|
|
back doors, 132, 523
Back Orifice Trojan horse, 493–495
Backdoor.Beasty Trojan horse, 496
background checks, 144
backups, 18, 273–278
differential, 274
restoring and, 241, 276
rotating, 274
storing offsite, 278
baseband signaling, 418
baseline software, 135
bastion hosts, 444
beaconing, 422
Bell-LaPadula formal access control, 67
best practices, 185
BIA (Business Impact Analysis), 183
Biba formal access control model, 67
binary math with XOR (exercise), 343–345
binary numbering system, 417
biometrics, 6
authentication for, 43
bits, 417
black hats, 480
block chaining cipher mode, 337, 347
block ciphers, 346
boot sector viruses, 484
bootstrap sector viruses, 485
broadband signaling, 418
brute force attacks, 74, 380
cracking (exercise), 74–77
smurf attacks and, 516
buffer overflows, 523
bus topology, 411
business continuity plans, 15, 268–271
types/areas of (list), 17, 268
Business Impact Analysis (BIA), 183
business impact assessments, 269
|
|