Page 850 - StudyBook.pdf
P. 850
834 Index
stateful inspection, 369, 414 G Hashed password, 80
summary of, 414 Hashing, 539–540
virtual private network, 116, 430 Gateways, 322 Hashing algorithms, 534, 538–540
web site monitoring using, 688–689 Global key, 191 Health Insurance Portability and
worm protection using, 95 Gramm–Leach–Bliley Act, 687 Accountability Act, 105, 687
Firmware updates, 490 Grandfather-Father-Son rotation scheme Heptafluoropropane, 630
First responder, to incident, 637–638 for backups, 733–734, 752 Hermes chipset, 196
Fixed media, 75. See also specific media Graphical user interface, 115 High availability, 744–746, 753
Flashcards, 411–412, 417 “Gray-hat” hackers, 119 Hijacking
Flooding Groups network, 223–225
definition of, 59 privilege management using, 704–705 session, 67–68
protecting against, 227–228 users added to, 706–708 TCP/IP, 67–68
SYN floods, 60–61 Groups concept, 7 HINFO records, 505
wireless network, 225–228 Guest account, 704 Hoaxes, e-mail, 152, 159
Floppy disks. See Diskettes Guest books, 326 Honeynets
Fluhrer, Mantin, and Shamir attack, 112, Guidelines, 722–723 characteristics of, 466
202 definition of, 390, 464, 467
Forensically sterile media, 643–644 H information resources about, 467
Forensics. See also Incident(s) Honeypots
components of, 634 H SCP, 254 benefits of, 473
definition of, 631 Halon, 629–630 characteristics of, 466
description of, 630–631, 634 Handshake definition of, 390, 464, 467
documentation involved in, 635 definition of, 129 indications for, 467
employee awareness of, 632–634 secret, 11 information resources about, 467
procedures for, 631, 643–644 secure sockets layer, 278 installation of, 468
summary of, 659–661 Hard drives schematic diagram of, 465
Forensics investigation description of, 410–411, 416 Hostile work environment, 683
chain of command at, 639 destruction of, 696 Hot site, 738
crime scene technician, 639–640 Hardening Hot swapping, 746, 754
evidence used in. See Evidence application Hotfixes, 488, 500
first responder, 637–638 description of, 482, 499–500 HTML, 136, 503
investigator, 638–639, 661–662 hotfixes, 500 HTTP/S, 279–280
persons involved in, 636–640 patches, 501 Human resources policies, 697–699, 749
Fork bomb, 58 service packs, 501 Hunt, 67
Fortezza algorithms, 278 summary of, 516 Hyperlink spoofing, 272–273
Forward confirmed reverse domain name updates, 500–501
system, 147 databases, 512–514 I
Frequency hopping spread spectrum, description of, 314
172–173, 241 directory services, 510–511 ICMP. See Internet control messaging
Fresnel zone, 170 DNS servers, 505–506 protocol
FTP dynamic host control protocol servers, Identification card, 609
active, 330, 347 508–509 Identity spoofing, 134–135
anonymous connections, 332–333 e-mail server, 503–504 IDS. See Intrusion detection systems
blind, 332–333 file servers, 506–508 IEEE
definition of, 330 FTP server, 504–505 description of, 108, 722–723
demilitarized zone, 435, 504 network 802.3 standard, 174, 176
description of, 8, 11, 254 concepts of, 483–485 802.11 standard. See 802.11
modes of, 364 configuration, 490–492 IETF, 130, 722–723
packet sniffing, 335–338 description of, 482, 489–490 IGMP. See Internet group management
passive, 330–331, 347 enabling and disabling of services protocol
ports for, 333, 363–364 and protocols, 492–498 Incident(s). See also Forensics
proxy, 334 firmware updates, 490 awareness of, 632–634
security concerns, 350 summary of, 515–516 business reputation effects, 648–649
S/FTP, 331 tasks involved in, 483–485 contingency plan for, 633–634
summary of, 347–348 vulnerability scanning, 494–498 definition of, 700
trivial, 366 network access control, 511–512 employee understanding of, 634–636
FTP servers NNTP servers, 506 investigation after occurrence of. See
description of, 334, 435 print servers, 506–508 Forensics investigation
hardening of, 504–505 system Incident response
FTP sharing, 333–334 concepts of, 483–485 description of, 469
Full backup, 732, 734–737, 752 description of, 482 first responder, 637–638
Function calls, 312 file system, 485–487 persons involved in, 636–640
summary of, 515 policies for, 632, 699–704, 750
tasks involved in, 483–485 Incident response team
updates, 487–489 investigator, 638–639, 661–662
web server, 501–503 IT staff assigned to, 636
Hardware key storage, 580–583, 597 notification of, 632–633
Hardware storage modules, 582 Incremental backup, 732, 737, 752
Hardware-based network access control, Inergen, 630
512 Informed spoofing, 69
Hash function, 538 Infrastructure-based network access
Hash value, 538 control, 511