Page 855 - StudyBook.pdf
P. 855

Index     839

              SecurID tokens, 693          Session keys, 129, 536         wardriving, 195–196
              Security. See Physical security; Remote  SFTP. See Simple file transfer protocol  web server, 255
                   access security; specific discussion  S/FTP, 331      Software key storage, 580–583, 597
              Security levels for employees, 699  Shared-key authentication, 187–188, 199,  Software patches, 135, 314–316
              Security patches, 135, 314–316     240                     Source routing, 69
              Security policies            Shared-secret encryption, 528  Spam
                objective of, 675          Shielding, 627–629             definition of, 150
                personal equipment, 678–679  Short message service, 284–285  as denial of service attack, 60, 151
                physical, 680–681          Shredding of documents, 697    origins of, 150–151
                restricted access, 676–677  S-HTTP, 280–281               prevention methods for, 151
                workstations, 677–680      Side-channel attacks, 531      SMTP relay, 146
              Security procedures, 682     Signature                      summary of, 159
              Security topologies            attack, 389–390, 456         word origin of, 150
                demilitarized zone. See Demilitarized  definition of, 459  Spam filters, 151, 159
                   zone                      digital, 132, 543–544, 548  Spoofed packets, 372–373
                description of, 427–428      e-mail, 717                 Spoofing
                summary of, 471–472        Signature algorithms, 534      address resolution protocol, 70–71,
              Security zones               Signature files, 150               223, 225, 375–376
                data storage zone, 438     Simple certificate revocation list, 575, 587  authentication, 222, 226
                definition of, 436         Simple file transfer protocol, 331  blind, 69
                description of, 297–300, 429–432  Simple mail transfer protocol, 138–139  definition of, 68, 221, 272
                financial processing segment, 438  Simple mail transfer protocol relay,  description of, 19
                needs and, 436–439               143–146, 158             e-mail, 71–73, 146–147
                placement of, 439          Simple network management protocol,  hyperlink, 272–273
              Self-signed certificate, 559–560, 564  239                  identity, 134–135
              Sendmail, 144–145            Single certificate authority model,  informed, 69
              Separation of duties, 689–690, 749  562–563, 596            IP, 68–71
              Sequenced packet exchange, 493  Single loss expectancy, 652, 661  MAC address, 113, 222, 243
              Serial line Internet protocol, 19  Single sign-ons, 708–709, 750  prevention of, 69
              Servers                      Site surveys, 229, 244, 246    reasons for, 222
                attack focus on, 398       Site-to-site extranet-based virtual private  summary of, 92
                authentication, 110              network, 385             Web, 272–275
                centralizing of, 608, 709–710, 750  Site-to-site intranet-based virtual private  web site, 73
                data encryption on, 399          network, 385             wireless networks, 198, 221–223
                database, 512              64-bit key, 206, 245          Spread spectrum
                decentralization of, 710   SkipJack, 585                  definition of, 171
                definition of, 397         SLIP. See Serial line Internet protocol  direct sequence, 173, 238, 242
                domain name system, 147    Smart Cards, 24, 412–413, 417, 582  frequency hopping, 172–173, 241
                dynamic host control protocol,  S/MIME, 138–139, 158, 162  Spreading ratio, 173
                   508–509, 517            SMS. See Short message service  SPX. See Sequenced packet exchange
                e-mail, 136–137, 503–504   SMTF. See Simple mail transfer protocol  Spyware, 89–90, 94
                environment considerations for, 624  Smurf attack, 60    SQL server, 513
                file, 506–508              Sniffing                      SQL Slammer worm, 60, 84
                firewall protection for, 398  definition of, 217         SSH. See Secure shell protocol
                FTP, 334, 435, 504–505       description of, 79, 122, 374, 393  Sshmitm, 134
                key recovery, 589            of wireless networks, 217–221  SSID. See Service set identifier
                location for, 608, 626–627   packet                      SSL. See Secure sockets layer
                NNTP, 506                      cleartext passwords, 13–16  Standards, 722–723. See also specific
                physical security considerations for,  description of, 122    standard
                   607–608                     FTP transmissions, 335–338  Star topology, 405, 406f
                print, 506–508                 lightweight directory access  Stateful inspection firewalls, 369, 414
                proxy, 443                       protocol, 344           Static electricity, 624–625
                purpose of, 397–398          protection against, 221     Static network address translation, 447
                remote access. See Remote access  Snort, 462             Static routes, 373
                   servers                 Social engineering            Status checking
                restricted access policies, 677  definition of, 620       for certificate revocation, 587–588
                SQL, 513                     description of, 75–77, 92, 95  for certificate suspension, 588
                storage considerations for, 624  methods used in, 621    Steganography, 541
                summary of, 415              phishing, 73–74, 622        Storage
                threat identification for, 655  protections against, 621  of backups, 735, 754
                vulnerabilities of, 398    Socket creep, 624              of data, 729–730
                web. See Web server        Software                       of evidence, 640–641
                workstations vs., 397        anti-virus                   of private keys, 580–583, 597
              Server-side scripting, 302, 324  real-time scans by, 149    of software, 617–618
              Server-side scripts, 306–308     updates, 657–658           offsite, of backups, 735, 754
              Service advertising protocol, 493  exploitation of, for attacks, 65–66  policies regarding, 729–730
              Service level agreements, 694–695, 749  intrusion detection systems, 453  Storage area network, 509–510
              Service packs, 488, 501, 658, 663  pirated, 688            Store-and-forward, 439
              Service set identifier, 182, 236, 239, 246  privacy policy-authorized audit of, 688  STP cable. See UTP/STP cable
              Session hijacking, 67–68       secure storage of, 617–618  Stream ciphers
   850   851   852   853   854   855   856   857   858