[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Hack Attacks Denied 2nd 3rd Hack Attacks Revealed hackers war driving (wireless networks) Hackers Beware Hacking Exposed hand/palm geometry (biometrics) hard drives storage guidelines hardening applications updates/patches networks access control 2nd disabling unnecessary protocols/services 2nd firewalls guidelines hardware updates remote access control software updates operating systems guidelines 2nd services data respositories DHCP servers DNS servers email servers file servers 2nd FTP servers NNTP servers print servers 2nd Web servers hardware architectural documentation change documentation impact assessments 2nd updates network hardening measure hash algorithms Message Digest Series Algorithm (MD2/MD4/MD5) 2nd Message RIPEMD-160 hash algotihms 2nd Secure Hash Algorithm (SHA/SHA-1) 2nd header signatures network-based IDS hierarchical CA model (Certificate Authorities) highjacking attacks hoaxes (email) Honeynet.org Web site honeynets (IDS) function of honeypots (IDS) function of host-based IDS strengths 2nd 3rd host-based IDSs 2nd How Stuff Works Web site cryptographic resources HTTP (Hypertext Transfer Protocol) TCP port 80 versus HTTPS HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer) encryption levels port designation human resources security policy planning Hunt tool man-in-the-middle attacks Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) Hypertext Transfer Protocol over Secure Sockets Layer, [See HTTPS] Hypertext Transfer Protocol, [See HTTP] |