also want to recognize the hardworking and dedicated staff at the
NIST Computer Security Division, who work behind the scenes to develop
the standards, guidelines, and innovative technologies that help our nation
address current and future cybersecurity threats and challenges.
OceanofPDF.com
INTRODUCTION
After a hard winter, when the snow had lain on the ground for
a fortnight, I wanted once more to look into the matter of my
Halicti. I was in bed with pneumonia and to all appearances at
the point of death. I had little or no pain, thank God, but
extreme difficulty in living. With the little lucidity left to me,
being able to do no other sort of observing, I observed myself
dying; I watched with a certain interest the gradual falling to
pieces of my poor machinery. Were it not for the terror of
leaving my family, who were still young, I would gladly have
departed. The after-life must have so many higher and fairer
truths to teach us.
My hour had not yet come. When the little lamps of thought
began to emerge, all flickering, from the dusk of
unconsciousness, I wished to take leave of the Hymenoptera,
my fondest joy, and first of all of my neighbour, the Halictus. 3
My son Emile took the spade and went and dug the frozen
ground. Not a male was found, of course; but there were
plenty of females, numbed with the cold in their cells.
1 Souvenirs, II., pp. 202–203. The Life of the Spider, chap. i., “The Black-bellied
Tarantula.” ↑
2 Souvenirs, II., p. 1. ↑
3 The Halicti produce two generations each year: one, in the spring, is the issue
of mothers who, fecundated in the autumn, have passed through the winter; the
other, produced in the summer, is the fruit of parthenogenesis, that is, of
procreation by the maternal virtualities alone. Of the concourse of the two sexes
only females are born; parthenogenesis gives rise to both males and females. ↑
4 Souvenirs, VIII., pp. 144–160. The Bramble-Bees, chap. xiv.,
“Parthenogenesis.” It was only a later date, by combining a series of successive
observations which were spread over a great length of years, that he was able to
define exactly the various modes of generation employed by the Halicti, as
described in the preceding note. ↑
[Contents]
CHAPTER XIV
THE HERMIT OF SÉRIGNAN (1879–
1910)
Starting from Orange and crossing the Aygues, a torrent
whose muddy waters are lost in the Rhône, but whose bed is
dried by the July and August suns, leaving only a desert of
pebbles, where the Mason-bee builds her pretty turrets of
rock-work, we come presently to the Sérignaise country; an
arid, stony tract, planted with vines and olives, coloured a
rusty red, or touched here and there with almost the hue of
blood; and here and there a grove of cypress makes a
sombre blot. To the north runs a long black line of hills,
covered with box and ilex and the giant heather of the south.
Far in the distance, to the east, the immense plain is closed in
by the wall of Saint-Amant and the ridge of the Dentelle,
behind which the lofty Ventoux rears its rocky, cloven bosom
abruptly to the clouds. At the end of a few miles of dusty road,
swept by the powerful breath of the mistral, we suddenly
reach a little village. It is a curious little community, with its
central street adorned by a double row of plane-trees, its
leaping fountains, and its almost Italian air. The houses are
lime-washed, with flat roofs; and sometimes, at the side of
some small or decrepit dwelling, we see the unexpected
[210]curves of a loggia. At a distance the façade of the church
has the harmonious lines of a little antique temple; close at
hand is the graceful campanile, an old octagonal tower
surmounted by a narrow mitre wrought in hammered iron, in
the midst of which are seen the black profiles of the bells.
This is what I wished for, hoc erat in votis: a bit of land, oh,
not so very large, but fenced in, to avoid the drawbacks of a
public way; an abandoned, barren, sun-scorched bit of land,
favoured [213]by thistles and by Wasps and Bees. Here,
without distant expeditions that take up my time, without tiring
rambles that strain my nerves, I could contrive my plans of
attack, lay my ambushes, and watch their effects at every
hour of the day. Hoc erat in votis. Yes, this was my wish, my
dream, always cherished, always vanishing into the mists of
the future.
Eden, I said; and, from the point of view that interests me, the
expression is not out of place. This accursed ground, which
no one would have had at a gift to sow with a pinch of turnip-
seed, is an earthly paradise for the Bees and the Wasps. Its
mighty growth of thistles and centauries draws them all to me
from everywhere around. Never, in my insect-hunting
memories, have I seen so large a population at a single spot;
all the trades have [216]made it their rallying-point. Here come
hunters of every kind of game, builders in clay, weavers of
cotton goods, collectors of pieces cut from a leaf or the petals
of a flower, architects in paste-board, plasterers mixing
mortar, carpenters boring wood, miners digging underground
galleries, workers in goldbeater’s skin, and many more.