Index_E


E

EAP, 345–346

Echo-replies, See Internet Control Messaging Protocol; PING

Electronic code book (ECB), 127

Elliptical Curve Cryptography Standard, 182

E-mail security

attack methods, 94–95

digital signatures, 125, 126

PGP, 181

S/MIME, 181

Encapsulating Security Payload (ESP), 279, 306, 307, 313–316

authentication option, 315

data padding, 314

decryption process, 315

NAT interoperability, 328–329

null encryption, 307

Encapsulation, 289–291, See also Tunneling

L2TP capability, 303

Encryption, 119, 167, See also Cryptography; Hashing; Public key infrastructure

data-link layer, 64–65

general vulnerability, 278

keys, 120–123

L2TP, 300, 302–303

Pretty Good Privacy (PGP), 176

public key infrastructure, 170

VPN limitations, 279, See also Virtual private networks

Wired Equivalent Privacy (WEP), 341–343

wireless communication, 62

Encryption algorithms, 127–134

AES, 130

Blowfish, 129

data padding, 314

DES, 127–128

Diffie-Hellman, 130–132

ESP, 279

hashing, See Hashing

IDEA, 128–129

IPSec, 296, 316, 317

RSA, 132–134

stream ciphers, 342

3DES, 127–128

Enhanced Interior Gateway Routing Protocol (EIGRP), 96

ESP, See Encapsulating Security Payload

Ethernet, 64, 72

addressing protocol, 82–83

L2TPv3 and, 304

maximum transmit unit (MTU), 68–69

MPLS and, 285

shared bandwidth, 65

switches, 66–68

VPN traffic QoS, 338

Executable files, integrity checking, 270

Experimental (class E) addresses, 205

Exploit publicity, 41

Exploit scripts, 350

Exposure, defined, 18

Exposure factor (EF), 25–26, 31

Extended Certificate-Based Syntax, 182

Extensible Authentication Protocol (EAP), 345–346

Exterior gateway protocols, 97




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net