Page 847 - StudyBook.pdf
P. 847

Index     831

              chmod, 9–10                    summary of, 747              symmetric. See Symmetric
              Chosen ciphertext, 142         with users, 716–718              cryptography
              Ciphers                        in wireless networks, 169–173  Cryptosystems, 542–543
                block, 526, 534            Communications-based security  CTRL+ALT+DEL, 614
                message encryption using, 139  importance of, 161
                stream                       need for, 105–106           D
                 definition of, 111, 185, 526, 534, 551  overview of, 106–107
                 vulnerability of, 203–205  Compact disks                DAC
              Ciphertext, 111, 526           destruction of, 696          description of,9-10, 714
              Cisco Discovery Protocol, 37   discarding of, 620           settings, 9–10, 45
              Cisco PIX firewalls, 433       recordable, 409–410, 416    DAC lists, 8
              Cisco router, 371              stealing of, 648            Daemon, 63–64
              Classified documents, 728    Companion virus, 83           DAP. See Directory access protocol
              Cleartext authentication, 14  Computer(s)                  Data
              Cleartext passwords            crime scene preservation of, 642  as asset, 649–651
                demonstration of, 15-18      due care policies for use of, 685–687  copying of, in forensics investigation,
                packet sniffing, 13–16       fan cooling of, 623              643
              “Click kiddies,” 106           photographing of, 646–647    destruction of, 696, 730
              Client/server architecture, 368  temperature concerns for, 623–624  due care policy applicability to, 686
              Client-side scripting, 302   Computer-level authentication, 128  integrity of
              Clipper Chip, 585            Confidential documents, 728      Message Digest 5 for, 540
              Clock arithmetic, 539        Confidentiality, 541–542, 548    reasonable efforts to maintain, 686
              Closed systems, 198          Confidentiality, integrity, and availability  “need to know” policies regarding,
              Coax cabling                       security concept, 5, 550     690–691
                bus topology, 403          Confusion operations, 530      privacy policies regarding, 687–688
                definition of, 401         Content scrambling system, 551–552  RAID, 745–746, 754
                description of, 628        Contingency plan               recovery of, from backup, 736–737
                fiber-optic cable vs., 407   after disaster, 742          retention policies for, 729–730
                summary of, 416              after incidents, 633–634     security of, 617–618
                thick, 402                 Cookie                         transmission of, media for, 400–408
                thin, 401                    contents of, 271             valuation of, 650–651
                vulnerabilities of, 403      definition of, 151, 269–270, 347, 349  volatile. See Volatile data
              Code attacks                   Internet Explorer settings for, 318–319  Data encryption
                back doors, 86–88, 94        persistent, 270              magnetic tape, 409
                description of, 57, 81       stealing of, 271–272         in mobile devices, 400, 625
                logic bombs, 89, 260–261     temporary, 270               on flashcards, 412
                rootkits, 86, 94             tracking, 270                on servers, 399
                summary of, 93             Cookie poisoning, 271          wireless networks, 175–176
                Trojan horse, 6–7, 85–86, 93  Cookie theft, 271          Data encryption standard, 529–530, 551
                viruses, 82–83, 93         Copy backup, 732, 752         Data modification, 134
                worms. See Worm            Corporate theft, 608, 648     Data repositories
              Code of ethics, 699, 750, 753  Counter-mode/CBC-Mac protocol, 109  description of, 509
              Code Red worm, 84            Crack-A-Mac, 327               directory enabled networks, 510
              Code signing                 Crawler, 303                  Data storage zone, 438
                benefits of, 309–310       Crime scene investigation. See Forensics  Data virus, 83
                description of, 308–309          investigation           Databases, 512–514
                problems associated with, 310–311  Crime scene technician, 639–640  Day zero attack, 150
                vulnerabilities, 311       Crime stings, 465–466         Decentralization of servers, 710
              Cold site, 739               Cryptanalysis, 543            Decentralized key management, 579–580,
              Collision, 538–539           Crypto Internet protocol encapsulation,  594
              Collision domain, 445              451                     “Deep packet inspection” firewall, 360
              Common gateway interface     Cryptographic attacks, 57. See also  Defense-in-depth strategy, 431
                definition of, 307, 322          Attack(s)               Degausser, 696
                examples of, 325–326       Cryptographic message syntax standard,  Delta certificate revocation list, 575–576,
                mechanism of, 323–325            577                          587
                misconceptions about, 325  Cryptographic token interface standard,  Demilitarized zone
                scripts                          578                      bastion host, 434
                 description of, 323–325   Cryptography                   definition of, 432
                 exploiting of, 326–328, 350  access control mechanisms, 547  description of, 230, 257, 398, 426
                 Nikto program for assessing,  asymmetric. See Asymmetric  domain name services, 436
                   328–329                       cryptography             e-commerce and, 436
                 uses for, 325–326           confidentiality concerns, 541–542, 548  e-mail relaying, 435
                 weak, break-ins caused by, 326–328  definition of, 526, 541  firewalls, 433–434
                security concerns, 322       encryption. See Encryption   FTP services, 435, 504
                uses of, 325–326             message integrity, 542, 550  hosts in, 434
                vulnerabilities, 322         one-time pad, 547–548, 551   intrusion detection system in, 436
                wrappers, 328                principles of, 542–543       layered, 433
              Common name, 342               public-key, 533              multiple interface, 433–434
              Communication                  reasons for understanding, 550  need for, 473
                business continuity planning for, 744  summary of, 549    protections using, 433–434
   842   843   844   845   846   847   848   849   850   851   852