About This eBook ePUB is an open, industry-standard format for eBooks. However, support of ePUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturer’s Web site. Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app. 1 Computer Security Fundamentals Fourth Edition Dr. Chuck Easttom 2 Computer Security Fundamentals, Fourth Edition Copyright © 2020 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. ISBN-13: 978-0-13-577477-9 ISBN-10: 0-13-577477-2 Library of Congress control number: 2019908181 ScoutAutomatedPrintCode Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The author and the 3 publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose all such documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services. The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified. Special Sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419. For government sales inquiries, please contact [email protected]. For questions about sales outside the U.S., please contact [email protected]. 4 Editor-in-Chief Mark Taub Product Line Manager Brett Bartow Senior Editor James Manly Development Editor Christopher Cleveland Managing Editor Sandra Schroeder Project Editor Mandie Frank Indexer Erika Millen Proofreader Abigail Manheim Technical Editor Akhil Behl Publishing Coordinator Cindy Teeters Designer Chuti Prasertsith Compositor codeMantra 5 Credits Figure Number Attribution/Credit Line Screenshot of Command prompt © Figure 2-1 Microsoft 2019 Screenshot of Command prompt © Figure 2-2 Microsoft 2019 Screenshot of Command prompt © Figure 2-3 Microsoft 2019 Screenshot of Command prompt © Figure 2-4 Microsoft 2019 Screenshot of Command prompt © Figure 2-5 Microsoft 2019 Screenshot of Command prompt © Figure 2-6 Microsoft 2019 Screenshot of Command prompt © Figure 2-7 Microsoft 2019 Screenshot of Command prompt © Figure 2-8 Microsoft 2019 Screenshot of Command prompt © Figure 2-9 Microsoft 2019 Screenshot of windows © Microsoft Figure 3-1 2019 Screenshot of windows © Microsoft Figure 3-2 2019 Screenshot of windows © Microsoft Figure 3-3 2019 Screenshot of windows © Microsoft Figure 3-4 2019 Screenshot of windows © Microsoft Figure 3-5 2019 Screenshot of Command prompt © Figure 4-1 Microsoft 2019 6 Figure Number Attribution/Credit Line Screenshot of LOIC © Praetox Figure 4-2 Technologies Screenshot of XOIC © Praetox Figure 4-3 Technologies Screenshot of Command prompt © Figure 5-1 Microsoft 2019 Screenshot of Counterexploitation © Figure 5-2 CEXX.ORG Screenshot of SpywareGuide © Figure 5-3 2003-2011, Actiance, Inc. Screenshot of SpywareGuide © Figure 5-4 2003-2011, Actiance, Inc. Screenshot of SpywareGuide © Figure 5-5 2003-2011, Actiance, Inc. Screenshot of Norton Security © Figure 5-6 1995 - 2019 Symantec Corporation Screenshot of McAfee AntiVirus © Figure 5-7 2019 McAfee, LLC Screenshot of Avast © 1988-2019 Figure 5-8 Copyright Avast Software s.r.o Screenshot of AVG © 1988-2019 Figure 5-9 Copyright Avast Software s.r.o Screenshot of Malwarebytes © 2019 Figure 5-10 Malwarebytes Screenshot of Windows © Microsoft Figure 5-11 2019 Screenshot of Netcraft © 1995-2019 Figure 6-1 Netcraft Ltd Screenshot of WayBackMachine Figure 6-2 BETA © Internet Archive Screenshot of Zenmap © Figure 6-3 NMAP.ORG Figure 6-4 Screenshot of Cain © Cain and Abel 7 Figure Number Attribution/Credit Line Screenshot of Shodan © 2013-2019 Figure 6-5 Shodan Screenshot of Shodan © 2013-2019 Figure 6-6 Shodan Screenshot of OphCrack © 2019 Figure 6-8 Slashdot Media Screenshot of TeraBIT Virus Maker Figure 6-9 © TeraBIT Virus Maker Screenshot of Yahoo © 2019 Verizon Figure 6-11 Media Screenshot of Peoples Drug Store © Figure 6-12 2019 Digital Pharmacist Inc. Figure 7-2 New Africa/Shutterstock Figure 7-4 Reed Kaestner/Getty Images Figure 7-5 Screenshot of VeraCrypt © IDRIX Screenshot of windows © Microsoft Figure 7-6 2019 Figure 8-2 Chuck Easttom Screenshot of Windows 10 Firewall Figure 9-1 © Microsoft 2019 Screenshot of Snort Installation © Figure 9-2 2019 Cisco Screenshot of Windows-style library Figure 9-7 © Microsoft 2019 Screenshot of Shutting Down a Figure 11-1 Service in Windows © Microsoft 2019 Screenshot of Disabled services © Figure 11-2 Microsoft 2019 Screenshot of Microsoft Baseline Figure 11-4 Security Analyzer © Microsoft 2019 Screenshot of Microsoft Baseline Figure 11-5 Security Analyzer © Microsoft 2019 8 Figure Number Attribution/Credit Line Screenshot of Microsoft Baseline Figure 11-6 Security Analyzer © Microsoft 2019 Screenshot of Nessus © 2019 Figure 11-7 Tenable Screenshot of Nessus © 2019 Figure 11-8 Tenable Screenshot of Nessus © 2019 Figure 11-9 Tenable Screenshot of Nessus © 2019 Figure 11-10 Tenable Screenshot of Nessus © 2019 Figure 11-11 Tenable Screenshot of OWASP ZAP © Figure 11-12 OWASP Screenshot of OWASP ZAP © Figure 11-13 OWASP Screenshot of shodan © 2013-2019 Figure 11-14 Shodan® Screenshot of shodan © 2013-2019 Figure 11-15 Shodan® Figure 12-1 Dan Grytsku/123RF Figure 12-2 Screenshot of Sinn Fein © Sinn Féin Screenshot of BBC News © 2019 Figure 12-3 BBC Screenshot of Cyberterrorism Figure 12-4 Preparedness Act Screenshot of Cyberterrorism Figure 12-5 Preparedness Act Figure 12-6 Screenshot of Tech Law Journal Screenshot of The Peoples drug Figure 12-7 store Figure 12-8 Screenshot of ccPal Store 9