Page 858 - StudyBook.pdf
P. 858
842 Index
infrastructure configuration of, definition of, 84
181–182 examples of, 84–85
MAC filtering used on, 198–199 firewall protection against, 95
MAC layer, 174 MyDoom, 56
management frames, 182 Nimda, 84
message integrity code, 233–234 Sasser, 65, 84–85
MITM attacks on, 199–200 SQL Slammer, 60, 84
monitoring of, by hackers, 218 summary of, 93
overview of, 168–169 Zotob, 85, 275, 657
physical layer of, 173–174 Wrappers, 328
security of WTLS. See Wireless transport layer
best practices for implementing, security
235–237
measures for, 229–234 X
signal loss, 170–171
site surveys for, 229, 244, 246 X.509 certificate standard, 569–570
spread spectrum technology used by, XOR, 203
171–173 XTACACS, 120
subnet used for, 230
temporal key integrity protocol for, Z
232–233
virtual private networks used for access Zero-day attack, 82
Zombies, 61–63, 363
to, 230–232
vulnerabilities of, 200–206, 242–244 Zones
demilitarized
weaknesses in, 215–217
Wireless network cards, 377 bastion host, 434
definition of, 432
Wireless technology description of, 230, 257, 398, 426
acceptable use policy applicability to, domain name services, 436
683–684
data encryption, 625 e-commerce and, 436
e-mail relaying, 435
description of, 376–377, 414 firewalls, 433–434
security concerns for, 625–626 FTP services, 435, 504
vulnerability concerns, 418
Wireless telephony application, 177 hosts in, 434
intrusion detection system in, 436
Wireless transport layer security, 178, layered, 433
200–201
WireShark, 79 multiple interface, 433–434
need for, 473
WLAN. See Wireless local area networks protections using, 433–434
Work environment, hostile, 683 services hosted by, 435–436
Workstations summary of, 470
changing settings on, 677 word origin of, 432
configuration of, 678 description of, 317
definition of, 393, 677 security
end users, 397 data storage zone, 438
metasploit attack, 394–396 definition of, 436
physical security of, 616 description of, 297–300, 429–432
security policies for, 677–680 financial processing segment, 438
servers vs., 397 needs and, 436–439
summary of, 415 placement of, 439
vulnerability of, 393–394
Worm Zotob worm, 85, 275, 657
Blaster, 84
Code Red, 84