Page 846 - StudyBook.pdf
P. 846

830     Index

             social engineering. See Social  Authentication spoofing, 222, 226  C
                engineering             Authentication tokens, 16
             software exploitation for, 65–66  Authenticator, 110    CA. See Certification authority
             spoofing. See Spoofing     Authenticator port access entity, 189  Cabling
             synchronous (SYN), 56, 60–61, 92                          coaxial. See Coax
             TCP/IP hijacking, 67–68    B                              electromagnetic interference concerns,
             Trojan horse, 6–7, 85–86, 93                                 627
             vulnerability scanning for, 77, 92  Back doors, 86–88, 94  fiber-optic, 407, 416, 419, 629
             war dialing. See War dialing  Backup(s)                   installation considerations, 628
             wireless network. See Wireless  copy, 732, 752            radio frequency interference concerns,
                network, attacks on       data selection, 732             627
             worm. See Worm               differential, 732, 737–738, 752  UTP/STP, 404–407, 416, 627–628
           Attack signatures              full, 732, 734–737, 752    Caesar’s Cipher, 541
             components of, 459           importance of, 731         Carbon dioxide systems, for fire
             database of, 459             incremental, 732, 737, 752      suppression, 630
             description of, 389–390, 456  media used for, 731       Carrier protocol, 114
           Audit logs, 28                 offsite storage of, 735, 754  Carrier sense multiple access with
           Auditing                       programs for, 409               collision avoidance, 174–176
             definition of, 7, 711, 750   restoration of data, 734, 736–737  CDP. See Cisco Discovery Protocol
             logging, 33–34               rotation scheme for, 733–734  CDRs. See Recordable compact disks
             in Microsoft Windows, 30-35  security for, 616          CDs. See Compact disks
             of e-mail, 753               summary of, 751–752        Cell phones, 285
             of systems, 29-34            web server, 261            Centralized key management, 579–580,
             of usage patterns, 713     Backup logs, 727                  594
             privilege management through,  Bastion host, 434        Centralizing of servers, 608, 709–710,
                711–714                 Bayonet Neill Concelman connector, 401  750
             purpose of, 27             Best practices, 687          Certificate(s)
             summary of, 44             Biometric authentication, 28, 618, 659,  definition of, 559
             system resources affected by, 711  693                    deregistration of, 592
           Authentication               BIOS password, 615             description of, 22-23
             access control vs., 4, 45  Birthday attacks, 122          digital, 308–309, 565, 568, 594
             asymmetric cryptography, 546–547  Birthday paradox, 80–81, 204  expiration of, 574, 579, 585, 595
             biometric, 26, 618, 659, 693  BlackBerry, 285             life cycle of, 579
             certificates, 20–21        “Black-hat” hackers, 119       mutual authentication use of, 25
             challenge handshake authentication  Blaster worm, 84      online certificate status protocol, 576
                protocol, 19–20         Blind FTP, 332–333             renewal of, 585, 591, 595
             cleartext, 14              Blind spoofing, 69             revocation of. See Revocation of
             computer-level, 128        Block ciphers, 526, 534           certificate
             confidentiality vs., 542   Bluetooth, 172, 399            self-signed, 559–560, 564
             definition of, 4–5         Bootstrap sector viruses, 83   summary of, 594
             description of, 12-13, 681  Bounce attacks, 334           suspension of, 588–589
             802.1x, 188–191            Broadcast domain, 445          X.509, 569–570
             IPSec, 132–133             Browsers. See Web browsers   Certificate authority
             Kerberos, 16–19            Brute force attack             definition of, 132, 279, 308
             lightweight directory access protocol,  description of, 12, 80–81  digital certificates issued by, 309, 572
                344                       password cracks by, 692      hierarchical models, 579, 596
             MAC, 113–114                 symmetric encryption algorithm  intermediate, 564
             methods of, 4–5, 11–12          susceptibility to, 528, 550–551  leaf, 564
             mixed mode, 513            Buffer overflows, 65, 95, 119, 122, 282,  root, 563–564, 591
             multi-factor, 24–25             296, 312–313              single models, 562–563, 596
             mutual, 25–26, 191–192, 566  Bulk demagnetizer, 696       subordinate, 563–564
             purpose of, 11             Bulletin board systems, 150, 674  Certificate policies, 572–573
             RADIUS, 118–119            Bus topology                 Certificate practice statements, 573–574
             remote access servers, 381   coax cable use of, 403     Certificate revocation, 574–575
             Rivest, Shamir, & Adleman, 536–537  UTP/STP cable use of, 405  Certificate revocation list, 310, 575–576,
             secret key used for, 11    Business continuity planning      587–588
             shared-key, 187–188, 199, 240  countermeasures, 743     Certification authority, 20–21
             summary of, 44               definition of, 741–742     Certification Hold, 588
             symmetric cryptography, 546  fault tolerance, 744–746   Certification request syntax standard, 578
             token technology for, 23–24  high availability, 744–746, 753  CGI. See Common gateway interface
             two-factor, 243, 676         plans included in, 742     Chain of custody, at forensics
             user-level, 128              power loss, 743–744             investigation, 639–641
             username/password combinations for,  summary of, 748, 752–753  Challenge handshake authentication
                22–23                     utilities, 743–744              protocol, 21-22, 381
             wired equivalent privacy, 183  Business functions, 742  Change documentation, 726, 751
           Authentication certificates, 290  Business recovery plan, 742  CHAP. See Challenge handshake
           Authentication hashes, 133   Business resumption plan, 742     authentication protocol
           Authentication header, 116, 132                           Chat rooms, 326
           Authentication POP, 12                                    Chernobyl virus, 89
           Authentication server, 110                                Chip creep, 624
   841   842   843   844   845   846   847   848   849   850   851