|
Hacking attacks, 350, See also Denial-of-service (DoS) attacks; Network penetration testing; specific attacks
computer crime trends, 364
confusing switches, 67–68
control bit combinations, 107
detection, See Intrusion detection systems
DHCP vulnerabilities, 89–90
DNS and, 354–355
footprinting, 352–357
game consoles, 61, 90
hacker motivations, 349–352
ICMP vulnerabilities, 84–87, 215
passwords, 157–158
"phone home" configurations, 217
plaintext attacks, 342–343
routing protocols and, 98
social engineering, 353, 359
SYN attack, 111–112, 231–232
wardialing, 354
Hand geometry, 162
Hard drive analysis, 378–379
Hashed message authentication code (HMAC), 315
Hashing, 123–126
digital signatures, 125
file integrity checking, 270
forensic applications, 379
IPSec applications, 125–126
passwords, 155
HDLC, 64, 72, 304
Health Information Portability and Accountability Act (HIPAA), 12
Hellman, Martin, 130
HMAC, 315
"Honeypots," 271–274
Hop Count field, 79
HTTP
firewall configuration for return traffic, 212
router configuration protocol, 207
Hubs, 62–63
|