|
EAP, 345–346
Echo-replies, See Internet Control Messaging Protocol; PING
Electronic code book (ECB), 127
Elliptical Curve Cryptography Standard, 182
E-mail security
attack methods, 94–95
digital signatures, 125, 126
PGP, 181
S/MIME, 181
Encapsulating Security Payload (ESP), 279, 306, 307, 313–316
authentication option, 315
data padding, 314
decryption process, 315
NAT interoperability, 328–329
null encryption, 307
Encapsulation, 289–291, See also Tunneling
L2TP capability, 303
Encryption, 119, 167, See also Cryptography; Hashing; Public key infrastructure
data-link layer, 64–65
general vulnerability, 278
keys, 120–123
L2TP, 300, 302–303
Pretty Good Privacy (PGP), 176
public key infrastructure, 170
VPN limitations, 279, See also Virtual private networks
Wired Equivalent Privacy (WEP), 341–343
wireless communication, 62
Encryption algorithms, 127–134
AES, 130
Blowfish, 129
data padding, 314
DES, 127–128
Diffie-Hellman, 130–132
ESP, 279
hashing, See Hashing
IDEA, 128–129
IPSec, 296, 316, 317
RSA, 132–134
stream ciphers, 342
3DES, 127–128
Enhanced Interior Gateway Routing Protocol (EIGRP), 96
ESP, See Encapsulating Security Payload
Ethernet, 64, 72
addressing protocol, 82–83
L2TPv3 and, 304
maximum transmit unit (MTU), 68–69
MPLS and, 285
shared bandwidth, 65
switches, 66–68
VPN traffic QoS, 338
Executable files, integrity checking, 270
Experimental (class E) addresses, 205
Exploit publicity, 41
Exploit scripts, 350
Exposure, defined, 18
Exposure factor (EF), 25–26, 31
Extended Certificate-Based Syntax, 182
Extensible Authentication Protocol (EAP), 345–346
Exterior gateway protocols, 97
|