Page 847 - StudyBook.pdf
P. 847
Index 831
chmod, 9–10 summary of, 747 symmetric. See Symmetric
Chosen ciphertext, 142 with users, 716–718 cryptography
Ciphers in wireless networks, 169–173 Cryptosystems, 542–543
block, 526, 534 Communications-based security CTRL+ALT+DEL, 614
message encryption using, 139 importance of, 161
stream need for, 105–106 D
definition of, 111, 185, 526, 534, 551 overview of, 106–107
vulnerability of, 203–205 Compact disks DAC
Ciphertext, 111, 526 destruction of, 696 description of,9-10, 714
Cisco Discovery Protocol, 37 discarding of, 620 settings, 9–10, 45
Cisco PIX firewalls, 433 recordable, 409–410, 416 DAC lists, 8
Cisco router, 371 stealing of, 648 Daemon, 63–64
Classified documents, 728 Companion virus, 83 DAP. See Directory access protocol
Cleartext authentication, 14 Computer(s) Data
Cleartext passwords crime scene preservation of, 642 as asset, 649–651
demonstration of, 15-18 due care policies for use of, 685–687 copying of, in forensics investigation,
packet sniffing, 13–16 fan cooling of, 623 643
“Click kiddies,” 106 photographing of, 646–647 destruction of, 696, 730
Client/server architecture, 368 temperature concerns for, 623–624 due care policy applicability to, 686
Client-side scripting, 302 Computer-level authentication, 128 integrity of
Clipper Chip, 585 Confidential documents, 728 Message Digest 5 for, 540
Clock arithmetic, 539 Confidentiality, 541–542, 548 reasonable efforts to maintain, 686
Closed systems, 198 Confidentiality, integrity, and availability “need to know” policies regarding,
Coax cabling security concept, 5, 550 690–691
bus topology, 403 Confusion operations, 530 privacy policies regarding, 687–688
definition of, 401 Content scrambling system, 551–552 RAID, 745–746, 754
description of, 628 Contingency plan recovery of, from backup, 736–737
fiber-optic cable vs., 407 after disaster, 742 retention policies for, 729–730
summary of, 416 after incidents, 633–634 security of, 617–618
thick, 402 Cookie transmission of, media for, 400–408
thin, 401 contents of, 271 valuation of, 650–651
vulnerabilities of, 403 definition of, 151, 269–270, 347, 349 volatile. See Volatile data
Code attacks Internet Explorer settings for, 318–319 Data encryption
back doors, 86–88, 94 persistent, 270 magnetic tape, 409
description of, 57, 81 stealing of, 271–272 in mobile devices, 400, 625
logic bombs, 89, 260–261 temporary, 270 on flashcards, 412
rootkits, 86, 94 tracking, 270 on servers, 399
summary of, 93 Cookie poisoning, 271 wireless networks, 175–176
Trojan horse, 6–7, 85–86, 93 Cookie theft, 271 Data encryption standard, 529–530, 551
viruses, 82–83, 93 Copy backup, 732, 752 Data modification, 134
worms. See Worm Corporate theft, 608, 648 Data repositories
Code of ethics, 699, 750, 753 Counter-mode/CBC-Mac protocol, 109 description of, 509
Code Red worm, 84 Crack-A-Mac, 327 directory enabled networks, 510
Code signing Crawler, 303 Data storage zone, 438
benefits of, 309–310 Crime scene investigation. See Forensics Data virus, 83
description of, 308–309 investigation Databases, 512–514
problems associated with, 310–311 Crime scene technician, 639–640 Day zero attack, 150
vulnerabilities, 311 Crime stings, 465–466 Decentralization of servers, 710
Cold site, 739 Cryptanalysis, 543 Decentralized key management, 579–580,
Collision, 538–539 Crypto Internet protocol encapsulation, 594
Collision domain, 445 451 “Deep packet inspection” firewall, 360
Common gateway interface Cryptographic attacks, 57. See also Defense-in-depth strategy, 431
definition of, 307, 322 Attack(s) Degausser, 696
examples of, 325–326 Cryptographic message syntax standard, Delta certificate revocation list, 575–576,
mechanism of, 323–325 577 587
misconceptions about, 325 Cryptographic token interface standard, Demilitarized zone
scripts 578 bastion host, 434
description of, 323–325 Cryptography definition of, 432
exploiting of, 326–328, 350 access control mechanisms, 547 description of, 230, 257, 398, 426
Nikto program for assessing, asymmetric. See Asymmetric domain name services, 436
328–329 cryptography e-commerce and, 436
uses for, 325–326 confidentiality concerns, 541–542, 548 e-mail relaying, 435
weak, break-ins caused by, 326–328 definition of, 526, 541 firewalls, 433–434
security concerns, 322 encryption. See Encryption FTP services, 435, 504
uses of, 325–326 message integrity, 542, 550 hosts in, 434
vulnerabilities, 322 one-time pad, 547–548, 551 intrusion detection system in, 436
wrappers, 328 principles of, 542–543 layered, 433
Common name, 342 public-key, 533 multiple interface, 433–434
Communication reasons for understanding, 550 need for, 473
business continuity planning for, 744 summary of, 549 protections using, 433–434