• Complain

Ahmed F. Sheikh - CompTIA Security+ Certification Study Guide: Network Security Essentials

Here you can read online Ahmed F. Sheikh - CompTIA Security+ Certification Study Guide: Network Security Essentials full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ahmed F. Sheikh CompTIA Security+ Certification Study Guide: Network Security Essentials
  • Book:
    CompTIA Security+ Certification Study Guide: Network Security Essentials
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2020
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

CompTIA Security+ Certification Study Guide: Network Security Essentials: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "CompTIA Security+ Certification Study Guide: Network Security Essentials" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Intermediate user level

Ahmed F. Sheikh: author's other books


Who wrote CompTIA Security+ Certification Study Guide: Network Security Essentials? Find out the surname, the name of the author of the book and a list of all author's works by series.

CompTIA Security+ Certification Study Guide: Network Security Essentials — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "CompTIA Security+ Certification Study Guide: Network Security Essentials" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Ahmed F Sheikh CompTIA Security Certification Study Guide Network Security - photo 1
Ahmed F. Sheikh
CompTIA Security+ Certification Study Guide
Network Security Essentials
1st ed.
Ahmed F Sheikh Miami FL USA Any source code or other supplementary material - photo 2
Ahmed F. Sheikh
Miami, FL, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/9781484262337 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-6233-7 e-ISBN 978-1-4842-6234-4
https://doi.org/10.1007/978-1-4842-6234-4
Ahmed F. Sheikh 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 1 New York Plaza, New York, NY 10004. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

This book is affectionately dedicated to all IT experts, professionals, and students.

Table of Contents
About the Author
Ahmed F. Sheikh

is a Fulbright alumnus and has earned a masters degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.

About the Technical Reviewer
Asad Ali
is associated with High Speed Networks Lab National Chiao Tung University - photo 3

is associated with High Speed Networks Lab, National Chiao Tung University, Taiwan, since March 2018, where he is working on a research project funded by the Ministry of Science and Technology, Taiwan. In this project, he is designing a secure and federated authentication mechanism for multiple computing paradigms in collaboration with multiple partners in Bangladesh, Turkey, and the United States. He is also working on the cost minimization of bidirectional off-loading in federated computing paradigms. In the past, he has worked with the Network Benchmarking Lab (NBL), Taiwan, where he designed various security tests for IP cameras. He has various publications in the domains of Computer Networks, Cognitive Radio Networks, PCB Routing, Optimization, Internet of Things, and Network Security.

Ahmed F. Sheikh 2020
A. F. Sheikh CompTIA Security+ Certification Study Guide https://doi.org/10.1007/978-1-4842-6234-4_1
1. General Security Concepts and Trends
Ahmed F. Sheikh
(1)
Miami, FL, USA

In this chapter, we will review the goals of an information security program, and you will be introduced to the information security model, a three-dimensional model, which will be the foundation for learning the concepts of confidentiality, integrity, and availability.

By the end of this chapter, you will be able to
  1. Identify the concepts of confidentiality, integrity and availability.

  2. Perform packet-level analysis.

Information Security Model

In 1991, John McCumber created a model framework for establishing and evaluating information security (information assurance) programs, in what is now known as The McCumber Cube . This security model is depicted as a three-dimensional cube-like grid composed of information security properties or desired goals, information states, and safeguards.

  1. Desired Goals : The first dimension of the information security model is made up of the three information security properties. The three desired goals include confidentiality, integrity, and availability. Use the acronym CIA to help remember these three principles.
    • Confidentiality prevents the disclosure of information for unauthorized people, resources, and processes.

    • Integrity ensures that system information or processes have not been modified.

    • Availability ensures that information is accessible by authorized users when it is needed.

Chris Perrin, IT Security Consultant, provides insight on the importance of being familiar with the industry standard term, CIA.
  1. Information States : Data can be stored on a hard drive and can also be transmitted across a network or the Internet. Data can also be processed through manipulation by software. The second dimension of the information security model consists of processing, storage, and transmission.

  2. Safeguards : Technology is usually what most information technology (IT) professionals think of when contemplating solutions to the information security puzzle. Policies and procedures provide the foundation for an organization. How would you know how to configure your firewall, a technology-based solution, without the proper policies and procedures to guide you? Educating employees through security awareness training program is an absolute must so that the security measures implemented within an organization are effective.

Everything that you learn about information security can be related back to one of the cells of this three-dimensional model.

Operational Model of Computer Security

The operational model of computer security is composed of different technologies. Protection is the sum of prevention (like firewalls or encryption) plus measures that are used for detection (like an intrusion detection system, audit logs, or honeypot) and response (backup incident response or computer forensics).

Protection = Prevention + (Detection + Response)

Prevention: Access controls, firewalls, and encryption

Detection:

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «CompTIA Security+ Certification Study Guide: Network Security Essentials»

Look at similar books to CompTIA Security+ Certification Study Guide: Network Security Essentials. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «CompTIA Security+ Certification Study Guide: Network Security Essentials»

Discussion, reviews of the book CompTIA Security+ Certification Study Guide: Network Security Essentials and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.