N


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

natural disasters. [See DRPs (disaster recovery plans)]
Nessus vulnerability reports 2nd
network databases
Network File System (NFS)
Network layer (OSI) 2nd
network management
network managers
network policies
network-recovery teams
networks 2nd 3rd 4th
     bridges 2nd
     bus topology
     callback systems
     collisions 2nd
     data encapsulation 2nd
     denial-of-service attacks (DoS) 2nd
     digital signatures 2nd 3rd
     distributed denial-of-service attacks (DDoS)
     encryption
         AES (Advanced Encryption Standard)
         algorithms
         asymmetric encryption 2nd 3rd
         Certificate Authorities (CAs) 2nd
         cryptography
         DES (Data Encryption Standard)
         digital certificates 2nd
         nonrepudiation
         private keys
         public key infrastructure (PKI) 2nd 3rd
         public keys 2nd 3rd
         symmetric encryption 2nd
         symmetric keys 2nd
     Ethernet 2nd
     extranets 2nd
     firewalls 2nd 3rd 4th 5th 6th 7th 8th 9th
         packet-filtering firewalls 2nd
         proxy firewalls 2nd 3rd 4th 5th
         stateful packet-inspection firewalls 2nd
     hubs/switches 2nd
     Internet
     intranets
     intrusion-detection systems (IDS) 2nd
     LANs (Local Area Networks) 2nd 3rd 4th 5th
     MANs (Metropolitan Area Networks) 2nd 3rd
     modems 2nd
     OSI (Open Systems Interconnect) model
         Layer 1 (Physical) 2nd
         Layer 2 (Data Link) 2nd 3rd
         Layer 3 (Network) 2nd
         Layer 4 (Transport) 2nd 3rd
         Layer 5 (Session) 2nd 3rd
         Layer 6 (Presentation) 2nd 3rd
         Layer 7 (Application) 2nd 3rd
         table of 2nd
     policies
     ring topology 2nd
     risks and controls 2nd 3rd
     routers 2nd
    security
         encryption 2nd 3rd 4th 5th 6th 7th
     security controls 2nd
     single sign-on (SSO) systems
     star topology 2nd
     TCP/IP (Transmission Control Protocol/Internet Protocol) 2nd 3rd
     voice communications security 2nd
     VPN (virtual private networking)
     WANs (Wide Area Networks) 2nd
networks. 2nd [See also protocols]
NFS (Network File System)
noncompete agreements
noncritical functions
nondiscretionary access 2nd
nonrepudiation
normalization
notebooks



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net