Index B

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

back door programs
       (attack tool)  
       attack prevention   2nd  
       Back Orifice  
       NetBus  
       PCAnywhere  
       Sub7  
       Terminal Services  
       Virtual Network Computing (VNC)  
Back Orifice program
       back door attacks  
backups
       disaster recovery plans   2nd  
               copy backups  
               differential backups  
               full backups  
               incremental backups  
               restoration procedures   2nd   3rd  
               strategy selection   2nd  
       handling   2nd  
       policies
               development guidelines   2nd  
       storage of   2nd  
       tapes
               copy backup method  
               differential backup method  
               frequency of  
               full backup method  
               incremental backup method  
Badtrans worm  
baselines (security)
       establishing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
       exam practice questions   2nd   3rd  
       hardening measures
               applications   2nd  
               networks   2nd   3rd  
               operating systems   2nd   3rd   4th  
               services   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
bastion hosts
       role of  
bastion-host firewall  
behavior-based IDS  
       common features  
       limitations   2nd  
biometric authentication   2nd  
biometrics
       facility security  
       technologies
               facial geometry  
                fingerprints  
               hand/plam geometry  
               iris profiles  
               retinal scans  
               signatures  
               voiceprints  
birthday attacks (password guessing)  
bit strength
       encryption measurements  
bit strengths
       symmetric versus asymmetric key algorithms   2nd  
blind access
       FTP server vulnerability  
blind testing
       vulnerability scanning  
block ciphers
       symmetric key algorithms  
Blowfish Encryption Algorithm
       symmetric key algorithm  
Blowfish encyrption
       SSH utility  
Bluetooth standard
       wireless security vulnerabilities  
Boink attack (DoS)  
Bonk attack (DoS)  
book references
       CCNA Cisco Certified Network Associate Study Guide  
       CERT Guide to System and Network Security Practices   2nd   3rd  
       CISSP Prep Guide  
       CISSP Training Guide  
       Computer Networks  
       Computer Networks and Internets  
       Guide to TCP/IP  
       Hack Attacks Denied   2nd   3rd  
       Hack Attacks Revealed  
       Hackers Beware  
       Hacking Exposed  
       Information Security Management Handbook  
       IP Fundamentals  
       Maximum Security, Third Edition  
       Network Security Private Communication in a Public World  
       Operating System Concepts  
       Planning for PKI  
       TCP/IP Illustrated  
boot-sector viruses  
bridge CA model (Certificate Authorities)  
brute force attacks (password guessing)  
       prevention measures  
buffer overflows
       attack scenarios   2nd  
       CGI script vulnerability  
       LDAP vulnerability  
       potential damage   2nd  
       software exploitation attacks  
business continuity
       Domain 5.0 skill set (operational/organizational security)  
businesses
       continuity plan elements  
               clustering  
               connectivity  
               facilities  
               fault tolerance  



Security+ Exam Cram 2 (Exam SYO-101)
Security+ Certification Exam Cram 2 (Exam Cram SYO-101)
ISBN: 0789729105
EAN: 2147483647
Year: 2005
Pages: 162

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net