Page 849 - StudyBook.pdf
P. 849

Index     833

                definition of, 136             symmetric algorithms vs., 534–535  Evidence log, 641
                digital certificate for securing of, 572  definition of, 527  Expiration of certificate, 574, 579, 585,
                encryption of, 12, 138, 158  RC4                              586f, 595
                format of, 136–137             description of, 111, 185  Extended access lists, 371
                MIME format, 138–139, 158      vulnerability of, 202–203  Extended TACACS. See XTACACS
                mobility issues, 147–148     symmetric                   Extended-certificate syntax standard, 577
                packets, 138                   abundance of, 528         Extensible authentication protocol
                PGP encryption of, 140–142, 158, 162  advanced encryption standard,  description of, 381
                phishing attacks, 73–74, 152–155, 622  531–532            over LAN, 189–190
                “preview” pane for, 149        asymmetric algorithms vs., 534–535  over wireless, 189–190
                principles of, 137–138         authentication issues, 546  per-packet authentication supported
                privacy policies regarding, 688, 753  brute-force attack susceptibility of,  by, 192
                security of, 136–138             528, 550–551            Extensible authentication protocol-
                signatures on, 717             data encryption standard, 529–530,  transport layer security, 109, 111
                simple mail transfer protocol, 138–139  551              Extensible authentication protocol-
                S/MIME format, 138–139, 158, 162  definition of, 528          tunneled transport layer security,
                SMTP relay vulnerabilities, 143–146,  international data encryption  109
                   158                           algorithm, 531–532      Extranet
                spam. See Spam                 Rijndael algorithm, 531–532  description of, 443–445, 471
                spoofing of, 71–73, 146–147    summary of, 548            Internet vs., 473–474
                summary of, 158                triple data encryption standard, 530,  intranet vs., 473–474
                unsolicited bulk, 150            551
                viruses and, 148–150, 158–159  uses of, 534              F
                vulnerabilities of, 143–155  Endpoint-based network access control,
              E-mail hoaxes, 152, 159            512                     Facility site, alternate, 738–740
              E-mail relaying, 435         Entrapment, 465–466           False positives and negatives, from
              E-mail servers, 136–137, 148, 503–504  Environment              intrusion detection systems,
              EMI. See Electromagnetic interference  air quality, 624–625, 662  468–469
              Employee(s)                    definition of, 623          Fault tolerance, 744–746
                acceptable use policies for, 682–685,  description of, 622–623  Fax servers, 378
                   699, 749                  electrostatic discharge, 624–625  Feedback forms, 326
                as assets, 649, 651          fire suppression considerations,  Feistel cycles, 529
                communication with, 716–718      629–630                 Fiber-optic cabling, 407, 416, 419, 629
                education of                 geographic location considerations, 626  File servers, 506–508
                 about physical security, 619–620  location considerations, 626–627  File systems, 410, 485–487
                 about social engineering threats, 621  restricted access policies, 677  File transfer protocol. See FTP
                human resources policies, 697–699,  temperature concerns, 623–624  File traversal, 503
                   749                     Equipment. See also specific equipment  Financial processing segment, 438
                injury to, disaster recovery plan in  destruction of. See Destruction  Fingerprints
                   event of, 740–741         devaluation of, 607          biometric identification using, 26, 618
                privacy policies for, 687–689, 753  disposal of. See Disposal  digital, 539
                security level for, 699      due care policies for use of, 685–687  Fire suppression, 629–630
                separation of duties policies, 689–690  location for     Firewalls
              Encapsulated security protocol, 116, 132  centralized, 608, 615  access control lists as, 498
              Encapsulating, 114               geographical considerations,  applet filtering using, 305
              Encapsulating protocol, 114        626–627                  application layer gateways, 360,
              Encase, 646                      raised, 626                    367–368, 414, 418
              Encrypted passwords, 539       maintenance of, 686          auditing uses of, 711
              Encryption                     personal, 678–679            circuit level, 360
                cryptography vs., 541        photographing of, 646–647    Cisco PIX, 433
                data                         replacement costs for, 650   configuration of, 276
                 magnetic tape, 409          temperature concerns for, 623–624  “deep packet inspection,” 360
                 in mobile devices, 400, 625  Escrow, key, 583–585        definition of, 359, 428
                 on flashcards, 412        ESD. See Electrostatic discharge  demilitarized zone, 433–434
                 on servers, 399           Ettercap, 13–16                denial of service attack susceptibility
                 wireless network, 175–176, 625–626  Evidence                 of, 363
                definition of, 526–527, 541  at-scene management of, 640–641  installation of, 430
                e-mail, 138, 158             chain of custody for, 639–641  intranet, 442
                hard drive, 410              collection of, 639, 645–647  intrusion detection systems with, 430
                on servers, 399              copying of data, 643         limitation of, 452
                PGP, 140–142, 158, 162       disk imaging, 642            NAT, 449
                public key, 537              gathering of, 632            packet-filtering
                tunneling and, 451           log of, 641                    advantages and disadvantages of, 366
              Encryption algorithms          photographing of, 646          “allow by default,” 361
                asymmetric                   preservation of, 637–638, 641–645  “deny by default,” 361
                 authentication issues, 546–547  procedures for, 643–644    description of, 360
                 description of, 533–535     sealing of, 639                summary of, 414
                 Diffie–Hellman algorithm, 535–536  storage of, 640–641   port. See Port
                 El Gamal algorithm, 537     tagging of, 641              purpose of, 359, 430
                 Rivest, Shamir, & Adleman   transportation of, 639–640, 663  script filtering using, 305
                   algorithm, 537            volatile data. See Volatile data  server protection using, 398
                 summary of, 548           Evidence file, 642             spoofing prevention using, 69
   844   845   846   847   848   849   850   851   852   853   854