Index_V

V

vampire taps, 143–144, 144

vendor support of security policies, 420–423

code escrow, 422–423, 505

overview, 421

service level agreements, 421–422

virtual links, 533

Virtual Local Area Networks (VLANs), 28, 28, 533

viruses, 76–83

armored, 82, 502

companion, 82

defined, 11, 76–77, 533

helping users recover from, 190–191

hoaxes, 83, 131, 511

how they work, 78, 78, 79

macro, 82–83

multipartite, 81, 81, 517

phage, 82, 521

polymorphic, 79–80, 521

retrovirus, 81, 524

scanning e-mail for, 237

stealth, 80, 81

symptoms of, 77–78

transmission in networks, 83

Trojan horse, 80, 83–84, 532

VLANs (Virtual Local Area Networks), 28, 28, 533

volume, 533

VPNs (virtual private networks)

about, 117, 117

connections for remote access with, 124

defined, 533

vulnerabilities

of coax, 143, 143–144, 144

FTP sniffing, 138

ICMP, 140

of instant messaging, 197, 198–199

NetMeeting, 132

removable media, 151–154

servers, 245

in software and systems, 35–36

of web Internet connections, 133–136

ActiveX, 135

buffer overflows, 135

CGI, 136, 505

cookies, 135–136, 505

Java applets, 134

JavaScript, 134

signed applets, 134–135

SMTP relay, 136–137

wireless systems, 195–196



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net