Index_T


T

Target profiling, 191 “92
TCP Wrappers, 60 “62
availability, 60
client/server relationship and, 61
defined, 60
functioning of, 61
problems with, 61 “62
software bugs , 62
See also Host-based intrusion detection
Temporal Key Integrity Protocol. See TKIP
Theft, 4 “5
computer hardware/software, 5
identity, 277
motive, 4
Thin clients , 280
Threats
identifying, 168
likelihood , determining, 161
to personal privacy, 4
WLAN, analysis, 312
TKIP, 125, 225
defined, 223
using, 226 “27
WEP weaknesses and, 225 “26
WPA, 303 “4
Total Cost of Ownership (TCO), 280, 312
Training, 170 “71
Transport Layer Security (TLS), 182, 221
Triple DES, 154 “55
defined, 154 “55
key length, 155
See also Encryption schemes
Tripwire, 64 “65
attribute verification, 65
defined, 64
protection, 65
purpose, 64
See also Host-based intrusion detection
Trojan horses, 219
Tunneling, 241



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net