Page 845 - StudyBook.pdf
P. 845
Index
A Active FTP, 330, 347 Anti-virus software
real-time scans by, 149
Active server pages, 307
AAA, 4-5 ActiveX updates, 657–658
Acceptable use policies authentication certificates used by, 290 Applets, 288, 292. See also ActiveX
code of ethics vs., 699 bugs in, 295 Application hardening
description of, 682–685 client-level protection, 297 description of, 482, 499–500
summary of, 749 “container” applications, 289 hotfixes, 500
Access controls, 293–294 patches, 501
file system, 486–487 dangers associated with, 292–294 service packs, 501
privilege management. See Privilege definition of, 289 summary of, 516
management developer responsibilities, 301 updates, 500–501
single sign-ons, 708–709, 750 disabling controls, 300–301 Application layer gateways, 360,
Access control Internet Explorer default setting for, 367–368, 414, 418
alarms, 610 292 Application-based attacks, 92
authentication vs., 4, 45 Java vs., 290–292 ARP spoofing. See Address resolution
definition of, 6 network-level protection, 296–297 protocol spoofing
disadvantages of, 709 old versions of, 296 Asset(s)
discretionary, 6–7 preventing problems with, 303–306 due care policies for use of, 685–687
identification card for, 609 security zones, 297–300 identification of, 649–651, 661, 680
mandatory, 8-9 summary of, 347 risk assessments for, 651–654
methods of, 609 unsigned controls, 291 Asymmetric cryptography
network communications and, 438 vulnerabilities, 293–296 authentication issues, 546–547
password protection, 610–615 weakness of, 291 encryption algorithms
RBAC, 6–8 Adapter unit interface, 402 description of, 533–535
restricted access policies, 676–677 Address resolution protocol spoofing, Diffie–Hellman algorithm, 535–536
role-based, 9, 714 70–71, 223, 225, 375–376 El Gamal algorithm, 537
roles used for, 705 Address space layout randomization, 65 man-in-the-middle attacks, 544
rule-based, 9 Ad-hoc network configuration, Rivest, Shamir, & Adleman
security policies, 680–681 181–182, 241 algorithm, 537
summary of, 43 Administrative accounts, 704–705 summary of, 548
unauthorized starting up of machines, Administrator symmetric algorithms vs., 534–535
615 passwords for, 694 non-repudiation issues, 547
user account configurations, 612–614 vulnerabilities for, 135 Attack(s)
web server, 256–257 Advanced encryption standard, 234, active, 56–78, 91–92, 198–199
Access control, authentication, and 531–532 amplification, 60
auditing Adware, 89–90 application-based, 92
access control. See Access control AES. See Advanced encryption standard backdoor, 86–88, 94
auditing. See Auditing AH. See Authentication header birthday, 122
authentication. See Authentication Air quality, 624–625, 662 bounce, 334
definition of, 3 AirCrack, 112–113 brute force. See Brute force attack
description of, 2–3 AirSnort, 112 buffer overflow, 65, 95, 119, 122, 313
goals of, 3 Alarms, 610 classification of, 56
summary of, 42–43 Algorithms code. See Code attacks
Access control lists block ciphers, 526, 534 day zero, 150
configuration of, 498–499 classification of, 534 denial of service, 57–59
definition of, 426 definition of, 526 dumpster diving, 75, 92, 95, 620, 697
description of, 304, 371 description of, 526–527 eavesdropping, 79, 134, 221, 245–246
firewall use of, 498 El Gamal, 537 file traversal, 503
function of, 430, 498 encryption. See Encryption algorithms Fluhrer, Mantin, and Shamir, 112
packet filters and, 430 Fortezza, 278 logic bombs, 89, 260–261
security concerns, 516–517 hashing, 534, 538–540 lunchtime, 581–582
Access logs, 610 international data encryption, Man-in-the-Middle (MITM). See
Access points 531–532 Man-in-the-Middle attack
definition of, 377 one-time pad, 547, 551 Metasploit, 394–396
placement of, 377–378 Rijndael, 531–532 mixed-threat, 57, 92
questions regarding, 247 Rivest, Shamir, & Adleman, 537 passive. See Passive attacks
rogue, 224, 243 signature, 534 password. See Password attacks
Access requests, 691 stream ciphers, 526, 534, 551 phishing, 73–74, 152–155, 622
Accidental Trojan horses, 292 strength of, 533 replay, 68, 121
ACK packet, 60–61 summary of, 549 resource consumption, 59–60
ACLs. See Access control lists Amplification attacks, 60 rootkits, 86, 94
Active attacks, 56–78, 91–92, 198–199. Annual loss expectancy, 652–654, 661 session hijacking, 67–68
See also specific attack Annualized rate of occurrence, 652, 661 smurf, 60
Active Directory, 339 Anonymous FTP, 332–333 sniffing. See Sniffing
829