| < Day Day Up > |
|
Packet filtering, 126, 130, 137
Packets, fragmentation attacks, 37
Packet sniffing, 126
Packet-switching, 138
PAP (Password Authentication Protocol), 57, 116
Parallel processing, 210
Parity information, 209
Partitioning, databases and, 272, 292
Pass-phrases, 178
Password Authentication Protocol (PAP), 116
Passwords, 23-24, 44, 47, 49, 50
crackers, 39, 44
defined, 18-19
dictionary attacks and, 38
hash algorithms and, 163
One Time Passwords (OTPs), 35
PAP, 116
UNIX, 359
Patches, 257
Patents, 303
Pattern matching, 276
PBX, 132
Penetration testing, 234
Permanent Virtual Circuits (PVCs), 117
Permissions, 286
Permutation, 188
Personal certificates, 170-171
Perturbation and database security, 272, 292
PGP (Pretty Good Privacy), 63, 85, 125, 189
encryption algorithms used in, 160, 189
trust models and, 175
Physical layer, 97
Physical security, 237
access controls, 33, 195-196
barriers, physical, 195-196, 234
best practices and policies, 201
biometrics, 196
defined and described, 194
environmental conditions, 196-201
location of site, 197
operational controls, 202-203
shielding, 198
Ping of death attacks, 37
Piracy, 308, 320
Plain text, 19
Point-to-Point Protocol (PPP), 117
Point-to-Point Tunneling protocol (PPTP), 136
Poisoning, DNS data, 259
Policy constraints extension, 172
Policy mapping extensions, 172
Polyinstantiation, 271-272, 292
Polymorphic viruses, 254, 336, 353
Pornography, 310-311
Portable devices, 234, 238
Ports, 144, 146
blocking, 33-34, 78
TCP / UDP ports, 126, 144
Power supply, 137
PPP (Point-to-Point Protocol), 117
Practice exam, 363-380
Presentation layer of OSI, 96
Pretty good privacy (PGP). See PGP (Pretty Good Privacy)
Preventive controls, 202, 237, 243
Primary keys, 265
Primary Rate Interface (PRI), 118
Principle of least privilege, 43, 234, 287
Print servers, 261-262
PRI (Primary Rate Interface), 118
Privacy. See Confidentiality and privacy
Private-key encryption, 149, 187
algorithms for, 155-157
defined, 19, 181
Privileges
defined, 19, 217
least-privilege principle, 43, 234, 287
LSA, SID, and ACL, 219-220
management, 217-221
privilege management, 234
roles and responsibilities, 221
SSO (Single Sign-On), 26-27, 220-221, 235, 242-243
user and group privileges, 217-219
Processing controls, 275
Protocols and services, 141-142
ARP, 114-115
CHAP, 116-117, 141-142
cryptography and, 165-168
DCHP, 260-261, 291
defined, 111-112
DNSSEC, 167-168, 259-260
DSL, 118
file / print servers, 261-262
frame relay, 118
hardening servers, 257-263, 291
HDLC, 115-116
IPX / SPX, 114
ISDN, 118
NNTP, 260
PAP, 116
PPP, 117
protocol defined, 165
routers and, 130
SDLC, 116
SHTTP, 166
SLIP, 117
S / MIME, 166-167
SSH, 115, 167
SSL and, 166
TCP / IP, 112-114
tunneling protocols, 125
X.25, 117
Public-key encryption, 19, 125, 149, 181, 189
Public Key Infrastructure (PKI), 168-176
certificates and, 168-174
trust models, 174-176, 183
PVCs (Permanent Virtual Circuits), 117
| < Day Day Up > |
|