T


TACACS (Terminal Access Controller Access Control System), 60–61, 111–112, BC27

Take-Grant model, 234, BC27

Target of Evaluation (TOE), 239

TCB (Trusted Computing Base), 229–230, BC27

TCP (Transmission Control Protocol), 95, 96, BC27

TCP/IP (Transmission Control Protocol/Internet Protocol) model, 100

TCSEC (Trusted Computer System Evaluation Criteria), 235–239, BC27

Teardrop attack, 118, BC27

technical controls

definition, 41

for Physical (Environmental) Security domain, 349–351

Telecommunications and Network Security domain. See also network; OSI model

definition, 20, 73

prep test questions about, 120–122

resources for, 119

Telnet, 99, BC27

Terminal Access Controller Access Control System (TACACS), 60–61, 111–112, BC27

termination practices, 134–135, 257

terrorist attacks, 279, 309, 342

test. See exam; practice exam on CD-ROM; prep test questions in this book

Test of English as a Foreign Language (TOEFL), 17

testing

black box testing, 68, BC4

grey box testing, 68, BC12

penetration testing, 67, 267–269, BC19

unit testing, 166

vulnerability testing, 67

white box testing, 68, BC30

TFTP (Trivial File Transfer Protocol), 99

theft, 254, 255, 342

thick coaxial cable (RG8 or RG11), 78, 80

thicknet, 78, 80

thin coaxial cable (RG58), 78, 80

thinnet, 78, 80

threat, 139, 253–256, BC27

threat analysis, 140–141

3DES (Triple DES), 201–202, BC1

three-factor authentication, 44

ticket-based authentication, 55–59

TNI (Trusted Network Interpretation), 239, BC28

TOE (Target of Evaluation), 239

TOEFL (Test of English as a Foreign Language), 17

token, BC28

token ring, BC28

token-passing networks, 83

Token-Ring protocol, 84

Top Secret information, 129

tort law (civil law), 304–306, BC6

trade secret, 314, BC28

trademark, 313, BC28

traffic analysis, 180, 271, BC28

training courses, 15, 147

transference (risk assignment), 144, BC22

transformation procedures (TP), 66, 235

transient, BC28

Transmission Control Protocol (TCP), 95–96, BC27

Transmission Control Protocol/Internet Protocol (TCP/IP) model, 100

Transport Layer (Layer 4), OSI model, 94–97

transport mode, IPSec, 107, 215

transposition cipher, 192–193, BC28

trap door (logic bomb), 176, BC28

trapdoor (private key), 205

trend analysis, 271

Triple DES (3DES), 201–202, BC1

Trivial File Transfer Protocol (TFTP), 99

Trojan horse, 174–175, BC28

trust relationships, 61

trusted computer system, BC28

Trusted Computer System Evaluation Criteria (TCSEC), 235–239, BC27

Trusted Computing Base (TCB), 229–230, BC27

Trusted Network Interpretation (TNI), 239, BC28

trusted path, BC28

trusted recovery, 261–262, BC28

trusted subject, 233

tunnel mode, IPSec, 107, 215

twisted pair cable, 78–79, 80

Two-Factor authentication, 44, 54, BC29

Twofish algorithm, 203

Type I Error (False Reject Rate), 49, 349, BC12

Type II Error (False Accept Rate), 49, 349, BC12




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net