ࡱ>  2bjbjT~T~ K66DvB B    8E1 ( "//G5777777$z*[Q[/G.!.!.!^R/G5.!5.!.!z"?/̈&V <Nl!®0PF F?"a(F.![[ !"FB K: ITSY 2430 - Chapter Guide 01 Introduction to Security v9781428340664 Lecture Notes Prof. Michael P. Harris Overview This chapter introduces security fundamentals that form the basis of the Security+ certification. It begins by examining the current challenges in computer security and why it is so difficult to achieve. It then describes information security in more detail to see why it is important. Next, the chapter looks at who is responsible for these attacks and what are the fundamental defenses against attackers. Finally, it explores the types of computer security careers for IT professionals and introduces the CompTIA Security+ certification. Chapter Objectives Describe the challenges of securing information Define information security and explain why it is important Identify the types of attackers that are common today List the basic steps of an attack Describe the five steps in a defense Explain the different types of information security careers and how the Security+ certification can enhance a security career Challenges of Securing Information There is no simple solution to securing information. This can be seen through the different types of attacks that users face today, as well as the difficulties in defending against these attacks. Todays Security Attacks Typical security warnings: A malicious program was introduced at some point in the manufacturing process of a popular brand of digital photo frames. A Nigerian e-mail scam claimed to be sent from the U.N. Booby-trapped Web pages are growing at an increasing rate. A new worm disables Microsoft Windows Automatic Updating and the Task Manager. Apple has issued an update to address 25 security flaws in its operating system OS X. The Anti-Phishing Working Group (APWG) reports that the number of unique phishing sites continues to increase. Researchers at the University of Maryland attached four computers equipped with weak passwords to the Internet for 24 days to see what would happen. These computers were hit by an intrusion attempt on average once every 39 seconds. Security statistics bear witness to the continual success of attackers: TJX Companies, Inc. reported that over 45 million customer credit card and debit card numbers were stolen by attackers over an 18 month period from 2005 to 2007. Table 1-1 lists some of the major security breaches that occurred during a three-month period. The total average cost of a data breach in 2007 was $197 per record compromised. A recent report revealed that of 24 federal government agencies, the overall grade was only  C" . TipPhishing Web sites are well known for suddenly appearing and then disappearing to reduce the risk of being traced. The average time a site is online according to the APWG (Anti-Phishing Working Group) is only four days ( HYPERLINK "www.antiphishing.org" www.antiphishing.org). TipThe US-CERT security bulletin is available at  HYPERLINK "www.us-cert.gov/cas/bulletins/" www.us-cert.gov/cas/bulletins/. Difficulties in Defending against Attacks Speed of attacks Greater sophistication of attacks Simplicity of attack tools (see Figures 1-1 and 1-2) Attackers can detect vulnerabilities more quickly and more readily exploit these vulnerabilities Delays in patching hardware and software products Most attacks are now distributed attacks, instead of coming from only one source User confusion What Is Information Security? Security can be defined as a state of freedom from a danger or risk that exists because protective measures are established and maintained. Information security is the tasks of guarding information that is in a digital format. It ensures that protective measures are properly implemented. Information security cannot completely prevent attacks or guarantee that a system is totally secure. Information security is intended to protect information that has value to people and organizations. That value comes from the characteristics (CIA) of the information: Confidentiality Integrity Availability Information security is achieved through a combination of these three entities. See Figure 1-3 and Table 1-3. A more comprehensive definition of Information Security is that which protects the Confidentiality, Integrity, and Availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures. TipThe Confidentiality, Integrity, and Availability of information is known as CIA. Information Security Terminology Define the following information security terms: Asset Threat Threat agent Vulnerability See Figure 1-4 and Table 1-4 to illustrate the terminology above. Understanding the Importance of Information Security The main goals of information security are to prevent data theft, thwart identity theft, avoid the legal consequences of not securing information, maintain productivity, and foil cyberterrorism. Security is often associated with theft prevention. The theft of data is one of the largest causes of individual and corporate financial loss due to an attack. Identity theft involves using someones personal information to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating. A number of federal and state laws have been enacted to protect the privacy of electronic data, including the following: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) The Sarbanes-Oxley Act of 2002 (Sarbox) The Gramm-Leach-Bliley Act (GLBA) USA Patriot Act (2001) The California Database Security Breach Act (2003) Childrens Online Privacy Protection Act of 1998 (COPPA) TipIn 2008, California extended its data breach notification law (e.) to encompass incidents including electronic medical and health insurance information. Cleaning up after an attack diverts resources such as time and money away from normal activities. See Table 1-5. Cyberterrorism can be defined as attacks by terrorist groups using computer technology and the Internet. Utility, telecommunications, and financial services companies are considered prime targets of cyberterrorists. Who Are the Attackers? The types of people behind computer attacks are generally divided into several categories. These include hackers, script kiddies, spies, employees, cybercriminals, and cyberterrorists. Hackers The term hacker in a generic sense means anyone who illegally breaks into or attempts to break into a computer system. In a more narrow sense, hacker means a person who uses advanced computer skills to attack computers only to expose security flaws. Although breaking into another person's computer system is illegal, some hackers believe it is ethical as long as they do not commit theft, vandalism, or breach any confidentiality. TipSecurity vulnerabilities, however, can be exposed in ways other than attacking another computer without the owner's consent, and most security professionals would not refer to themselves as hackers. Script Kiddies Script kiddies as unskilled users that want to break into computers to create damage. They download automated hacking software (scripts) from Web sites and use it to break into computers. Script kiddies are sometimes considered more dangerous than hackers. They tend to be computer users who have almost unlimited amounts of leisure time, which they can use to attack systems. Spies A computer spy as a person who has been hired to break into a computer and steal information. Spies are hired to attack a specific computer or system that contains sensitive information. Their goal is to break into that computer or system and take the information without drawing any attention to their actions. Spies, like hackers, possess excellent computer skills. Script Kiddies Script kiddies as unskilled users that want to break into computers to create damage. They download automated hacking software (scripts) from Web sites and use it to break into computers. Script kiddies are sometimes considered more dangerous than hackers. They tend to be computer users who have almost unlimited amounts of leisure time, which they can use to attack systems. Employees One of the largest information security threats to a business actually comes from an unlikely source: its employees. Some of the reasons an employee would break into their company's computer, include: An employee might want to show the company a weakness in their security Disgruntled employees may be intent on retaliating against the company Industrial espionage Blackmailing Cybercriminals Cybercriminals are a loose-knit network of attackers, identity thieves, and financial fraudsters. They are described as more highly motivated, less risk-averse, better funded, and more tenacious than hackers. Many security experts believe that cybercriminals belong to organized gangs of young and mostly Eastern European attackers. See Table 1-6. Cybercriminals have a more focused goal that can be summed up in a single word: money. Cybercrime as targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. Financial cybercrime is often divided into two categories: Trafficking in stolen credit card numbers and financial information Using spam to commit fraud TipCybercriminals often meet in online "underground" forums that have names like DarkMarket.org and theftservices.com. The purpose of these meetings is to trade information and coordinate attacks around the world. Cyberterrorists The motivation of cyberterrorists may be defined as ideology, or attacking for the sake of their principles or beliefs. Goals of a cyberattack may be: to deface electronic information and spread misinformation and propaganda to deny service to legitimate computer users to commit unauthorized intrusions into systems and networks that result in critical infrastructure outages and corruption of vital data. TipCyberterrorists are considered the attackers that should be feared the most, for it is almost impossible to predict when or where an attack may occur. Attacks and Defenses Although there are a wide variety of attacks that can be launched against a computer or network, the same basic steps are used in most attacks. Protecting computers against these steps in an attack calls for five fundamental security principles. Steps of an Attack The five steps that make up an attack: Probe for information Penetrate any defenses Modify security settings Circulate to other systems Paralyze networks and devices Defenses against Attacks Although multiple defenses may be necessary to withstand an attack, these defenses should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. Layering  (DiD) Defense-in-Depth Information security must be created in layers (DiD) Defense in Depth. One defense mechanism may be relatively easy for an attacker to circumvent. Instead, a security system must have layers, making it unlikely that an attacker has the tools and skills to break through all the layers of defenses. A layered approach can also be useful in resisting a variety of attacks. Layered security provides the most comprehensive protection. Limiting Limiting access to information reduces the threat against it. Only those who must use data should have access to it. In addition, the amount of access granted to someone should be limited to what that person needs to know. Some ways to limit access are technology-based, while others are procedural. TipWhat level of access should users have? The best answer is the least amount necessary to do their jobs, and no more. Diversity Layers must be different (diverse) so that if attackers penetrate one layer, they cannot use the same techniques to break through all other layers. Using diverse layers of defense means that breaching one security layer does not compromise the whole system. Obscurity An example of obscurity is not revealing the type of computer, operating system, software, and network connection that a computer uses. An attacker who knows that information can more easily determine the weaknesses of the system. Obscuring information can be an important way to protect information. Simplicity Information security is by its very nature complex. Complex security systems can be hard to understand, troubleshoot, and feel secure about. As much as possible, a secure system should be simple for those on the inside to understand and use. Complex security schemes are often compromised to make them easier for trusted users to use. Keeping a system simple from the inside but complex on the outside can sometimes be difficult but reaps a major benefit. Surveying Information Security Careers & the Security+ Certification Today, businesses and organizations require employees and even prospective applicants to demonstrate that they are familiar with computer security practices. Many organizations use the CompTIA Security+ cert to verify security competency. Types of Information Security Jobs Information Assurance (IA) as a superset of information security, including security issues that do not involve computers. IA covers a broader area than just basic technology defense tools and tactics. It also includes reliability, strategic risk management, and corporate governance issues such as privacy, compliance, audits, business continuity, and disaster recovery. IA is interdisciplinary and individuals who are employed in it may come from different fields of study. Information Security (InfoSec), also called computer security, involves the tools and tactics to defend against computer attacks. Information security does not include security issues that do not involve computers. CompTIA Security+ Certification CompTIA Security+ (2008 Edition) cert is the premiere vendor-neutral credential. The Security+ exam is internationally recognized foundation-level validation of security skills & knowledge used by organizations & security pros around the world. The skills & knowledge measured by the Security+ exam are derived from industry-wide Job Task Analysis (JTA). The six domains covered by the Security+ exam are Systems Security, Network Infrastructure, Access Control, Assessments and Audits, Cryptography, and Organizational Security. Key Terms: availability Ensures that data is accessible to authorized users. California Database Security Breach Act A state act that requires disclosure to California residents if a breach of personal information has or is believed to have occurred. Childrens Online Privacy Protection Act (COPPA) A U.S. federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a childs personal information. confidentiality Ensures that only authorized parties can view the information. cybercrime Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. cybercriminals A loose-knit network of attackers, identity thieves, and financial fraudsters that are more highly motivated, less risk-averse, better funded, and more tenacious than hackers. cyberterrorism Attacks by cyberterrorists that could cripple a nations electronic and commercial infrastructure. exploit To take advantage of a vulnerability. Gramm-Leach-Bliley Act (GLBA) A U.S. federal act that requires private data to be protected by banks and other financial institutions. hacker (1) Anyone who illegally breaks into or attempts to break into a computer system; (2) A person who uses advanced computer skills to attack computers but not with malicious intent. Health Insurance Portability and Accountability Act (HIPAA) A U.S. federal act that requires healthcare enterprises to guard protected health information. identity theft Using someones personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating. information assurance (IA) A superset of info security including security issues that do not involve computers. information security The tasks of guarding information that is in a digital format, protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures. integrity Ensures that information is correct and no unauthorized person or malicious software has altered that data. risk The likelihood that a threat agent will exploit a vulnerability. Sarbanes-Oxley Act (Sarbox) A U.S. federal act that enforces reporting requirements and internal controls on electronic financial reporting systems. script kiddie An unskilled user who downloads automated attack software to attack computers. signature-based defense A method that identifies malware by matching it to an antivirus signature file. spy A person who has been hired to break into a computer and steal information. threat An event 6:;=JKMZɷ|oaVaJ<hW5>*CJ OJQJ\h}h" OJQJ\h|U CJOJQJ\h}h" CJOJQJ\h}h" CJOJQJh*)h" CJOJQJaJh*)CJOJQJ\aJh*)h*)CJOJQJ\aJh*)5CJ$OJQJ\aJ0"hoho5CJ$OJQJ\aJ0h}h" OJQJaJh}hL5OJQJ\h}h" 5OJQJ\h}h}5OJQJ\KLM  | $ & F%a$gdy! $ & F^a$$a$Gkd$$Ifl$ %    %4 lap $ !$Ifa$$a$$a$$a$gdL  m K M o p ҿҭҿқҐv^F.h}h5CJOJPJQJ\aJnHtH.h#h#5CJOJPJQJ\aJnHtHhghgCJOJQJaJh}hOJQJh}h" OJQJ"hDRho6CJOJQJ\aJ"hDRho5CJOJQJ\aJ%hDRho56CJOJQJ\aJhohoCJOJQJ\aJh}h" OJQJ\!h}h" 5>*CJ OJQJ\ Q L M p q 5 6 O P k ZnV & Fgdy! & Fgdy! gd & Fgd(+ & Fgd& & F8^8`gd(+ 7$8$H$gd$a$ $ & F%a$gdy!p q 4 5 6 N O P j k , $UVﲟŊt\F\4"h.CJOJPJQJaJnHtH+hv;h.5CJOJPJQJaJnHtH.hv;h.56CJOJPJQJaJnHtH+hv;h.6CJOJPJQJaJnHtH(h.h.CJOJPJQJaJnHtH$hhOJPJQJaJnHtH$hhOJPJQJaJnHtH(h.h(+CJOJPJQJaJnHtH(h.hDCJOJPJQJaJnHtH h}h(+OJPJQJnHtHVWAq$$7$8$H$Ifa$gdu_~ $$Ifa$gdu_~ & Fgd(+ & Fgdy! & Fgdy!  & F^gdM9 VXAJ !4ٮzk[kK?khv;CJOJQJaJhv;hv;6CJOJQJaJhMhM5CJOJQJaJhMhMCJOJQJaJ"hMhM56CJOJQJaJ h}h[]V56OJQJ\] h}hCOJPJQJnHtH(h.hM9CJOJPJQJaJnHtH+hk?hM96CJOJPJQJaJnHtH(hM9hM9CJOJPJQJaJnHtH"hM9CJOJPJQJaJnHtH45WXYmnpqrswݦyjWjAW/W#hOZhOZ0J>*CJOJQJaJ+jhOZhOZCJOJQJUaJ%jhOZhOZCJOJQJUaJhOZhOZCJOJQJaJ h}hOZ56OJQJ\] h}hOZOJPJQJnHtHh}h[]VOJQJhMh[]VCJOJQJaJ#hMhM0J>*CJOJQJaJ+jhhMhMCJOJQJUaJhMhMCJOJQJaJ%jhMhMCJOJQJUaJqrswzrfU$$7$8$H$Ifa$gdo $$Ifa$gdo  & FgdOZkd $$Ifl0@$q  0%64 lap  !"p3F}~ҾvvvvvhWC&hYUhYU5OJPJQJ\nHtH h}htgOJPJQJnHtHhCOJPJQJnHtH#hqhq6OJPJQJnHtH hqhqOJPJQJnHtH h}hCOJPJQJnHtH&h}h5OJPJQJ\nHtH&htghtg5OJPJQJ\nHtH&h}h}5OJPJQJ\nHtHh}hOZOJQJhOZhOZCJOJQJaJ!"3Uo~|sskccccccc & Fgdy! & FgdC 7$8$H$gdkd$$Ifl0@$q  0%64 lap yto ~*$a_c $7$8$H$Ifgd& $$Ifa$gdo  & F&gdy! & F&gdy! & F8^8`gdC 7$8$H$gd & F8^8`gdq *+>?@$%-3CFGӫәәӁoYooGo"hCJOJPJQJaJnHtH+h`#4h`#45CJOJPJQJaJnHtH"h`#4CJOJPJQJaJnHtH.hszhsz56CJOJPJQJaJnHtH"h>ACJOJPJQJaJnHtH+h>Ah>A6CJOJPJQJaJnHtH"hszCJOJPJQJaJnHtH(h>Ah>ACJOJPJQJaJnHtH.hszh>A56CJOJPJQJaJnHtHG_ev]^_¬”|ԔgԔU@(h&h&CJOJPJQJaJnHtH"h&CJOJPJQJaJnHtH(h>AhCJOJPJQJaJnHtH.hh>A56CJOJPJQJaJnHtH.hh56CJOJPJQJaJnHtH+hh6CJOJPJQJaJnHtH"hCJOJPJQJaJnHtH(h>Ah>ACJOJPJQJaJnHtH+hh>A6CJOJPJQJaJnHtH_c14Ե~jU@*+hqhO 6CJOJPJQJaJnHtH(hYhYCJOJPJQJaJnHtH(hD&h"]CJOJPJQJaJnHtH&h}h"]5OJPJQJ\nHtH&h9h95OJPJQJ\nHtH.hD&h&5CJOJPJQJ\aJnHtHh}h&OJQJhOZh&CJOJQJaJh&h&5CJOJQJaJh&h&CJOJQJaJh&CJOJQJaJ h}h&56OJQJ\]  #1s|sc[SSSS[ & Fgdy! & Fgdy! & F8^8`gd"] 7$8$H$gd"]kdU$$Ifl0@$q  0%64 lap yto 4Mrst =R]kԿq\D\D\D\D\D\2"hq;CJOJPJQJaJnHtH.hq;h %56CJOJPJQJaJnHtH(hq;h %CJOJPJQJaJnHtH(hD&hBCJOJPJQJaJnHtH#h}hB5OJPJQJnHtH#h %h %5OJPJQJnHtH(hD&h"]CJOJPJQJaJnHtH(hYh"]CJOJPJQJaJnHtH(hYhYCJOJPJQJaJnHtH+hqhY6CJOJPJQJaJnHtHstmL(bf $7$8$H$Ifgd& $$Ifa$gdo  & Fgdy! & Fgdy! ^`gd"] '(Z_`abf뮜q\K<h&h&CJOJQJaJ h}h&56OJQJ\](hD&h&CJOJPJQJaJnHtH(h&h&CJOJPJQJaJnHtH+h&h %5CJOJPJQJaJnHtH"h&CJOJPJQJaJnHtH(h&h %CJOJPJQJaJnHtH+hO h %5CJOJPJQJaJnHtH"hq;CJOJPJQJaJnHtH(hq;h %CJOJPJQJaJnHtH   c f p q r s ɴwaI1.h:8h %56CJOJPJQJaJnHtH.h:8hq56CJOJPJQJaJnHtH+hO h %6CJOJPJQJaJnHtH+hO hO 6CJOJPJQJaJnHtH(hq;h %CJOJPJQJaJnHtH"hO CJOJPJQJaJnHtH(hD&h %CJOJPJQJaJnHtHh}h&OJQJh4cCJOJQJaJh&h&CJOJQJaJh4ch&6CJOJQJaJ  r J!K!b!c!"wjbbUUUH ^`gd& ^`gdD & Fgdy! ^`gd&kd$$Ifl0@$q  0%64 lap yto  I!J!K!a!b!c!""$"%"ĮmXC1"hDg5OJPJQJnHtH#h@0h@05OJPJQJnHtH(hD&hCJOJPJQJaJnHtH(h&h&CJOJPJQJaJnHtH(hD&hDCJOJPJQJaJnHtH+hNhhD5CJOJPJQJaJnHtH+hNhhNh5CJOJPJQJaJnHtH+hD&hNh5CJOJPJQJaJnHtH(hq;h"]CJOJPJQJaJnHtH(hq;h %CJOJPJQJaJnHtH"hqCJOJPJQJaJnHtH "%"&"!####$ $7$8$H$Ifgdy! $$Ifa$gdy! ^`gd^x & Fgdy! ^`gdDg%"&"####$$$$$$$Կ{p_M;* h h<OJPJQJnHtH#h}h<5OJPJQJnHtH#hS#hS#5OJPJQJnHtH h}hDOJPJQJnHtHh}h^xOJQJh&h^xCJOJQJaJhS#hS#CJOJQJaJ h}h^x56OJQJ\](h&h^xCJOJPJQJaJnHtH(hS#hDgCJOJPJQJaJnHtH(hS#h(CJOJPJQJaJnHtH+hD&hbpe5CJOJPJQJaJnHtH $$$$$q%.&/&5&wj]]UUjH ^`gdq'Q & Fgdy! ^`gd< ^`gdCkd$$Ifl0@$q  0%64 lap yty!$$q%r%-&.&/&0&4&5&6&''''''į|gR=g|g(h hq'QCJOJPJQJaJnHtH(hq'Qhq'QCJOJPJQJaJnHtH(hWhq'QCJOJPJQJaJnHtH#h}hq'Q5OJPJQJnHtHhq'Q5OJPJQJnHtH#hS#hq'Q5OJPJQJnHtH(hWhDCJOJPJQJaJnHtH(h h<CJOJPJQJaJnHtH(h h CJOJPJQJaJnHtH"h CJOJPJQJaJnHtH5&6&&n''''s(0)1);)<))*M******+$,{, & F*gdy! ^`gd_ & F)gdy! & F)gdy! & F(gdy! & F'gdy! ^`gdq'Q''S(r(s(t(0)1)9):);)<)*****ٲjUDU/(hyghq'QCJOJPJQJaJnHtH hyghygOJPJQJnHtH(hygh6mCJOJPJQJaJnHtH(h6mh6mCJOJPJQJaJnHtH#h}hq'Q5OJPJQJnHtH#hS#hq'Q5OJPJQJnHtHh6m5OJPJQJnHtH(hWhq'QCJOJPJQJaJnHtH"hWCJOJPJQJaJnHtH(h hq'QCJOJPJQJaJnHtH"hq'QCJOJPJQJaJnHtH*****++,",t,y,----q.s.Dzuu`O@1h&hCJOJQJaJh$h$CJOJQJaJ h}h56OJQJ\](h&hCJOJPJQJaJnHtH+hWh_6CJOJPJQJaJnHtH"h_CJOJPJQJaJnHtH(h_h_CJOJPJQJaJnHtH(hWh_CJOJPJQJaJnHtH#h}h_5OJPJQJnHtH#h_h_5OJPJQJnHtH(h_hq'QCJOJPJQJaJnHtH{,-<-----s. $7$8$H$Ifgd$ $$Ifa$gdy! & Fgdy! & F*gdy! & F*gdy!s.t.u..../g//wj]]UUMM & F+gdy! & F+gdy! ^`gd_ ^`gdkd$$Ifl0@$q  0%64 lap yty!s.t.u...... ////g/h///0000"0μzzhhhVE h}h33,56OJQJ\]"h_CJOJPJQJaJnHtH"h$CJOJPJQJaJnHtH.h$h$56CJOJPJQJaJnHtH(h$h$CJOJPJQJaJnHtH(hWh_CJOJPJQJaJnHtH#h}h_5OJPJQJnHtH#h$h$5OJPJQJnHtH(hq'Qh_CJOJPJQJaJnHtHh}hOJQJ/0"000000XOOJgd12 7$8$H$gdkde$$Ifl0@$q  0%64 lap $7$8$H$IfgdC $$Ifa$gd^ & F+gdy!"00000000111111ëtcRD6$#hWh85CJOJPJQJaJh}h-`b5OJPJQJh}xh}x5OJPJQJ hWh^CJOJPJQJaJ h}xhCCJOJPJQJaJ h}xh}xCJOJPJQJaJ hWhCCJOJPJQJaJ(h}hCJOJPJQJaJnHtH.h}xh}x5CJOJPJQJ\aJnHtH&hWh[p5OJPJQJ\nHtHh}h33,OJQJhvhCJOJQJaJhChCCJOJQJaJ 0a111112202I2d22222c3d32444`gd  & F8^8gd}xh^hgd}x & Fgd}x^gd}x  & F,8^8gdy!  & Fh^hgd}x & Fgd-`bgd12 & Fgdy!12222222b3c3d3e34042444ŷӭzkWE0(hWh}xCJOJPJQJaJnHtH#h}h}x5OJPJQJnHtH&hh56OJPJQJnHtHh5OJPJQJnHtHhW5OJPJQJnHtHhWh}xCJPJaJh}OJPJQJh}xh}xOJPJQJh}xOJPJQJh}h}x5OJPJQJh}xh}x5OJPJQJ hWh}xCJOJPJQJaJh}xhh? & F gd 0 & F8^8`gdJ 7$8$H$gd  & F^gdFxK & F gdaDgd12 & Fgdme_ & F1 88^8gdy.`gd & F0 88^8gd}<<<<<==========Ƕq`OB1 hW5OJPJQJ\nHtHh}hFxKOJPJQJ haDh])CJOJPJQJaJ haDhFxKCJOJPJQJaJh#=CJOJPJQJaJ&haDhaD56CJOJPJQJaJ#haDhaD5CJOJPJQJaJ haDhaDCJOJPJQJaJ hWh~CJOJPJQJaJ&hh~5CJOJPJQJ\aJ&hhl5CJOJPJQJ\aJ h5CJOJPJQJ\aJ==== > > >????? @@@@@@ïzi[M< hD&h.xCJOJPJQJaJh}hL5OJPJQJhphp5OJPJQJ h#=h%CJOJPJQJaJ#h#=h 06CJOJPJQJaJ#h#=h 05CJOJPJQJaJ h#=h 0CJOJPJQJaJ&h#=h 056CJOJPJQJaJ(hWhJCJOJPJQJaJnHtH&h}h5OJPJQJ\nHtH&h`3h`35OJPJQJ\nHtHh??@@@@AABBBB*CCD?EEFF!GGcH & F27$8$H$gd; & Fgd|0 & Fgdan & F8^8`gd.x & FgdL^gdW & F gd 0@@@@@@A'A[A\AiAzA{AAAAAAAB$B&B)B0B;B^BnBpBBBBBBBBBBBܺܨܗxxxxܨg hanh|0CJOJPJQJaJhnbwCJOJPJQJaJ hanhnbwCJOJPJQJaJ hnbwhnbwCJOJPJQJaJ#hanhan5CJOJPJQJaJh;CJOJPJQJaJ&hanhan56CJOJPJQJaJ hanhanCJOJPJQJaJ#hanhan6CJOJPJQJaJ%BBBBBBB*CRCC DDE?EJEEEFFFF!G?GGGcHHH IIIJ JMJbJJJXKbKKKL0LLLM°thkdRCJOJQJ\aJhnbwCJOJQJ\aJhWh;CJOJQJ\aJ"hWh;5CJOJQJ\aJ#hWh+mr5CJOJPJQJaJhWh|05OJPJQJhWhS@5OJPJQJ hD&h.xCJOJPJQJaJ hanh.xCJOJPJQJaJ-cHHIMJXKKLLMnMMP-ñı !"  !#gdL & F27$8$H$gd & F27$8$H$gd;MMnMrMMMMP`-=±ıͱ xcR h<hEL0JCJOJQJaJ)jh<hEL0JCJOJQJUaJhD&CJOJQJaJh<hD&CJOJQJaJh<h<CJOJQJaJh<h<6CJOJQJaJh<hELCJOJQJaJhe#jhe#UhWhS@CJOJQJaJUhWh;CJOJQJ\aJ"hWh;5CJOJQJ\aJ or action that may defeat the security measures in place and result in a loss. USA Patriot Act A U.S. federal act that broadens the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism. vulnerability A weakness that allows a threat agent to bypass security. zero day attack An attack that occurs when an attacker discovers and exploits a previously unknown flaw, providing zero days of warning.     Ch. 01 - Security+ Guide to Network Security Fundamentals, 3rd Edition Page  PAGE 7 of 7 PAGE   "#)*+-.012ɻhWhS@CJOJQJaJh" he# hEL0JjhEL0JUhELh<hiuCJOJQJaJhg|0JCJOJQJaJhiu0JCJOJQJaJ%hg|0JCJOJQJaJmHnHu)jh<hEL0JCJOJQJUaJ"+,-./012 & F27$8$H$gd &`#$I 0 00P&P1h:pv/ =!h"`#`$`%`` Dpf$$If!vh5 %#v %:V l    %5 %4p DyK Fwww.antiphishing.org$$If!vh55q#v#vq:V l  0%6,55q4p DyK yK Vwww.us-cert.gov/cas/bulletins/yX;H,]ą'c$$If!vh55q#v#vq:V l  0%6,55q4p yto $$If!vh55q#v#vq:V l  0%6,55q4p yto $$If!vh55q#v#vq:V l  0%6,55q4p yto $$If!vh55q#v#vq:V l  0%6,55q4p yty!$$If!vh55q#v#vq:V l  0%6,55q4p yty!$$If!vh55q#v#vq:V l  0%6,55q4p $$If!vh55q#v#vq:V l  0%6,55q4p yte#^& 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH 8@8  Heading 1$@&CJ$88  Heading 2$@&CJ <<  Heading 3$@&>*CJ$DD  Heading 4$@&5B*aJphJJ  Heading 5$7$8$@&H$ 5CJaJNN  Heading 6$7$8$@&H$CJOJQJaJ ::  Heading 7 <@&@@  Heading 8 <@&6]H @H  Heading 9 $7$8$@&H$ 5\aJ DA`D Default Paragraph FontVi@V  Table Normal :V 44 la (k (No List 4 @4 Footer  !.)@. Page Number4@4 Header  !<@"<  Comment TextCJaJ@B2@ Body Text 7$8$H$CJaJ 6U@A6 Hyperlink >*B*ph6PR6 Body Text 2aJPCbP Body Text Indent^`aJ(q( headlineB^B Normal (Web)dd[$\$FVF FollowedHyperlink >*B* phNQN Body Text 3 7$8$H$B*CJaJph>0@> List Bullet  & F\>6> List Bullet 2  & FHH  Balloon TextCJOJQJ^JaJ4/@4 Listh^h`828 List 2^`838 List 3 8^8`FEF List Continue 2!x^FF"F List Continue 3"8x^8.1. newheadline"A" title:1R: List Number % & FPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] mEmE juuuuxp V4G_4 %"$'*s."014479<=@BM2')+-.034579:<>@BCFHJKMOQRTUWZ Vq~s"$5&{,s./044{89h?cH"2(*,/1268;=?ADEGILNPSV[4 X m mEXXX_ajqx!!O2$%)AgXΟ2$&5ί2$aA6 nH2$N"6hJ @0(  B S  ?mEDDDDDDDDDDDDhEiEnE&&33V8b8^:m:::0;>;;;a<h<==l>t>K?V?@@U 8Ef4 p j2Y H6D2Y s&n2Y y$"pJY![#2Y 3j$ Ay%><(2Y VM+¦D1 &\0#5VA65B8" 7ޚI72Y F[92Y E=*xM?ښ0aFQl$J4 N2Y P6 BPnBQJP EJ&R1h,Rz|n S㈚nTl(2Uz[e U2Y 4\0\Eo]L]Bd9_2Y ?a6=c~fdUhkQym *bw+ud' x'h#3 `!{T5c 8+7NE, U)B `!HEsLXFOHSsLT+)"]HEEbeu@jsL`_2pDOZ9^W>wO " D U a |U c #s k?YU(8: oHy Og%J*"kgH >A% n!y!"(#e#f#h$%(%&&HI&b&@'bs't'*)])|)(+33,Ne,8-..e.y./U3/>/|/|0)212`3b4`#4_6!7r07D678:8M9v;-<G=y=v> j?S@W@FADDKDaDkEF AFbsF'2HI]ILIJtZJ/[JgJFxKLPJLHwLMq'QDRkdRLkT8tTU1)UTV[]VOW8P[%\"]^_me_l_-`bjvb cj=cebebpe3gtg~g hXdi5k@k-dkl6mLmanCn6o[pqp@Hr+mr"ssiupuRuu}\wnbw}x.x^x{px^kyekzsz{X+{/{M{N{|12|g|t}u_~Bxg}C&8p]b!M~}!(cLMFq- T#YsyCW1+/PiA3K;'`@C=G(Jj 0O5RoELNqDg@0};#;LD&nq;@OC{yg?x%Q#i}-M4uaDgv: X[Cy(Lo 1&m$eBWU@4-{ S# YX?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\^_`abcdfghijklmnopqrstuvwxyz{|}~Root Entry FC&VData ]1TableeWordDocumentKSummaryInformation(DocumentSummaryInformation8Macros ̈&V̈&VVBA ̈&V̈&VdirThisDocument _VBA_PROJECTPROJECT ;B  !"#$%&'()*+,-./0123456789:<=>?@C0* pHdProjectQ(@= l "N J< rstdole>stdoleP h%^*\G{00020430-C 0046}#2.0#0#C:\WINDOWS\system32\e2.tlb#OLE Automation`ENormalENCrmaQF  *\C m! OfficgOficg!G{2DF8D04C-5BFA-101B-BHDE5gAAe4 2ggram Files\C ommonMicrosoft Shared\OFFICE12\MSO.DLL#M 1 Ob Library%zCBeThisDocumenPtG TfisDHcuQ@Ienn 2E HB1BB,!9#"B+BBC9#xME (S"SS"<(1Normal.ThisDocument8(%HxAttribute VB_Name = "ThisDocument" Bas1Normal.VGlobal!SpaclFalse CreatablPre declaIdTru BExposeTemplateDeriv$Custom izC1a  *\G{000204EF-0000-0000-C000-000000000046}#4.0#9#C:\PROGRA~1\COMMON~1\MICROS~1\VBA\VBA6\VBE6.DLL#Visual Basic For Applications*\G{00020905-0000-0000-C000-000000000046}#8.4#0#C:\Program Files\Microsoft Office\Office12\MSWORD.OLB#Microsoft Word 12.0 Object Library*\G{00020430-0000-0000-C000-000000000046}#2.0#0#C:\WINDOWS\system32\stdole2.tlb#OLE Automation*\CNormal*\CNormal"N(*\G{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}#2.4#0#C:\Program Files\Common Files\Microsoft Shared\OFFICE12\MSO.DLL#Microsoft Office 12.0 Object Library "N CThisDocument034e22cc87ThisDocument9#  [O1IXfϽ` %WordkVBAWin16~Win32MacVBA6#Project1 stdole`Project- ThisDocument< _EvaluateNormalOfficeuDocumentjT ID="{7431FE84-8E9B-46D3-9FF6-3AF2B3BDB40E}" Document=ThisDocument/&H00000000 Name="Project" HelpContextID="0" VersionCompatible32="393222000" CMG="7B7963EADAEEDAEEDAEEDAEE" DPB="F6F4EE7712898C8A8C8A8C" GC="7173698A6A8A6A75" [Host Extender Info] &H00000001={3832D640-CF90-11CF-8E43-00A0C911005A};VBE;&H00000000 ThisDocumentThisDocument  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qPROJECTwmA)CompObjBy