Page 854 - StudyBook.pdf
P. 854
838 Index
subordinate certificate authority, Remote access virtual private network, access control lists, 371
563–564 117, 385 Cisco, 371
non-Web uses of, 559 Remote authentication dial-in user definition of, 138, 371
principles of, 558–559 service. See RADIUS purpose of, 138
registration authorities, 565–566 Remote control, 105 security capabilities of, 372
single certificate authority model, Remote copy protocol, 331 spoofed packets blocked using,
562–563, 596 Removable media 372–373
summary of, 595 definition of, 400, 408 summary of, 414
trust models diskettes, 411, 417 Routing information protocol, 373
description of, 559–560 flashcards, 411–412, 417 Routing protocols, 373
summary of, 596 hard drives, 410–411, 416 Routing table, 371
Web-of-trust model, 561–562, 596 magnetic tape, 408–409, 416 Rule of least privilege, 483, 485
Public-key cryptography physical security of, 616–617 Rule-based access control, 9
description of, 533 recordable compact disks, 409–410,
standards, 576–578 416 S
Smart Cards, 412–413, 417, 582
Q summary of, 416 SafeBack, 645–646
types of, 408 Sandboxing, 292
QAZ Trojan horse, 86 Renewal of certificate, 585, 591, 595 SAP. See Service advertising protocol
Quadrature phase shift keying, 180 Replacement costs, 650 Sasser worm, 65, 84–85
Replay, 19 SCP. See Secure copy protocol
R Replay attacks, 68, 121 Screensavers, password-protected,
Resource consumption attack, 59–60 611–612
Radio frequency communications, Restricted access policies, 676–677 Script(s)
170–171 common gateway interface
Radio frequency interference Retention policies for data, 729–730 description of, 323–325
Revocation of certificate
causes of, 627 list of, 575–576, 587–588 exploiting of, 326–328, 350
description of, 406 notifications after, 574–575 Nikto program for assessing,
shielding to prevent, 627 328–329
RADIUS, 190 online certificate status protocol, 576, uses for, 325–326
588
authentication process, 118–119 reasons for, 574, 586 weak, break-ins caused by, 326–328
background of, 117–118 request for, 587 secure, 306–308
distributed, 118 status checking, 587–588 server-side, 306–308
key management using, 245 users alerted of, 596 “Script kiddies,” 106
protocols supported by, 118 RFC 3127, 4 Scripting
summary of, 157 RFI. See Radio frequency interference client-side, 302
TACACS+ vs., 122 RG-58, 401 server-side, 302
vulnerabilities, 119 vulnerabilities, 260–261
RAID, 745–746, 754 Rijndael algorithm, 531–532 Secret handshake, 11
Risk
RAS. See Remote access servers annual loss expectancy calculations, Secret key, 11, 528
Rate doubling, 180 652–654, 661 Secure checksums, 539
RBAC annualized rate of occurrence Secure copy protocol, 331–332
definition of, 8 calculations, 652, 661 Secure FTP, 254
description of, 9-10, 45, 714–715, 750 definition of, 647, 659 Secure hash algorithm, 540
example of, 8 disaster as, 648, 740 Secure Internet protocol. See IPSec
summary of, 8–9 Secure scripts, 306–308
RC4 encryption algorithm external, 648 Secure shell protocol
internal, 648
description of, 111, 185 Risk assessment, 651–654 definition of, 129
vulnerability of, 202–203, 239 implementation of, 537
RCP. See Remote copy protocol Risk identification mechanism of operation, 129
asset identification, 649–651, 661
Realm, 16 definition of, 648 purpose of, 129
Record keeping, 681 summary of, 661 SSH-1, 545
Recordable compact disks, 409–410, 416 Risk management, 659 SSH-2, 545
Redundant arrays of inexpensive disks. Risk mitigation, 432 summary of, 157
See RAID Secure sockets layer
Registered ports, 362 Rivest, Shamir, & Adleman applications of, 277
algorithm, 536–537
Registration authorities, 565–566 cryptography standard, 577 banking industry use of, 25
Remote access, 105 RJ-11 connector, 405 data transmission, 276–277
Remote access security RJ-45 connector, 405 description of, 12, 178, 276–277
description of, 107–108 Rogue access points, 224, 243 handshake protocol, 278
limitations in, 107 Rogue web server, 263–268 HTTP/S, 279–280
summary of, 135–136, 156–160 Role definition, 8 lightweight directory access protocol
vulnerabilities, 143–155 over, 344
Remote access servers Role-based access control, 9, 714. See also mechanism of, 277
RBAC
authentication for, 381 Roles, for access control, 705 protocols, 278
description of, 378, 381, 414–415 Root, 340 record protocol, 278
mandatory callback, 381–382 Root certificate authority, 563–564, 591 TCP/IP hijacking attacks prevented
security of, 382–383 Root server, 340 using, 67
virtual private network vs., 418 Secure/multi-purpose Internet mail
Rootkits, 86, 94
Routers extensions. See S/MIME