|
|
TACACS (Terminal Server Controller Access Control Systems), 51, 450
TACACS+ (Terminal Server Controller Access Control Systems Plus), 450
target enumeration locating, 532
target identification, 532
TCP protocol, 429
TCP session hijacking, 458
TCP/IP
DoS attacks and, 511-519
source routing and, 519
TCPDump sniffing tool, 528
teardrop attacks, 517
Terminal Server Controller Access Control Systems (TACACS), 450
Terminal Server Controller Access Control Systems Plus (TACACS+), 450
termination policies, 147
testing
by penetration attempts, 85-87
operational, 121
of plans, 241
thicknet coax cable, 398, 399
thinnet coax cable, 398
threats, 126, 151
See also attacks; incident investigation; risk management
time bombs, 484
TLS (Transport Layer Security), 431
token passing, 421
token ring, 414, 419-424
tokens, 419
hardware-based, 6
tools, 9
antivirus software, 535-537
for auditing, 179
for data recovery, 309
for developing security policies, 139
dsniff, 437
for sniffing, 528
for penetration testing, 204
tracing, 289-291
Top Secret classification, 142
topologies, 409-416
tracert command, 402
TRACERT/TRACEROUTE tools, 291
tracing tools, 289-291
training, for security awareness, 150, 235-237
transaction logs, 38
transference of risk, 256
transitive trust, 364
Transmission Control Protocol (TCP), 429
Transport layer, 403-405
Transport Layer Security (TLS), 431
transport mode, IPSec protocol and, 455
tree topology, 412-414
trend analysis, 215
triggers, 195
Triple DES algorithm, 335
Trojan horses, 130, 493-497
prevention/response for, 508
sniffing and, 528
trust models, 364
tunnel mode, IPSec protocol and, 455
twisted-pair copper cable, 398
|
|