[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] S/FTP (FTP with SSL encapsulation) S/MIME (Secure Multipurpose Internet Mail Extension) email data transmission SAFEsuite scanner SAINT scanner ( Security Administrator's Integrated Network Tool) SAINT Web site FTP vulnerability resources sanitization removable media discard method sanitizing data SANS.org Web site Information Security Reading Room 2nd top 20 security vulnerabilities vulnerabilities list SATAN scanner (Security Administrator's Tool for Analyzing Networks) scanners (vulnerability) Nessus NetRecon Nmap SAFEsuite SAINT SATAN Tiger Tools TigerSuite scoring exams scp function (SSH utility) screened host gateways 2nd screened subnet gateways 2nd secret data handling 2nd Secure Hash Algorithm (SHA/SHA-1) 2nd Secure Multipurpose Internet Mail Extension, [See S/MIME] Secure Multipurpose Internet Mail Extensions (S/MIME) Secure Shell utility, [See SSH utility] Secure Sockets Layer, [See SSL]2nd [See SSL] SecurID token (RSA Security) security topologies bastion -host firewall screened host gateways 2nd screened subnet gateways 2nd security baselines Domain 3.0 skill set (infrastructure security) 2nd security policies auditing developing 2nd disaster recovery plans acceptable use compliance disposal/destruction due care human resources incident reponse password management privacy risk assessment separation of duties Domain 5.0 skill set (operational/organizational security) 2nd exam practice questions security topologies Domain 3.0 skill set (infrastructure security) Security+ Exam, [See exams (Exam (SY0-101)] selecting backup strategies disaster recovery 2nd self-assessment candidate qualifications 2nd 3rd 4th 5th educational background 2nd 3rd hands-on experience 2nd 3rd 4th exam-readiness testing 2nd 3rd overview 2nd sensitive data handling 2nd sensitivity labels (MAC) 2nd separation of duties security policy planning server security policies servers attack vulnerabilities FTP vulnerabilities 2nd 3rd 4th 5th 6th 7th protocols removing required protocols determining 2nd roles application establishing 2nd file FTP logon network services news Use (NNTP) Web security measures RAID (Redundant Array of Inexpensive Disks) uninterruptible power supply (UPS) services removing services critical establishing 2nd data repositories hardening measures DHCP services hardening measures DNS services hardening measures email services hardening measures file services hardening measures 2nd FTP services hardening measures NTTP services hardening measures print services hardening measures 2nd required establishing 2nd servers removing Web services hardening measures session hijacking attacks WLANs shielding Faraday cage 2nd TEMPEST (Transient Electromagnetic Pulse Emanation Standard) shoulder surfing attacks signatures (biometrics) signed applets (Java) 2nd Simple Mail Transport Protocol, [See SMTP]2nd [See SMTP] Simple Network Management Protocol, [See SNMP]2nd [See SNMP] Simpsons (Trojan horse) single sign-on (SSO) access control measure 2nd site surveys wireless networks poor planning 2nd protection measures skill sets (exams) Domain 1.0 (general security concepts) access control attacks auditing authentication malicious code social engineering Domain 2.0 (communication security) directories file transfers remote access Web data transmission wireless networks Domain 3.0 (infrastructure security) devices 2nd intrusion detection media security baselines 2nd security topologies Domain 4.0 (cryptography basics) algorithms certificate lifecycles 2nd key management 2nd PKI standards/protocols Domain 5.0 (operational/organizational security) business continuity disaster recovery documentation education forensics physical security privilege management risk identification security policies 2nd weighted scoring averages 2nd slogin function (SSH utility) smartcards device usage information discard options integrated circuit cards (ICCs) stored value type SMTP (Simple Mail Transport Protocol) 2nd Relay agents spamming attacks 2nd Smurf attack (DoS) Sniffer Wireless WLAN monitoring tool sniffers replay attacks SNMP (Simple Network Management Protocol) 2nd security measures 2nd TCP/IP statistics 2nd versions 2nd social engineering attackers common tactics 2nd common examples 2nd Domain 1.0 skill set (general security concepts) management training reverse scenarios 2nd 3rd tiger teams vulnerability testing user training software architectural documentation change documentation impact assessments 2nd updates network hardening measure software exploitation attacks software requirements PrepLogic Practive Tests Sophos Antivirus Web site spam Web sites Mail-Abuse.org Spam Primer spam (email) handling 2nd open SMTP relays 2nd Spam Primer Web site spoofing IP addresses 2nd SSH protocol as alternative to Telnet protocol SSH utility (Secure Shell) Blowfish encryption DES encryption IDEA encryption remote access issues Blowfish encryption DES encryption IDEA encryption scp function slogin function SSH.com Web site SSL (Secure Sockets Layer) (Secure Sockeys Layer) asymmetric key communication cipher strengths Linux Slapper worm protocol vulnerabilities 2nd remote access issues stateful connections standards Domain 4.0 skill set (cryptography basics) 2nd 3rd 4th 5th stateful-inspection firewalls Stoned virus stored value smartcards STP ( shielded twisted-pair) cable security vulberabilities stream ciphers symmetric key algorithms string signatures network-based IDS Sub7 program back door attacks SubSeven program back door attacks Super Digital Linear Tape (DLT) Super DLT (Digital Linear Tape) suspended digital certificates switches frame filtering loop prevention MAC addresses OSI Data Link layer Symantec Antivirus Web site symmetric key algorithms Advanced Encryption Standard (AES) block ciphers Blowfish Encryption Algorithm comparison chart 2nd Data Encryption Standard (DES) International Data Encryption Algorithm (IDEA) Rivest Cipher (RC2/RC4/RC5/RC6) stream ciphers Triple Data Encryption Standard (3DES) versus asymmetric key algorithms bit strength 2nd symmetric keys Kerberos authentication 2nd process 2nd SYN flood attack (DoS) |