Page 846 - StudyBook.pdf
P. 846
830 Index
social engineering. See Social Authentication spoofing, 222, 226 C
engineering Authentication tokens, 16
software exploitation for, 65–66 Authenticator, 110 CA. See Certification authority
spoofing. See Spoofing Authenticator port access entity, 189 Cabling
synchronous (SYN), 56, 60–61, 92 coaxial. See Coax
TCP/IP hijacking, 67–68 B electromagnetic interference concerns,
Trojan horse, 6–7, 85–86, 93 627
vulnerability scanning for, 77, 92 Back doors, 86–88, 94 fiber-optic, 407, 416, 419, 629
war dialing. See War dialing Backup(s) installation considerations, 628
wireless network. See Wireless copy, 732, 752 radio frequency interference concerns,
network, attacks on data selection, 732 627
worm. See Worm differential, 732, 737–738, 752 UTP/STP, 404–407, 416, 627–628
Attack signatures full, 732, 734–737, 752 Caesar’s Cipher, 541
components of, 459 importance of, 731 Carbon dioxide systems, for fire
database of, 459 incremental, 732, 737, 752 suppression, 630
description of, 389–390, 456 media used for, 731 Carrier protocol, 114
Audit logs, 28 offsite storage of, 735, 754 Carrier sense multiple access with
Auditing programs for, 409 collision avoidance, 174–176
definition of, 7, 711, 750 restoration of data, 734, 736–737 CDP. See Cisco Discovery Protocol
logging, 33–34 rotation scheme for, 733–734 CDRs. See Recordable compact disks
in Microsoft Windows, 30-35 security for, 616 CDs. See Compact disks
of e-mail, 753 summary of, 751–752 Cell phones, 285
of systems, 29-34 web server, 261 Centralized key management, 579–580,
of usage patterns, 713 Backup logs, 727 594
privilege management through, Bastion host, 434 Centralizing of servers, 608, 709–710,
711–714 Bayonet Neill Concelman connector, 401 750
purpose of, 27 Best practices, 687 Certificate(s)
summary of, 44 Biometric authentication, 28, 618, 659, definition of, 559
system resources affected by, 711 693 deregistration of, 592
Authentication BIOS password, 615 description of, 22-23
access control vs., 4, 45 Birthday attacks, 122 digital, 308–309, 565, 568, 594
asymmetric cryptography, 546–547 Birthday paradox, 80–81, 204 expiration of, 574, 579, 585, 595
biometric, 26, 618, 659, 693 BlackBerry, 285 life cycle of, 579
certificates, 20–21 “Black-hat” hackers, 119 mutual authentication use of, 25
challenge handshake authentication Blaster worm, 84 online certificate status protocol, 576
protocol, 19–20 Blind FTP, 332–333 renewal of, 585, 591, 595
cleartext, 14 Blind spoofing, 69 revocation of. See Revocation of
computer-level, 128 Block ciphers, 526, 534 certificate
confidentiality vs., 542 Bluetooth, 172, 399 self-signed, 559–560, 564
definition of, 4–5 Bootstrap sector viruses, 83 summary of, 594
description of, 12-13, 681 Bounce attacks, 334 suspension of, 588–589
802.1x, 188–191 Broadcast domain, 445 X.509, 569–570
IPSec, 132–133 Browsers. See Web browsers Certificate authority
Kerberos, 16–19 Brute force attack definition of, 132, 279, 308
lightweight directory access protocol, description of, 12, 80–81 digital certificates issued by, 309, 572
344 password cracks by, 692 hierarchical models, 579, 596
MAC, 113–114 symmetric encryption algorithm intermediate, 564
methods of, 4–5, 11–12 susceptibility to, 528, 550–551 leaf, 564
mixed mode, 513 Buffer overflows, 65, 95, 119, 122, 282, root, 563–564, 591
multi-factor, 24–25 296, 312–313 single models, 562–563, 596
mutual, 25–26, 191–192, 566 Bulk demagnetizer, 696 subordinate, 563–564
purpose of, 11 Bulletin board systems, 150, 674 Certificate policies, 572–573
RADIUS, 118–119 Bus topology Certificate practice statements, 573–574
remote access servers, 381 coax cable use of, 403 Certificate revocation, 574–575
Rivest, Shamir, & Adleman, 536–537 UTP/STP cable use of, 405 Certificate revocation list, 310, 575–576,
secret key used for, 11 Business continuity planning 587–588
shared-key, 187–188, 199, 240 countermeasures, 743 Certification authority, 20–21
summary of, 44 definition of, 741–742 Certification Hold, 588
symmetric cryptography, 546 fault tolerance, 744–746 Certification request syntax standard, 578
token technology for, 23–24 high availability, 744–746, 753 CGI. See Common gateway interface
two-factor, 243, 676 plans included in, 742 Chain of custody, at forensics
user-level, 128 power loss, 743–744 investigation, 639–641
username/password combinations for, summary of, 748, 752–753 Challenge handshake authentication
22–23 utilities, 743–744 protocol, 21-22, 381
wired equivalent privacy, 183 Business functions, 742 Change documentation, 726, 751
Authentication certificates, 290 Business recovery plan, 742 CHAP. See Challenge handshake
Authentication hashes, 133 Business resumption plan, 742 authentication protocol
Authentication header, 116, 132 Chat rooms, 326
Authentication POP, 12 Chernobyl virus, 89
Authentication server, 110 Chip creep, 624