Page 848 - StudyBook.pdf
P. 848
832 Index
services hosted by, 435–436 Direct sequence spread spectrum, 173, dsniff, 70
summary of, 470 238, 242 Dual key pairs, 593
word origin of, 432 Directory Due care, 685–687, 749
DEN. See Directory enabled networks definition of, 339 Dumpster diving, 75, 92, 95, 620, 697
Denial all strategy, 440 description of, 257–259 DVDs
Denial of service attack. See also lightweight directory access protocol, content scrambling system encryption
Distributed denial of service 340–341 of, 551–552
attack Directory access protocol, 339 description of, 410
amplification attacks, 60 Directory enabled networks, 510 disposal of, 620
application-based intrusion detection Directory information tree, 340 Dynamic domain name system, 510
systems, 455 Directory services, 338–339, 510–511 Dynamic host control protocol, 36, 193
coax cabling susceptibility to, 403 Disaster Dynamic host control protocol servers,
definition of, 57, 64, 225, 363, 740 planning for, 626–627 508–509, 517
distributed denial of service attack vs., as risk, 648 Dynamic network address translation, 448
64, 94 Disaster recovery
effects of, 59 alternate facility site, 738–740 E
e-mail spam as, 60 backups. See Backup(s)
firewall susceptibility to, 363 countermeasures, 743 EAP, 109, 111
focus of, 57–58 preparation for, 731 Eavesdropping, 79, 134, 221, 245–246
local, 58 risk analysis, 740 E-commerce, 436–437
malformed TCP/IP packets used for, summary of, 747–748, 751–752 eDirectory, 339
393 Disaster recovery plan, 740–742, 747–748 Education
objective of, 58, 363 Discrete logarithms, 536 benefits of, 719
private branch exchange susceptibility Disk locks, 616 description of, 715
to, 384 Diskettes importance of, 672
protecting against, 227–228 imaging of, for forensics investigation, methods of, 719
resource consumption attack, 59–60 642 online resources used for, 721
spam as, 60, 151 security concerns, 411, 417 summary of, 747, 751
summary of, 91 Disposal training sessions used for, 719
switches susceptibility to, 375 of DVDs, 620 user awareness through, 719–720
SYN attack, 56, 60–61, 92 of printed materials, 696–697 802.1x
wireless networks, 225–228 policies regarding, 695–697, 749 authentication, 188–191, 240
Department-specific documents, 728 Distinguished name, 342 description of, 108–110
Deregistration of certificate, 592 Distributed component object model dynamic key derivation, 191
Destruction remote procedure call service, 84 EAP, 111
bulk demagnetizer for, 696 Distributed denial of service attack mutual authentication, 191–192
degausser for, 696 command structure of, 62 temporal key integrity protocol with,
documentation regarding, 730–731 definition of, 363 232–233
of data, 696 denial of service attack vs., 64, 94 terminology associated with, 189
of fixed media, 75 flow of, 64 user identification, 191
of key pairs, 592, 596–597 hosts involved in, 62 vulnerabilities, 111–113, 228
of printed materials, 696–697 phases of, 61–62 802.3, 174
policies regarding, 695–697, 749 progression of, 57 802.11
Devaluation, of equipment, 607 software components of, 62 authentication in
Devices zombies used in, 61–63, 363 mutual, 191–192
firewalls. See Firewalls Distributed RADIUS, 118 open, 186–187, 240
overview of, 358–359 DNS. See Domain name system per-packet, 192
routers. See Routers Documentation shared-key, 187–188, 199, 240
servers. See Servers change, 726, 751 spoofing of, 222
switches, 374–376 classification of, 727–729, 751 control frames, 182
workstations. See Workstations creation of, 722 data frames, 182
DHCP. See Dynamic host control criteria for, 722 description of, 176
protocol description of, 715 development of, 178
Dial-in numbers, war dialing destruction, 730–731 802.11a, 180–181, 238
identification of, 382 in forensics investigation, 635 802.11b, 179–181, 238
Dictionary-based attacks, 81 importance of, 672 802.11g, 180–181
Differential backup, 732, 737–738, 752 inventories, 726–727 802.11i, 234
Diffie–Hellman algorithm, 535–536 logs. See Log(s) management frames, 182
Diffie–Hellman key agreement standard, of guidelines, 722–723 purpose of, 178–179
577 of standards, 722–723 traffic on, 182
Diffie–Hellman key exchanges retention, 729–730 wired equivalent privacy protocol. See
description of, 25 storage, 729–730 Wired equivalent privacy
man-in-the-middle attack summary of, 751 protocol
vulnerabilities, 545 systems architecture, 724–726 El Gamal algorithm, 537
mechanism of operation, 536 Domain name system Electromagnetic interference
Diffusion operations, 530 description of, 36, 137, 436 causes of, 627
Digital certificates, 308–309, 565, 568, dynamic, 510 description of, 406
594. See also Certificate(s) reverse lookups, 458 shielding to prevent against, 627
Digital fingerprints, 539 Domain name system servers Electrostatic discharge, 624–625
Digital signature, 132, 543–544, 548 description of, 147 EM fields, 170–171
Digital signature algorithm, 537 exploitation of, 506 E-mail
Digital versatile disks, 410 hardening of, 505–506 auditing of, 753