Expert answer:you should do the assignment from the book i attached for you and it very important so please do it carefully :))))))))))))))))))))))))))))))))))))))))
cs_4451_assignment_1_4_questions.doc
cs_4451_assignment_5_7_questions.doc
4451___guide_to_network_security___fundamentals.pdf
Unformatted Attachment Preview
CS 4451 Assignment Questions (Assignments 1-4)
Requirements: Student answers must be the work of the individual student without any
assistance. These questions will require the student to apply the text concepts to a handson or practical application of the concepts. The answers will be graded on technical
accuracy and completeness and not on grammar or format errors.
The answers can be hand written or put into any text document format and submitted to
me either by email or in person by due date.
Assignment 1 (Chapters 1 and 2 topics)
1. Describe your home network and discuss the types of attacks you could be subject too
and how to defend against them.
2. Describe types of social engineering attacks your home network and data could be
subject too and how you can defend against the attacks.
Assignment 2 (Chapters 3 and 4 topics)
1. Describe all the possible server-side and client-side attacks that may occur when you
are using the Internet at your home and how each can be avoided or mitigated.
2. List all the actions on each type device in your network you can take to secure it and in
your network design. Include in your answer what additional devices or software would
you use to secure you network if cost was not a factor.
Assignment 3 (Chapters 5 and 6 topics)
1. Describe in detail all the elements and steps that occur to encrypt your email when you
connect on your PC to send email to mail.troy.edu. Your answer should include the type
and methods of encryption in each step and the components and protocols involved.
2. Describe in detail all the elements and steps needed for you to accomplish the
following actions. Your answer should include the type and methods of encryption in
each step and the components and protocols involved:
a. You will send an email to me that is digitally signed email.
b. You will send an encrypted email to me.
3. Describe in detail all the components and steps you would take to request and receive a
digital certificate on your PC.
Assignment 4 (Chapters 7 topics and Mid Term exam)
1. You have been hired to consult and install a new network for a local private church.
The church has 2 floors and the church’s building length is 150 meters. The church will
host its own web site and email server by you also. The church wants Internet access and
currently has 20 computers. The church plans to open a private grade school in the future
and wants wireless capability also.
Submit based on your knowledge learned in class to date, the proposed network designs
and all security devices and configurations you will recommend for this church. Assume
for now cost is not a factor in your recommendations.
CS 4451 Assignment Questions (Assignments 5, 6, and 7)
Requirements: Student answers must be the work of the individual student without any
assistance. These questions will require the student to apply the text concepts to a handson or practical application of the concepts. The answers will be graded on technical
accuracy and completeness and not on grammar or format errors.
The answers can be hand written or put into any text document format and submitted to
me either by email or in person by due date.
Assignment 5 (Chapters 8 and 9 topics)
1. You have been hired to configure a church’s network security and its member’s
computers in the homes that access the church’s network. The church has both a wired
LAN (with Cisco routers, switches, and firewalls) and wireless LAN network. The
church has its own web, email, FTP, and DNS servers managed by you and Windows
Active Directory Domain servers for authentication. The wireless network has 3 wireless
access points. Describe in detail all the protocols and configurations/equipment you will
need to accomplish the following:
a. You must secure file transfers, email transport, and remote administration of network
equipment to the church’s servers.
b. All configurations and actions you should put in place to highly secure the church’s
entire network, data transfers, applications, and equipment.
Assignment 6 (Chapters 10, 11, and 12 topics)
1. Describe your mobile devices and the different security risks associated with them and
ways to secure them.
2. Describe the fur access control models and how each is implemented in your home
network and devices. If a model is not used now, explain how that model could be
implemented.
3. Describe the different types of authentication credentials and how they are
implemented in your network and devices.
Assignment 7 (Chapters 13, 14, and 15 topics)
1. Describe what procedures you can do to insure redundancy and fault tolerance in your
home network and devices.
2. Describe steps you take to implement forensic procedures.
3. Describe ways to control risk in your home network and devices
4. Describe differences in conducting vulnerability and penetration tests in your home
network.
CompTIA Security+ SY0-401 Examination Objectives
Objectives
Chapters
1.0: Network Security
1.1 Implement security configuration parameters on network devices and other technologies
7
1.2 Given a scenario, use secure network administration principles
7, 8, 11, 15
1.3 Explain network design elements and components
7, 8
1.4 Given a scenario, implement common protocols and services
6, 7, 8, 15
1.5 Given a scenario, troubleshoot security issues related to wireless networking
9
2.0: Compliance and Operational Security
2.1 Explain the importance of risk related concepts
1, 8, 11, 13, 14
2.2 Summarize the security implications of integrating systems and data with third parties
15
2.3 Given a scenario, implement appropriate risk mitigation strategies
4, 14
2.4 Given a scenario, implement basic forensic procedures
13
2.5 Summarize common incident response procedures
13
2.6 Explain the importance of security related awareness and training
14
2.7 Compare and contrast physical security and environmental controls
4, 12, 13
2.8 Summarize risk management best practices
13
2.9 Given a scenario, select the appropriate control to meet the goals of security
4, 15
3.0: Threats and Vulnerabilities
3.1 Explain types of malware
2
3.2 Summarize various types of attacks
1, 2, 3, 12, 15
3.3 Summarize social engineering attacks and the associated effectiveness with each attack
2
3.4 Explain types of wireless attacks
9
3.5 Explain types of application attacks
3, 11
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
4, 7, 8, 15
3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
15
3.8 Explain the proper use of penetration testing versus vulnerability scanning
15
4.0: Application, Data and Host Security
4.1 Explain the importance of application security controls and techniques
4
4.2 Summarize mobile security concepts and technologies
10, 12, 13, 14
4.3 Given a scenario, select the appropriate solution to establish host security
4, 7, 8
4.4 Implement the appropriate controls to ensure data security
4, 5, 8, 11, 14
4.5 Compare and contrast alternative methods to mitigate security risks in static environments
4
5.0: Access Control and Identity Management
5.1 Compare and contrast the function and purpose of authentication services
11
5.2 Given a scenario, select the appropriate authentication, authorization or access control
9, 11, 12
5.3 Install and configure security controls when performing account management, based on best practices
11, 12
6.0: Cryptography
6.1 Given a scenario, utilize general cryptography concepts
5, 6
6.2 Given a scenario, use appropriate cryptographic methods
5, 6, 9
6.3 Given a scenario, use appropriate PKI, certificate management and associated components
6
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This book is intended to be sold with access codes. If this book does not contain access codes, you are
not getting the full value of your purchase.
If the access codes in this book are missing or if the package containing them has been opened, this
book is not returnable.
By opening and breaking the seal of this package, you are agreeing to be bound by the following
agreement:
The software included with this product may be copyrighted, in which case all rights are reserved
by the respective copyright holder. You are licensed to use software copyrighted by the Publisher
and its licenser on a single computer. You may copy and/or modify the software as needed to
facilitate your use of it in a single computer. Making copies of the software for any other purpose
is a violation of the United Sates copyright laws.
This software is sold as is without warranty of any kind, either expressed or implied, including
but not limited to the implied warranties of merchantability and fitness for a particular purpose.
Neither the publisher nor its dealers or distributors assume any liability for any alleged or actual
damages arising from the use of this program. (Some states do not allow for the excusing of
implied warranties, so the exclusion may not apply to you.)
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA® Security+
Guide to Network
Security Fundamentals
Fifth Edition
Mark Ciampa, Ph.D.
Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA® Security+ Guide to Network
Security Fundamentals, Fifth Edition
Mark Ciampa, Ph.D.
Senior Vice President, GM Skills & Global
Product Management: Dawn Gerrain
Product Director: Kathleen McMahon
Product Manager: Nick Lombardi
Senior Director, Development:
Marah Bellegarde
Product Development Manager:
Leigh Hefferon
Managing Content Developer:
Emma Newsom
© 2015, 2012, Cengage Learning
WCN: 02-200-203
ALL RIGHTS RESERVED. No part of this work covered by the copyright
herein may be reproduced, transmitted, stored or used in any form or by
any means graphic, electronic, or mechanical, including but not limited to
photocopying, recording, scanning, digitizing, taping, Web distribution,
information networks, or information storage and retrieval systems, except
as permitted under Section 107 or 108 of the 1976 United States Copyright
Act, without the prior written permission of the publisher.
The CompTIA Marks are the proprietary trademarks and/or service marks of
CompTIA Properties, LLC used under license from CompTIA Certifications,
LLC through participation in the CompTIA Authorized Partner Program. More
information about the program can be found at: http://www.comptia.org
/certifications/capp/login.aspx
Senior Content Developer:
Michelle Ruelos Cannistraci
For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706
Developmental Editor: Deb Kaufmann
For permission to use material from this text or product,
Product Assistant: Scott Finger
submit all requests online at cengage.com/permissions
Marketing Manager: Eric LaScola
Further permissions questions can be emailed to
Senior Director, Production:
Wendy A. Troeger
Production Director: Patty Stephan
Senior Content Project Manager:
Kara A. DiCaterino
Art Director: GEX
Cover and Interior Design Images:
©Sergey Nivens/Shutterstock.com
permissionrequest@cengage.com
Library of Congress Control Number: 2014940611
Book Only ISBN: 978-1-305-09394-2
Package ISBN: 978-1-305-09391-1
Cengage Learning
20 Channel Center Street
Boston, MA 02210
USA
Cengage Learning is a leading provider of customized learning solutions
with office locations around the globe, including Singapore, the United
Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at:
www.cengage.com/global
Cengage Learning products are represented in Canada by
Nelson Education, Ltd.
To learn more about Cengage Learning, visit
www.cengage.com
Purchase any of our products at your local college store or at our preferred
online store www.cengagebrain.com
Notice to the Reader
Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis
in connection with any of the product information contained herein. Publisher does not assume, and expressly
disclaims, any obligation to obtain and include information other than that provided to it by the manufacturer.
The reader is expressly warned to consider and adopt all safety precautions that might be indicated by the activities
described herein and to avoid all potential hazards. By following the instructions contained herein, the reader
willingly assumes all risks in connection with such instructions. The publisher makes no representations or
warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher
takes no responsibility with respect to such material. The publisher shall not be liable for any special, consequential,
or exemplary damages resulting, in whole or part, from the readers’ use of, or reliance upon, this material.
Printed in the United States of America
Print Number: 01 Print Year: 2014
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Brief Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
CHAPTER 1
Introduction to Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
PART I
Threats
47
CHAPTER 2
Malware and Social Engineering Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
CHAPTER 3
Application and Networking-Based Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
PART II
Application, Data, and Host Security
135
CHAPTER 4
Host, Application, and Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
PART III
Cryptography
181
CHAPTER 5
Basic Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
CHAPTER 6
Advanced Cryptography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
PART IV
Network Security
267
CHAPTER 7
Network Security Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
CHAPTER 8
Administering a Secure Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
PART V
Mobile Security
357
CHAPTER 9
Wireless Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
CHAPTER 10
Mobile Device Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
iii
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
iv
Brief Contents
PART VI
Access Control and Identity Management
439
CHAPTER 11
Access Control Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
CHAPTER 12
Authentication and Account Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
PART VII
Compliance and Operational Security
521
CHAPTER 13
Business Continuity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
CHAPTER 14
Risk Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
CHAPTER 15
Vulnerability Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
APPENDIX A
CompTIA SY0-401 Certification Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
APPENDIX B
Downloads and Tools for Hands-On Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
APPENDIX C
Security Websites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
APPENDIX D
Selected TCP/IP Ports and Their Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
APPENDIX E
Information Security Community Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . …
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more