Page 856 - StudyBook.pdf
P. 856
840 Index
definition of, 111, 185, 526, 534, 551 Telnet loopback, 264
vulnerability of, 203–205 backdoor version of, 87 spoofing of, 273
Strong passwords, 692, 749 cleartext transmissions, 372 Usage patterns, auditing of, 713
SubSeven Trojan, 88 description of, 11 User(s)
Substitution operations, 530 disabling of, 38–41 adding of, to groups, 706–708
Supplicant, 110 switch configuration, 376 awareness by, 717–719
Supplicant port access entity, 189 Temporal key integrity protocol, 108, communication with, 716–718
Switched port analyzer, 374 232–233 network events communicated to, 718
Switches, 374–376, 414 Temporary cookies, 270 password change policies, 718
Symmetric cryptography Terminator, 401 vulnerabilities, 135
authentication issues, 546 Test server, 303–304 wireless, 110
encryption algorithms Text messaging, 284–285 User accounts
abundance of, 528 Thick coax, 402 auditing of, 713
advanced encryption standard, Thin coax, 401 description of, 612–614
531–532 Threads, 288 escalation of use, 713–714
asymmetric algorithms vs., 534–535 Threat(s) privilege management using, 704–705
brute-force attack susceptibility of, identification of, 654–656 web, 256–257
528, 550–551 insurance policies for, 655 User datagram protocol, 120
data encryption standard, 529–530, internal, 608 User-level authentication, 128
551 vulnerabilities and, 656 Username
definition of, 528 Ticket granting ticket, 18 access control using, 612–614
international data encryption Timing-based attacks, 531 authentication uses of, 24-25
algorithm, 531–532 Tokens UTP/STP cable, 404–407, 416, 627–628
Rijndael algorithm, 531–532 description of, 25-26
triple data encryption standard, 530, SecurID, 693 V
551 Tracking, 5
summary of, 548 Tracking cookies, 270 Valuation
SYN attacks, 56, 60–61, 92 Transaction log, 33 of assets, 650
System Transitive trust, 561 physical security considerations, 607
architecture of, documentation about, Transport layer security, 178, 272, Vampire tap, 402–403
724–726 277–280 VBScript, 302
auditing of, 27–32 Trifluromethane, 630 VeriSign, 309
definition of, 459 Triple data encryption standard, 530, 551 Vernam cipher, 547, 551
security scanning of, 36-37 Trivial file transfer protocol, 366 Virtual directories, 257
vulnerability scanning of, 77 Trojan horse Virtual local area networks
System hardening accidental, 292 characteristics of, 447
concepts of, 483–485 definition of, 688 description of, 445–447
description of, 482 description of, 6–7, 85–86, 93 example of, 446
file system, 485–487 firewall protection against, 361–362 network segmentation using, 445
summary of, 515 SubSeven, 88 reasons for using, 474
tasks involved in, 483–485 Trust anchor, 563–564 segmenting of networks using,
updates, 487–489 Trusted authority, 569–570 374–375
System intrusion detection systems, 390 Tunnel, 114 switch splitting into, 446
Tunneling, 450–451, 471–472 Virtual network computing, 87
T Tunneling protocols Virtual private dial-up network, 117
carrier, 114 Virtual private network
TACACS, 2, 120 layer 2, 127–128, 161, 384, 676 benefits of, 114
TACACS+ point-to-point, 122–127, 161–162, conceptual understanding of, 388–389
description of, 120–121 384, 676 creation of, 385
RADIUS vs., 122 for site-to-site virtual private network, definition of, 384
summary of, 157 116 description of, 114
vulnerabilities, 121–122 Two-factor authentication, 243, 676 firewalls, 116, 430
Tagging IPSec, 116
of assets, 650 U protocols used by
of evidence, 641 description of, 384
Tailgating, 619–620 Unclassified documents, 728 tunneling, 384–385
T-connectors, 403 Uninterruptible power supplies, 743 remote access, 117, 385
TCP Unsolicited bulk e-mail, 60, 150 remote access server vs., 418
elements of, 60 Updates restricted access policies, 676
SYN/ACK, 60–61 anti-virus software, 657–658 security considerations for, 386
TCPDump, 79, 462 application, 500–501 setting up, 451
TCP/IP firmware, 490 site-to-site
hijacking of, 67–68 hotfixes, 488, 500 establishing of, 115–116
principles of, 66 network, 490 extranet-based, 385
spoofing, 68–71 operating system, 488–489 intranet-based, 385
three-way handshake used in, 66, patches, 489 tunneling protocol for, 116
workstation use of, 393–394 purpose of, 487 summary of, 156
Telecommunications, 383–384 service packs, 488 tunneling, 451–452
Upgrades, 315 types of, 385
URL wireless network access using, 230–232