LAN (local area network), 73–74, 84–86
LAPB (Link Access Procedure, Balanced), 89
last successful logon, displaying, 47
last username to log on, displaying, 47
lattice-based access controls, 65, BC15
laws. See Legal, Regulations, Compliance, and Investigations domain
Layer 1, OSI model, 76–81
Layer 2 Forwarding Protocol (L2F), 106, BC15
Layer 2, OSI model, 81–92
Layer 2 Tunneling Protocol (L2TP), 106, BC15
Layer 3, OSI model, 92–94
Layer 4, OSI model, 94–97
Layer 5, OSI model, 97–98
Layer 6, OSI model, 98
Layer 7, OSI model, 98–100
layering (defense in depth), 125, 170–171, BC9
LDAP (Lightweight Directory Access Protocol), 59, BC15
leased lines, 86–87
least privilege, 170, 249, BC15
legal liability of safeguard, 145
Legal, Regulations, Compliance, and Investigations domain
business attacks, 310
computer crime, 307–309
computer crime laws, 316–323
definition, 24
ethics, 333–334
financial attacks, 310
“fun” attacks, 311–312
grudge attacks, 310–311
information security laws, 316–323
intellectual property, 312–314
international law, 307
investigations, 323–332
military attacks, 310
prep test questions about, 336–338
privacy laws, 314–316
resources for, 334–335
terrorist attacks, 309
U.S. common law, 304–306
liability, 305
liability of safeguard, 145
life safety controls, 351–355
lightning, 342
Lightweight Directory Access Protocol (LDAP), 59, BC15
limited access mode, 231
Link Access Procedure, Balanced (LAPB), 89
link encryption, 195–196, BC15
Link (Network Access) Layer, TCP/IP model, 100
local area network (LAN), 73–74, 84–86
locks, 347
log. See audit trail
logic bomb, 176, 311, BC15
logical access controls, for biometrics, 48
logical controls. See technical controls
Logical Link Control (LLC) sublayer, OSI model, 82
logon banner, contents of, 47
loss of physical and infrastructure s upport, 254
L2F (Layer 2 Forwarding Protocol), 106, BC15
L2TP (Layer 2 Tunneling Protocol), 106, BC15