Page 854 - StudyBook.pdf
P. 854

838     Index

              subordinate certificate authority,  Remote access virtual private network,  access control lists, 371
                563–564                      117, 385                  Cisco, 371
             non-Web uses of, 559       Remote authentication dial-in user  definition of, 138, 371
             principles of, 558–559          service. See RADIUS       purpose of, 138
             registration authorities, 565–566  Remote control, 105    security capabilities of, 372
             single certificate authority model,  Remote copy protocol, 331  spoofed packets blocked using,
                562–563, 596            Removable media                   372–373
             summary of, 595              definition of, 400, 408      summary of, 414
             trust models                 diskettes, 411, 417        Routing information protocol, 373
              description of, 559–560     flashcards, 411–412, 417   Routing protocols, 373
              summary of, 596             hard drives, 410–411, 416  Routing table, 371
              Web-of-trust model, 561–562, 596  magnetic tape, 408–409, 416  Rule of least privilege, 483, 485
           Public-key cryptography        physical security of, 616–617  Rule-based access control, 9
             description of, 533          recordable compact disks, 409–410,
             standards, 576–578              416                     S
                                          Smart Cards, 412–413, 417, 582
           Q                              summary of, 416            SafeBack, 645–646
                                          types of, 408              Sandboxing, 292
           QAZ Trojan horse, 86         Renewal of certificate, 585, 591, 595  SAP. See Service advertising protocol
           Quadrature phase shift keying, 180  Replacement costs, 650  Sasser worm, 65, 84–85
                                        Replay, 19                   SCP. See Secure copy protocol
           R                            Replay attacks, 68, 121      Screensavers, password-protected,
                                        Resource consumption attack, 59–60  611–612
           Radio frequency communications,  Restricted access policies, 676–677  Script(s)
                170–171                                                common gateway interface
           Radio frequency interference  Retention policies for data, 729–730  description of, 323–325
                                        Revocation of certificate
             causes of, 627               list of, 575–576, 587–588     exploiting of, 326–328, 350
             description of, 406          notifications after, 574–575  Nikto program for assessing,
             shielding to prevent, 627                                    328–329
           RADIUS, 190                    online certificate status protocol, 576,  uses for, 325–326
                                             588
             authentication process, 118–119  reasons for, 574, 586     weak, break-ins caused by, 326–328
             background of, 117–118       request for, 587             secure, 306–308
             distributed, 118             status checking, 587–588     server-side, 306–308
             key management using, 245    users alerted of, 596      “Script kiddies,” 106
             protocols supported by, 118  RFC 3127, 4                Scripting
             summary of, 157            RFI. See Radio frequency interference  client-side, 302
             TACACS+ vs., 122           RG-58, 401                     server-side, 302
             vulnerabilities, 119                                      vulnerabilities, 260–261
           RAID, 745–746, 754           Rijndael algorithm, 531–532  Secret handshake, 11
                                        Risk
           RAS. See Remote access servers  annual loss expectancy calculations,  Secret key, 11, 528
           Rate doubling, 180                652–654, 661            Secure checksums, 539
           RBAC                           annualized rate of occurrence  Secure copy protocol, 331–332
             definition of, 8                calculations, 652, 661  Secure FTP, 254
             description of, 9-10, 45, 714–715, 750  definition of, 647, 659  Secure hash algorithm, 540
             example of, 8                disaster as, 648, 740      Secure Internet protocol. See IPSec
             summary of, 8–9                                         Secure scripts, 306–308
           RC4 encryption algorithm       external, 648              Secure shell protocol
                                          internal, 648
             description of, 111, 185   Risk assessment, 651–654       definition of, 129
             vulnerability of, 202–203, 239                            implementation of, 537
           RCP. See Remote copy protocol  Risk identification          mechanism of operation, 129
                                          asset identification, 649–651, 661
           Realm, 16                      definition of, 648           purpose of, 129
           Record keeping, 681            summary of, 661              SSH-1, 545
           Recordable compact disks, 409–410, 416  Risk management, 659  SSH-2, 545
           Redundant arrays of inexpensive disks.  Risk mitigation, 432  summary of, 157
                See RAID                                             Secure sockets layer
           Registered ports, 362        Rivest, Shamir, & Adleman      applications of, 277
                                          algorithm, 536–537
           Registration authorities, 565–566  cryptography standard, 577  banking industry use of, 25
           Remote access, 105           RJ-11 connector, 405           data transmission, 276–277
           Remote access security       RJ-45 connector, 405           description of, 12, 178, 276–277
             description of, 107–108    Rogue access points, 224, 243  handshake protocol, 278
             limitations in, 107        Rogue web server, 263–268      HTTP/S, 279–280
             summary of, 135–136, 156–160  Role definition, 8          lightweight directory access protocol
             vulnerabilities, 143–155                                     over, 344
           Remote access servers        Role-based access control, 9, 714. See also  mechanism of, 277
                                             RBAC
             authentication for, 381    Roles, for access control, 705  protocols, 278
             description of, 378, 381, 414–415  Root, 340              record protocol, 278
             mandatory callback, 381–382  Root certificate authority, 563–564, 591  TCP/IP hijacking attacks prevented
             security of, 382–383       Root server, 340                  using, 67
             virtual private network vs., 418                        Secure/multi-purpose Internet mail
                                        Rootkits, 86, 94
                                        Routers                           extensions. See S/MIME
   849   850   851   852   853   854   855   856   857   858