Index_H

H

H-IDS (Host-based IDS), 184–185, 185, 511

handshake, 66–67, 66, 511

hard drives

duplexed, 508

vulnerabilities of, 152–153

hardening

application, 236–246

data repositories, 241–242, 506

databases, 244–246

DHCP services, 241, 508

directory services, 242–243, 242

DNS servers, 238–239

e-mail servers, 237, 237

file and print servers and services, 240

FTP servers, 237–238

NNTP servers, 239

web servers, 236

defined, 214, 511

network, 233–236

Access Control Lists, 235

configuring network devices, 234–235

enabling and disabling services and protocols, 235

network device updates, 233–234

OS/NOS, 218–233

Apple Macintosh, 228

Microsoft Windows 9x systems, 221

Microsoft Windows 2000, 223–224, 224

Microsoft Windows .NET Server 2003, 225

Microsoft Windows NT 4 systems, 222–223

Microsoft Windows XP, 224–225

network protocol configuration, 218–221

Novell NetWare, 227

operating system updates, 231–233

UNIX/Linux, 226–227

hardware. See also servers

hard drives, 152–153

hubs, 179

inventories of computer equipment, 464, 516

keys as hardware devices, 377–378

modems, 114, 517

routers, 110–111, 110, 111, 525

security of components, 104–105

servers, 121

switches, 112, 112

telecom/PBX systems, 115–116, 116

workstations, 120

Hash Message Authentication Code (HMAC), 511

hash value, 313, 511

hashing, 313, 319–320, 511

Health Insurance Portability and Accountability Act (HIPAA), 482–483, 511

Heisenberg Uncertainty Principle, 315

hierarchical trust models, 339, 340

high availability, 402–405

defined, 402, 511

fault tolerance, 404, 510

RAID technology and, 404–405, 406, 524

redundancy and, 402–404, 403

hijacking

preventing SMTP relay, 136–137

TCP/IP, 72, 72

HIPAA (Health Insurance Portability and Accountability Act), 482–483, 511

hiring policies, 423–424

hoaxes, 83, 131, 511

honey pots

deceptive actions when intruder detected, 183, 184

defined, 86, 511

purpose of, 185–186

honeynet, 186

Host-based IDS (H-IDS), 184–185, 185, 511

host-to-host, 511

Host-to-Host layer, 60, 61–62

hostile code, 511. See also malicious code

hosts, 60, 511

hot sites, 418, 511

hotfixes, 232, 511

HTML (Hypertext Markup Language)

defined, 512

using with web Internet connections, 131–132, 132

WML and, 194

HTTP (Hypertext Transfer Protocol), 61, 512

HTTPS (Hypertext Transport Protocol Secure), 133, 371, 511

hubs, 179

human error and cryptography, 317, 318

hybrid trust models, 342–343, 342

Hypertext Markup Language. See HTML

Hypertext Transfer Protocol (HTTP), 61, 512

Hypertext Transport Protocol Secure (HTTPS), 133, 371, 511



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net