Page 848 - StudyBook.pdf
P. 848

832     Index

             services hosted by, 435–436  Direct sequence spread spectrum, 173,  dsniff, 70
             summary of, 470                 238, 242                Dual key pairs, 593
             word origin of, 432        Directory                    Due care, 685–687, 749
           DEN. See Directory enabled networks  definition of, 339   Dumpster diving, 75, 92, 95, 620, 697
           Denial all strategy, 440       description of, 257–259    DVDs
           Denial of service attack. See also  lightweight directory access protocol,  content scrambling system encryption
                Distributed denial of service  340–341                    of, 551–552
                attack                  Directory access protocol, 339  description of, 410
             amplification attacks, 60  Directory enabled networks, 510  disposal of, 620
             application-based intrusion detection  Directory information tree, 340  Dynamic domain name system, 510
                systems, 455            Directory services, 338–339, 510–511  Dynamic host control protocol, 36, 193
             coax cabling susceptibility to, 403  Disaster           Dynamic host control protocol servers,
             definition of, 57, 64, 225, 363, 740  planning for, 626–627  508–509, 517
             distributed denial of service attack vs.,  as risk, 648  Dynamic network address translation, 448
                64, 94                  Disaster recovery
             effects of, 59               alternate facility site, 738–740  E
             e-mail spam as, 60           backups. See Backup(s)
             firewall susceptibility to, 363  countermeasures, 743   EAP, 109, 111
             focus of, 57–58              preparation for, 731       Eavesdropping, 79, 134, 221, 245–246
             local, 58                    risk analysis, 740         E-commerce, 436–437
             malformed TCP/IP packets used for,  summary of, 747–748, 751–752  eDirectory, 339
                393                     Disaster recovery plan, 740–742, 747–748  Education
             objective of, 58, 363      Discrete logarithms, 536       benefits of, 719
             private branch exchange susceptibility  Disk locks, 616   description of, 715
                to, 384                 Diskettes                      importance of, 672
             protecting against, 227–228  imaging of, for forensics investigation,  methods of, 719
             resource consumption attack, 59–60  642                   online resources used for, 721
             spam as, 60, 151             security concerns, 411, 417  summary of, 747, 751
             summary of, 91             Disposal                       training sessions used for, 719
             switches susceptibility to, 375  of DVDs, 620             user awareness through, 719–720
             SYN attack, 56, 60–61, 92    of printed materials, 696–697  802.1x
             wireless networks, 225–228   policies regarding, 695–697, 749  authentication, 188–191, 240
           Department-specific documents, 728  Distinguished name, 342  description of, 108–110
           Deregistration of certificate, 592  Distributed component object model  dynamic key derivation, 191
           Destruction                       remote procedure call service, 84  EAP, 111
             bulk demagnetizer for, 696  Distributed denial of service attack  mutual authentication, 191–192
             degausser for, 696           command structure of, 62     temporal key integrity protocol with,
             documentation regarding, 730–731  definition of, 363         232–233
             of data, 696                 denial of service attack vs., 64, 94  terminology associated with, 189
             of fixed media, 75           flow of, 64                  user identification, 191
             of key pairs, 592, 596–597   hosts involved in, 62        vulnerabilities, 111–113, 228
             of printed materials, 696–697  phases of, 61–62         802.3, 174
             policies regarding, 695–697, 749  progression of, 57    802.11
           Devaluation, of equipment, 607  software components of, 62  authentication in
           Devices                        zombies used in, 61–63, 363   mutual, 191–192
             firewalls. See Firewalls   Distributed RADIUS, 118         open, 186–187, 240
             overview of, 358–359       DNS. See Domain name system     per-packet, 192
             routers. See Routers       Documentation                   shared-key, 187–188, 199, 240
             servers. See Servers         change, 726, 751              spoofing of, 222
             switches, 374–376            classification of, 727–729, 751  control frames, 182
             workstations. See Workstations  creation of, 722          data frames, 182
           DHCP. See Dynamic host control  criteria for, 722           description of, 176
                protocol                  description of, 715          development of, 178
           Dial-in numbers, war dialing   destruction, 730–731         802.11a, 180–181, 238
                identification of, 382    in forensics investigation, 635  802.11b, 179–181, 238
           Dictionary-based attacks, 81   importance of, 672           802.11g, 180–181
           Differential backup, 732, 737–738, 752  inventories, 726–727  802.11i, 234
           Diffie–Hellman algorithm, 535–536  logs. See Log(s)         management frames, 182
           Diffie–Hellman key agreement standard,  of guidelines, 722–723  purpose of, 178–179
                577                       of standards, 722–723        traffic on, 182
           Diffie–Hellman key exchanges   retention, 729–730           wired equivalent privacy protocol. See
             description of, 25           storage, 729–730                Wired equivalent privacy
             man-in-the-middle attack     summary of, 751                 protocol
                vulnerabilities, 545      systems architecture, 724–726  El Gamal algorithm, 537
             mechanism of operation, 536  Domain name system         Electromagnetic interference
           Diffusion operations, 530      description of, 36, 137, 436  causes of, 627
           Digital certificates, 308–309, 565, 568,  dynamic, 510      description of, 406
                594. See also Certificate(s)  reverse lookups, 458     shielding to prevent against, 627
           Digital fingerprints, 539    Domain name system servers   Electrostatic discharge, 624–625
           Digital signature, 132, 543–544, 548  description of, 147  EM fields, 170–171
           Digital signature algorithm, 537  exploitation of, 506    E-mail
           Digital versatile disks, 410   hardening of, 505–506        auditing of, 753
   843   844   845   846   847   848   849   850   851   852   853