Professional Documents
Culture Documents
Trademarks
All terms mentioned in this book that are known to be trademarks or service
marks have been appropriately capitalized. Pearson cannot attest to the accuracy
of this information. Use of a term in this book should not be regarded as affecting
the validity of any trademark or service mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs; and
content particular to your business, training goals, marketing focus, or branding
interests), please contact our corporate sales department at
corpsales@pearsoned.com or (800) 382-3419.
Editor-in-Chief
Mark Taub
Executive Editor
James Manly
Development Editor
Christopher Cleveland
Managing Editor
Sandra Schroeder
Project Editor
Mandie Frank
Indexer
Ken Johnson
Proofreader
Donna Mulder
Technical Editor
Lewis Heuermann
Publishing Coordinator
Cindy Teeters
Designer
Chuti Prasertsith
Compositor
codeMantra
Pearson’s Commitment to Diversity,
Equity, and Inclusion
Pearson is dedicated to creating bias-free content that reflects the
diversity of all learners. We embrace the many dimensions of
diversity, including but not limited to race, ethnicity, gender,
socioeconomic status, ability, age, sexual orientation, and religious
or political beliefs.
Education is a powerful force for equity and change in our world. It
has the potential to deliver opportunities that improve lives and
enable economic mobility. As we work with authors to create content
for every product and service, we acknowledge our responsibility to
demonstrate inclusivity and incorporate diverse scholarship so that
everyone can achieve their potential through learning. As the world’s
leading learning company, we have a duty to help drive change and
live up to our purpose to help more people create a better life for
themselves and to create a better world.
Our ambition is to purposefully contribute to a world where:
Cover: JLStock/Shutterstock
Contents at a Glance
Introduction
13 Cyber Detective
14 Introduction to Forensics
15 Cybersecurity Engineering
Glossary
Appendix A: Resources
Appendix B: Answers to the Multiple Choice Questions
Index
Table of Contents
Introduction
Ping
Tracert
Netstat
NSLookup
ARP
Route
PathPing
Chapter 5: Malware
Introduction
Viruses
How a Virus Spreads
Types of Viruses
Virus Examples
The Impact of Viruses
Machine Learning and Malware
Rules for Avoiding Viruses
Trojan Horses
The Buffer-Overflow Attack
The Sasser Virus/Buffer Overflow
Spyware
Legal Uses of Spyware
How Is Spyware Delivered to a Target
System?
Pegasus
Obtaining Spyware Software
Other Forms of Malware
Rootkits
Malicious Web-Based Code
Logic Bombs
Spam
Advanced Persistent Threats
Deep Fakes
Detecting and Eliminating Viruses and Spyware
Antivirus Software
Anti-Malware and Machine Learning
Remediation Steps
Summary
Chapter 6: Techniques Used by Hackers
Introduction
Basic Terminology
The Reconnaissance Phase
Passive Scanning Techniques
Active Scanning Techniques
Actual Attacks
SQL Script Injection
Cross-Site Scripting
Cross-Site Request Forgery
Directory Traversal
Cookie Poisoning
URL Hijacking
Command Injection
Wireless Attacks
Cell Phone Attacks
Password Cracking
Malware Creation
Windows Hacking Techniques
Penetration Testing
NIST 800-115
The NSA Information Assessment
Methodology
PCI Penetration Testing Standard
The Dark Web
Summary
Chapter 7: Industrial Espionage in Cyberspace
Introduction
What Is Industrial Espionage?
Information as an Asset
Real-World Examples of Industrial Espionage
Example 1: Hacker Group
Example 2: Company Versus Company
Example 3: Nuclear Secrets
Example 4: Uber
Example 5: Foreign Governments and
Economic Espionage
Trends in Industrial Espionage
Industrial Espionage and You
How Does Espionage Occur?
Low-Tech Industrial Espionage
Spyware Used in Industrial Espionage
Steganography Used in Industrial
Espionage
Phone Taps and Bugs
Spy for Hire
Protecting Against Industrial Espionage
Trade Secrets
The Industrial Espionage Act
Spear Phishing
Summary
Chapter 8: Encryption
Introduction
Cryptography Basics
History of Encryption
The Caesar Cipher
Atbash
Multi-Alphabet Substitution
Rail Fence
Scytale
Polybius Cipher
Enigma
Binary Operations
Modern Cryptography Methods
Single-Key (Symmetric) Encryption
Modification of Symmetric Methods
Public Key (Asymmetric) Encryption
PGP
Legitimate Versus Fraudulent Encryption Methods
Digital Signatures
Hashing
MD5
SHA
RIPEMD
MAC and HMAC
Rainbow Tables
Steganography
Historical Steganography
Steganography Methods and Tools
Cryptanalysis
Frequency Analysis
Modern Cryptanalysis Methods
Cryptography Used on the Internet
Quantum Computing Cryptography
Summary
1856.—Democratic Platform,
1856.—Whig Platform.
Baltimore, May 9.
Whereas, Experience has demonstrated that platforms adopted by
the partisan conventions of the country have had the effect to
mislead and deceive the people, and at the same time to widen the
political divisions of the country, by the creation and encouragement
of geographical and sectional parties; therefore,
Resolved, That it is both the part of patriotism and of duty to
recognize no political principles other than The Constitution of
the Country, the Union of the States, and the Enforcement of
the Laws; and that as representatives of the Constitutional Union
men of the country, in national convention assembled, we hereby
pledge ourselves to maintain, protect, and defend, separately and
unitedly, these great principles of public liberty and national safety
against all enemies at home and abroad, believing that thereby peace
may once more be restored to the country, the rights of the people
and of the states re-established, and the government again placed in
that condition of justice, fraternity, and equality, which, under the
example and constitution of our fathers, has solemnly bound every
citizen of the United States to maintain a more perfect union,
establish justice, insure domestic tranquillity, provide for the
common defense, promote the general welfare, and secure the
blessings of liberty to ourselves and our posterity.
1860.—Republican Platform,