| < Day Day Up > |
|
False positives and false negatives, 120–121
Fault tolerance, 209
FDDI (Fiber Distributed Data Interface) Ring, 102, 135
Federal Privacy Act (1974), 304
Fiber Distributed Data Interface (FDDI) Ring, 102, 135, 141
Fiber-optic cables, 107
File infector viruses, 254, 335
Files
encryption, 109–110
flat files, 266
sharing, 79
UNIX system files, 350
File servers, 261–262
Filtering, 137
database filters, 265
ingress filtering, 260
routers and, 126, 130
Fingerprints. See Hash algorithms and hashes
Fire, physical security
environment, 197
extinguisher types, 199–200, 238, 239
fire suppression systems, 198–201, 234, 238
sprinkler systems, 200–201, 238
Fire extinguishers, 199–200, 238, 239
Firewalls, 18, 123–124, 126–129, 140, 141, 143, 146
application proxies (gateways), 127–128
architecture for, 137
bastion hosts, 135
circuit gateways, 127, 141
DMZs, 129–130, 146
dual-homed hosts, 137
e-mail security and, 61
Network Address Translation (NAT), 128–129, 143
packet filtering, 126
screened hosts, 137
screened subnets, 137
stateful inspection firewalls, 128
First Computer Security Act (1984), 304
Flash cards, 111
Flat databases (flat files), 266
Floppy disks, 110
Folder encryption, 109–110
For current security trends, 11
Foreign keys, 265
Forensics, 222–223, 243
Frame relay, 118, 136
Fraud, 309, 319, 326
1986 Computer Fraud and Abuse Act, 304
FTP (File Transfer Protocol), 77–80, 84, 129, 146, 259–260, 291
Fun attacks, 306, 319
| < Day Day Up > |
|