Buy Microsoft Windows Security Essentials at Bookstore UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Operating systems > Microsoft (Windows) operating systems > Microsoft Windows Security Essentials
Microsoft Windows Security Essentials

Microsoft Windows Security Essentials


     4.5  |  6 Reviews 
5
4
3
2
1



International Edition


X
About the Book

Windows security concepts and technologies for IT beginners

IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.

  • Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skills
  • Offers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and more
  • Reviews all the topics you need to know for taking the MTA 98-367 exam
  • Provides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers

If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading.



Table of Contents:

Introduction xix

Chapter 1 Understanding Core Security Principles 1

Understanding Risk 1

Exploring the Security Triad 4

Protecting Against Loss of Confidentiality 5

Protecting Against Loss of Availability 5

Protecting Against Loss of Integrity 6

Implementing a Defense-in-Depth Security Strategy 7

Enforcing the Principle of Least Privilege 9

Hardening a Server 10

Reducing the Attack Surface 11

Keeping a System Updated 14

Enabling the Firewall 16

Installing Antivirus Software 16

The Essentials and Beyond 16

Chapter 2 Understanding Malware and Social Engineering 19

Comparing Malware 19

Viruses 21

Worms 22

Trojan Horses 23

Buffer-Overflow Attacks 25

Spyware 26

Understanding the Threat 27

Protecting Against Malware 28

Using Antivirus Software 29

Using Microsoft Security Essentials on Desktops 31

Thwarting Social-Engineering Attacks 34

Social Engineering in Person 34

Social Engineering with a Phone Call 34

Recognizing Phishing Attempts 35

Recognizing Pharming 38

Protecting Email 39

The Essentials and Beyond 41

Chapter 3 Understanding User Authentication 43

Comparing the Three Factors of Authentication 44

Using Passwords for Authentication 45

Comparing Password Attack Methods 45

Creating Strong Passwords 47

Enforcing Strong Passwords 49

Exploring Account Lockout Policies 51

Unlocking an Account 53

Resetting a Password 55

Changing a Password 57

Creating a Password-Reset Disk 58

Using Smart Cards and Token Devices for Authentication 59

Using Biometrics for Authentication 60

Starting Applications with Run As Administrator 61

Preventing Time Skew with Kerberos 63

Identifying RADIUS Capabilities 64

Identifying Unsecure Authentication Protocols 65

LM 66

NTLM (NTLMv1) 66

The Essentials and Beyond 67

Chapter 4 Securing Access with Permissions 69

Comparing NTFS Permissions 69

Identifying Basic NTFS Permissions 70

Identifying Advanced NTFS Permissions 71

Combining Permissions 75

Enabling and Disabling Permission Inheritance 76

Moving and Copying Files 79

Comparing NTFS and FAT 81

Exploring Share Permissions 81

Identifying Share Permissions 83

Combining NTFS and Share Permissions 85

Identifying Active Directory Permissions 87

Viewing Active Directory Users and Computers 87

Comparing NTFS and Active Directory Permissions 88

Viewing Active Directory Permissions 88

Assigning Registry Permissions 91

The Essentials and Beyond 93

Chapter 5 Using Audit Policies and Network Auditing 95

Exploring Audit Policies 96

Exploring Object Access Auditing 99

Comparing Account Logon and Logon Events 101

Exploring Directory Service Access Auditing 102

Understanding Account Management Auditing 103

Understanding System Events Auditing 103

Understanding Privilege Use Auditing 104

Understanding Policy Change Auditing 105

Understanding Process Tracking 105

Enabling Auditing 105

Enabling Object Access Auditing 107

Enabling Directory Service Access Auditing 108

Viewing Audit Information 110

Managing Security Logs 111

Saving Audit Information 113

Securing Audit Information 113

Auditing a Network with MBSA 114

Installing MBSA 116

Running MBSA 116

The Essentials and Beyond 117

Chapter 6 Protecting Clients and Servers 121

Understanding User Account Control 122

Understanding the Dimmed Desktop 123

Modifying User Account Control 123

Keeping Systems Updated 125

Updating Systems with Automatic Updates 126

Updating Systems with WSUS or SCCM 128

Using Group Policy to Configure Clients 129

Protecting Clients 130

Understanding Offline Folders 130

Encrypting Offline Folders 132

Using Software-Restriction Policies 133

Protecting Servers 135

Using Separate VLANs 136

Separating Services 136

Using Read-Only Domain Controllers 139

Exploring DNS Security Issues 140

Protecting Against Email Spoofing with SPF Records 141

Understanding Dynamic Updates 141

Using Secure Dynamic Updates 142

The Essentials and Beyond 144

Chapter 7 Protecting a Network 147

Identifying Common Attack Methods 147

Denial of Service 148

Distributed Denial of Service 149

Sniffing Attack 149

Spoofing Attack 151

Port Scan 151

Exploring Firewalls 153

Comparing Hardware-Based and Software-Based Firewalls 154

Comparing UTMs and SCMs 155

Isolating Servers on Perimeter Networks 157

Using Honeypots 159

Isolating a Network with NAT 159

Exploring Network Access Protection 159

Understanding NAP Components 160

Evaluating Client Health with VPN Enforcement 162

Using Other NAP Enforcement Methods 163

Identifying NAP Requirements 163

Identifying Protocol Security Methods 164

IPsec 165

Comparing Tunneling Protocols 166

DNSSEC 167

The Essentials and Beyond 168

Chapter 8 Understanding Wireless Security 171

Comparing Wireless Devices 171

Wireless Adapters 172

Wireless Access Points 173

Wireless Routers 173

Comparing Wireless Security Methods 174

Understanding Encryption Keys 175

Wired Equivalent Privacy 175

Wi-Fi Protected Access 176

Wi-Fi Protected Access Version 2 177

Extended Authentication Protocol 178

Viewing Windows 7 Wireless Settings 179

Configuring Wireless Routers 183

Changing the Default Administrator Password 183

Changing the SSID 183

To Broadcast or Not to Broadcast 185

Using MAC Filters 187

Configuring Windows 7 for Wireless 189

The Essentials and Beyond 190

Chapter 9 Understanding Physical Security 193

Comparing Site Security and Computer Security 194

Understanding the Importance of Physical Security 194

Controlling Physical Access 196

Using Switches Instead of Hubs 199

Using Group Policy to Enhance Computer Security 200

Understanding Default GPOs 200

Designing OUs and GPOs to Manage Users and Computers 201

Creating OUs in a Domain 202

Moving Objects into an OU 203

Creating GPOs to Manage Users and Computers 203

Understanding Security Settings in a GPO 204

Disabling Log On Locally with Group Policy 206

Controlling Removable Storage Access with Group Policy 209

Exploring Mobile Device Security 211

Protecting Mobile Devices Against Malware 212

Minimizing Risks with Bluetooth Devices 212

The Essentials and Beyond 213

Chapter 10 Enforcing Confidentiality with Encryption 215

Comparing Encryption Methods 216

Understanding Symmetric Encryption 216

Exploring AES 218

Understanding Asymmetric Encryption 219

Using Certificates to Share Public Keys 222

Understanding Hashing 223

Securing Email 225

Encrypting Email 226

Digitally Signing Email 228

Understanding EFS 231

Encrypting and Decrypting Files with EFS 232

Understanding the Recovery Agent 233

Understanding Behavior When Files Are Moved or Copied 233

Exploring BitLocker Drive Encryption 235

Understanding BitLocker Requirements 235

Understanding Recovery Keys 236

Using BitLocker To Go 237

The Essentials and Beyond 238

Chapter 11 Understanding Certificates and a PKI 241

Understanding a Certificate 241

Comparing Public and Private Keys 243

Understanding Certificate Errors 245

Viewing Certificate Properties 248

Exploring the Components of a PKI 251

Understanding the Certificate Chain 252

Comparing Certificate Services 254

The Essentials and Beyond 255

Chapter 12 Understanding Internet Explorer Security 257

Exploring Browser Settings 257

Understanding IE Enhanced Security Configuration 259

Selecting Cookies Settings 260

Manipulating the Pop-up Blocker 262

Using InPrivate Filtering and InPrivate Browsing 263

Deleting Browser History 265

Managing Add-ons 266

Exploring Advanced Security Settings 268

Comparing Security Zones 269

Using IE Tools to Identify Malicious Websites 272

Understanding the SmartScreen Filter 272

Modifying Protected Mode 273

The Essentials and Beyond 273

Appendix A Answers to Review Questions 277

Chapter 1 277

Chapter 2 278

Chapter 3 278

Chapter 4 279

Chapter 5 280

Chapter 6 281

Chapter 7 282

Chapter 8 282

Chapter 9 283

Chapter 10 284

Chapter 11 285

Chapter 12 286

Appendix B Microsoft’s Certification Program 287

Certification Objectives Map 288

Index 293



About the Author :

Darril Gibson, MCSE, MCITP, ITIL v3, Security+, CISSP, is the CEO of Security Consulting and Training, LLC. A Microsoft Certified Trainer since August, 1999, he regularly teaches, writes, and consults on a wide variety of security and technical topics. He has authored, coauthored, or contributed to 14 books on a wide range of topics that include Server 2008, Windows 7, SQL Server, CompTIA Security+, and security.


Best Sellers


Product Details
  • ISBN-13: 9781118016848
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Sybex Inc.,U.S.
  • Height: 231 mm
  • No of Pages: 336
  • Returnable: N
  • Weight: 693 gr
  • ISBN-10: 111801684X
  • Publisher Date: 24 Jun 2011
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 18 mm
  • Width: 188 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

     4.5  |  6 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
     4.5  |  6 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Microsoft Windows Security Essentials
    John Wiley & Sons Inc -
    Microsoft Windows Security Essentials
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Microsoft Windows Security Essentials

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!