Page 856 - StudyBook.pdf
P. 856

840     Index

             definition of, 111, 185, 526, 534, 551  Telnet            loopback, 264
             vulnerability of, 203–205    backdoor version of, 87      spoofing of, 273
           Strong passwords, 692, 749     cleartext transmissions, 372  Usage patterns, auditing of, 713
           SubSeven Trojan, 88            description of, 11         User(s)
           Substitution operations, 530   disabling of, 38–41          adding of, to groups, 706–708
           Supplicant, 110                switch configuration, 376    awareness by, 717–719
           Supplicant port access entity, 189  Temporal key integrity protocol, 108,  communication with, 716–718
           Switched port analyzer, 374       232–233                   network events communicated to, 718
           Switches, 374–376, 414       Temporary cookies, 270         password change policies, 718
           Symmetric cryptography       Terminator, 401                vulnerabilities, 135
             authentication issues, 546  Test server, 303–304          wireless, 110
             encryption algorithms      Text messaging, 284–285      User accounts
              abundance of, 528         Thick coax, 402                auditing of, 713
              advanced encryption standard,  Thin coax, 401            description of, 612–614
                531–532                 Threads, 288                   escalation of use, 713–714
              asymmetric algorithms vs., 534–535  Threat(s)            privilege management using, 704–705
              brute-force attack susceptibility of,  identification of, 654–656  web, 256–257
                528, 550–551              insurance policies for, 655  User datagram protocol, 120
              data encryption standard, 529–530,  internal, 608      User-level authentication, 128
                551                       vulnerabilities and, 656   Username
              definition of, 528        Ticket granting ticket, 18     access control using, 612–614
              international data encryption  Timing-based attacks, 531  authentication uses of, 24-25
                algorithm, 531–532      Tokens                       UTP/STP cable, 404–407, 416, 627–628
              Rijndael algorithm, 531–532  description of, 25-26
              triple data encryption standard, 530,  SecurID, 693    V
                551                     Tracking, 5
             summary of, 548            Tracking cookies, 270        Valuation
           SYN attacks, 56, 60–61, 92   Transaction log, 33            of assets, 650
           System                       Transitive trust, 561          physical security considerations, 607
             architecture of, documentation about,  Transport layer security, 178, 272,  Vampire tap, 402–403
                724–726                      277–280                 VBScript, 302
             auditing of, 27–32         Trifluromethane, 630         VeriSign, 309
             definition of, 459         Triple data encryption standard, 530, 551  Vernam cipher, 547, 551
             security scanning of, 36-37  Trivial file transfer protocol, 366  Virtual directories, 257
             vulnerability scanning of, 77  Trojan horse             Virtual local area networks
           System hardening               accidental, 292              characteristics of, 447
             concepts of, 483–485         definition of, 688           description of, 445–447
             description of, 482          description of, 6–7, 85–86, 93  example of, 446
             file system, 485–487         firewall protection against, 361–362  network segmentation using, 445
             summary of, 515              SubSeven, 88                 reasons for using, 474
             tasks involved in, 483–485  Trust anchor, 563–564         segmenting of networks using,
             updates, 487–489           Trusted authority, 569–570        374–375
           System intrusion detection systems, 390  Tunnel, 114        switch splitting into, 446
                                        Tunneling, 450–451, 471–472  Virtual network computing, 87
           T                            Tunneling protocols          Virtual private dial-up network, 117
                                          carrier, 114               Virtual private network
           TACACS, 2, 120                 layer 2, 127–128, 161, 384, 676  benefits of, 114
           TACACS+                        point-to-point, 122–127, 161–162,  conceptual understanding of, 388–389
             description of, 120–121         384, 676                  creation of, 385
             RADIUS vs., 122              for site-to-site virtual private network,  definition of, 384
             summary of, 157                 116                       description of, 114
             vulnerabilities, 121–122   Two-factor authentication, 243, 676  firewalls, 116, 430
           Tagging                                                     IPSec, 116
             of assets, 650             U                              protocols used by
             of evidence, 641                                           description of, 384
           Tailgating, 619–620          Unclassified documents, 728     tunneling, 384–385
           T-connectors, 403            Uninterruptible power supplies, 743  remote access, 117, 385
           TCP                          Unsolicited bulk e-mail, 60, 150  remote access server vs., 418
             elements of, 60            Updates                        restricted access policies, 676
             SYN/ACK, 60–61               anti-virus software, 657–658  security considerations for, 386
           TCPDump, 79, 462               application, 500–501         setting up, 451
           TCP/IP                         firmware, 490                site-to-site
             hijacking of, 67–68          hotfixes, 488, 500            establishing of, 115–116
             principles of, 66            network, 490                  extranet-based, 385
             spoofing, 68–71              operating system, 488–489     intranet-based, 385
             three-way handshake used in, 66,  patches, 489             tunneling protocol for, 116
             workstation use of, 393–394  purpose of, 487              summary of, 156
           Telecommunications, 383–384    service packs, 488           tunneling, 451–452
                                        Upgrades, 315                  types of, 385
                                        URL                            wireless network access using, 230–232
   851   852   853   854   855   856   857   858