List of Sidebars

Chapter 1: General Security Concepts

Multi-Factor Authentication and Security
Real World Scenario: Creating a Corporate Connection to a Business Partner

Chapter 2: Know Your Enemy

New Attacks on the Way
Real World Scenario: A Virus Out of Control

Chapter 3: Infrastructure and Connectivity

ATT Wireless NOCs
Real World Scenario: Dual-Homed Server-Based Proxy Firewall
Real World Scenario: Users Installing Unauthorized Software
Real World Scenario: Connecting Remote Network Users
Real World Scenairo: SMTP Relaying in Action
Real World Scenario: Remote File Transfers
Real World Scenario: Using ICMP to Deal with Smurf Attacks
Real World Scenario: The School Lab

Chapter 4: Monitoring Communications Activity

Real World Scenario: These Network Audit Files Are Killing Me
Real World Scenario: The E-Mail Incident
Real World Scenario: The Virus That Keeps On Giving

Chapter 5: Implementing and Maintaining a Secure Network

Real World scenario: Implementing a Secure Server Environment
Real World Scenario: Connecting Windows Systems Remotely
Real World Scenario: Does Anybody Really Like Spam?
Real World Scenario: Where Did All These Strange IP Addresses Originate?

Chapter 6: Working with a Secure Network

Real World Scenario: A Ghost in the Machine?
Evaluating Your Security System
Real World Scenario: Installing Biometric Devices
Real World Scenario: Remote Diagnostic Support
Real World Scenario: Securing Your Wireless Devices
Real World Scenario: Conducting a Risk Assessment

Chapter 7: Cryptography Basics and Methods

Real World Scenario: We're All Human, or Mr. Key's Wild Ride
eBay Is a Great Place to Go Shopping
Real World Scenario: Building a Security System
Real World Scenario: Designing a CA Structure for Your Organization

Chapter 8: Cryptography Standards

Real World Scenario: Working with Credit Card Information Online
Real World Scenario: Securing UNIX Interactive Users
Real World Scenario: What Do You Do About Forgetful Programmers?
Real World Scenario: Selling the Company's Old Computers

Chapter 9: Security Policies and Procedures

Real World Scenario: Some Protection Is Better Than None—Or Is It?
Real World Scenario: Should I Buy the Computer Store's SLA for My New Laptop?
Real World Scenario: Performing a Usage Audit

Chapter 10: Security Management

Real World Scenario: When to Involve Law Enforcement
Real World Scenario: Selling Your Old Computers
Real world Scenario: Where Did My VAX Go?
Real World Scenario: You Be the Judge
Real world Scenario: Upgrading Your Servers
Real World Scenario: Security Awareness Program



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net