Page 858 - StudyBook.pdf
P. 858

842     Index

             infrastructure configuration of,  definition of, 84
                181–182                   examples of, 84–85
             MAC filtering used on, 198–199  firewall protection against, 95
             MAC layer, 174               MyDoom, 56
             management frames, 182       Nimda, 84
             message integrity code, 233–234  Sasser, 65, 84–85
             MITM attacks on, 199–200     SQL Slammer, 60, 84
             monitoring of, by hackers, 218  summary of, 93
             overview of, 168–169         Zotob, 85, 275, 657
             physical layer of, 173–174  Wrappers, 328
             security of                WTLS. See Wireless transport layer
              best practices for implementing,  security
                235–237
              measures for, 229–234     X
             signal loss, 170–171
             site surveys for, 229, 244, 246  X.509 certificate standard, 569–570
             spread spectrum technology used by,  XOR, 203
                171–173                 XTACACS, 120
             subnet used for, 230
             temporal key integrity protocol for,  Z
                232–233
             virtual private networks used for access  Zero-day attack, 82
                                        Zombies, 61–63, 363
                to, 230–232
             vulnerabilities of, 200–206, 242–244  Zones
                                          demilitarized
             weaknesses in, 215–217
           Wireless network cards, 377     bastion host, 434
                                           definition of, 432
           Wireless technology             description of, 230, 257, 398, 426
             acceptable use policy applicability to,  domain name services, 436
                683–684
             data encryption, 625          e-commerce and, 436
                                           e-mail relaying, 435
             description of, 376–377, 414  firewalls, 433–434
             security concerns for, 625–626  FTP services, 435, 504
             vulnerability concerns, 418
           Wireless telephony application, 177  hosts in, 434
                                           intrusion detection system in, 436
           Wireless transport layer security, 178,  layered, 433
                200–201
           WireShark, 79                   multiple interface, 433–434
                                           need for, 473
           WLAN. See Wireless local area networks  protections using, 433–434
           Work environment, hostile, 683  services hosted by, 435–436
           Workstations                    summary of, 470
             changing settings on, 677     word origin of, 432
             configuration of, 678        description of, 317
             definition of, 393, 677      security
             end users, 397                data storage zone, 438
             metasploit attack, 394–396    definition of, 436
             physical security of, 616     description of, 297–300, 429–432
             security policies for, 677–680  financial processing segment, 438
             servers vs., 397              needs and, 436–439
             summary of, 415               placement of, 439
             vulnerability of, 393–394
           Worm                         Zotob worm, 85, 275, 657
             Blaster, 84
             Code Red, 84
   853   854   855   856   857   858