| < Free Open Study > |
|
WAP (Wireless Application Protocol), 81
Warehouses, data warehouses, 267-268
W98.CIH virus, 341, 353
Weak key attacks, 45
Web farms, 210
Web mining, 269-270, 292, 297
Web-of-trust, 175-176
Web resources
active content, troubleshooting, 73-74
applets, information about, 72
applications and systems development, 300
Cisco (security monitoring information), 41
CISSP Code of Ethics, 216
COAST (Computer Operations, Audit, and Security Technology), 318
communications security sites, 91
CompTIA Web site, 8, 13
Computer Ethics Institute, 312
cryptography information, 190-191
for current security trends, 11
forensics, 223
fraud prevention, 309
general security information sites, 53-54
GFS backup strategy, 204
hijacking information, 39
hoax investigation, 64
IEEE 802 specifications, 94-95
incident response handling, 216
infrastructure security sites, 91
JTM multimedia site, 53
law-related sites, 305
legal and criminal information, 329
MSDN Web site, 26
network security information, 211
operational / organizational security information, 244-245
RSA security, 162
SANS Institute, 53
security terms and explanations, 20
spam laws, 259
Symantec, 134
Symantec virus information, 343
Symantec worm removal tools, 344
terrorism, obstruction of, 307
Thompson/Prometric site, 13
VeriSign, Inc., 173
virus information, 337, 343-344, 352, 360-361
VUE registration site, 13
wireless LANs, 61
Web security, 89-90, 189
ActiveX, 73-74
applets and, 72-73
CGI (Common Gateway Interface), 74-75
cookies, 69-71
hardening web servers, 257-258, 291
HyperText Transport Protocol Secure (HTTPS), 65-66
Instant Messaging (IM), 66-67, 83, 87-88
JavaScript, 71-72
privacy and confidentiality, 69-70
Secure Sockets Layer (SSL), 65
SMTP (Simple Mail Transfer Protocol) Relay, 75-76, 258-259
temporary keys and, 189
Transport Layer Security (TLS), 65
WEP (Wired Equitant Privacy), 81-82, 91
'Wild' viruses, 337, 352, 356
Windows security recommendations, 347-348, 360
Wireless access, 802.1X, 59-61
Wireless security, 57, 80-82, 86-87, 234, 238
wireless access, 59-61
Wiring. See Cables and cabling
W32.Klez.A@MM worm, 344, 353
W32.Kriz virus, 342
W97M.Melissa.A virus, 342, 353
W32.Nimda.A@mm worm, 343, 353
Worms, 20, 254, 291, 331-333, 355
defined and described, 334
ILOVEYOU worm, 342, 353
mailer and mass-mailer worms, 339, 343-344, 358
Symantec worm removal tools, 344
W32.Nimda.A@mm, 343, 353
WTLS (Wireless Transport Layer Security), 81
| < Free Open Study > |
|