Data
availability, 24
categorization, 27 “28
flooding, 211, 212 “13
hijacking, 211, 213
integrity, 23, 203
mobile, securing, 147 “48
sensitive, 310
Data Encryption Standard (DES), 150, 152 “54
defined, 152
functioning of, 153 “54
Triple, 154 “55
uses, 152 “53
See also Encryption schemes
Decentralized Administration Model, 32
Defense-in-Depth strategy, 52 “56
defined, 52
detect and respond infrastructure, 55 “56
IATF and, 53
key management infrastructure, 55
operations, 53
people, 52 “53
technology, 53
De-Militarized Zone (DMZ), 189 “90
Denial of Service (DoS) attacks, 38, 53, 210 “13
baselining analysis, 283
data flooding, 211, 212 “13
hijacking, 211, 213
jamming, 210, 211
types of, 210 “11
See also Attacks
Detect and respond infrastructure, 55 “56
Device-specific APIs, 147
Digital certificates, 135, 256
Digital signature process, 135
Directory Information Tree (DIT), 300
Discretionary access control, 26, 28 “29
Disruption of service, 72
Distribute Denial-of-Service (DDoS) attacks, 53
Domains
defined, 47
single sign-on, 140
Dynamic Host Configuration Protocol (DHCP), 181
for authentication, 280 “82
clients , 281
servers, 281, 282
Dynamic WEP, 227 “40
defined, 227 “28
key updates, 228