[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] back door programs (attack tool) attack prevention 2nd Back Orifice NetBus PCAnywhere Sub7 Terminal Services Virtual Network Computing (VNC) Back Orifice program back door attacks backups disaster recovery plans 2nd copy backups differential backups full backups incremental backups restoration procedures 2nd 3rd strategy selection 2nd handling 2nd policies development guidelines 2nd storage of 2nd tapes copy backup method differential backup method frequency of full backup method incremental backup method Badtrans worm baselines (security) establishing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th exam practice questions 2nd 3rd hardening measures applications 2nd networks 2nd 3rd operating systems 2nd 3rd 4th services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th bastion hosts role of bastion-host firewall behavior-based IDS common features limitations 2nd biometric authentication 2nd biometrics facility security technologies facial geometry fingerprints hand/plam geometry iris profiles retinal scans signatures voiceprints birthday attacks (password guessing) bit strength encryption measurements bit strengths symmetric versus asymmetric key algorithms 2nd blind access FTP server vulnerability blind testing vulnerability scanning block ciphers symmetric key algorithms Blowfish Encryption Algorithm symmetric key algorithm Blowfish encyrption SSH utility Bluetooth standard wireless security vulnerabilities Boink attack (DoS) Bonk attack (DoS) book references CCNA Cisco Certified Network Associate Study Guide CERT Guide to System and Network Security Practices 2nd 3rd CISSP Prep Guide CISSP Training Guide Computer Networks Computer Networks and Internets Guide to TCP/IP Hack Attacks Denied 2nd 3rd Hack Attacks Revealed Hackers Beware Hacking Exposed Information Security Management Handbook IP Fundamentals Maximum Security, Third Edition Network Security Private Communication in a Public World Operating System Concepts Planning for PKI TCP/IP Illustrated boot-sector viruses bridge CA model (Certificate Authorities) brute force attacks (password guessing) prevention measures buffer overflows attack scenarios 2nd CGI script vulnerability LDAP vulnerability potential damage 2nd software exploitation attacks business continuity Domain 5.0 skill set (operational/organizational security) businesses continuity plan elements clustering connectivity facilities fault tolerance |