[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] I Love You virus i-Mode standard security vulnerabilities 2nd IDEA (International Data Encryption Algorithm) SSH utility identifying nonessential services 2nd 3rd 4th 5th 6th 7th 8th 9th risks assessment guidelines 2nd assets inventory threat assessments 2nd vulnerability-scanning tools 2nd 3rd IDSs (intrusion detection systems) (intrusion-detection systems) 2nd attack signatures bastion hosts role of behavior-based common features limitations 2nd exam practice questions 2nd 3rd 4th 5th 6th honeynets function of honeypots function of host-based 2nd strengths 2nd 3rd incident handling responses countermeasures deflection detection Intrusion Countermeasure Equipment (ICE) knowledge-based known attack signatures limitations 2nd layered approach network-based 2nd header signatures port signatures strengths 2nd 3rd string signatures versus intrusion-prevention systems IEEE 802.11 standards wireless devices IEEE 802.11x standard Carrier Sense Multiple Access with Collsion Avoidance (CSMA/CA) current specifications wireless vulnerabilities IEEE 802.11x wireless networks remote access issues 2nd clear-text data transmission man-in-the-middle attacks radio traffic detection session hijacking war chalking war driving IEEE 802.1Q standard VLAN tagging 2nd IEEE Standards Association Web site IETF Web site cryptographic resources cryptography resources incident handling responses (IDSs) countermeasures deflection detection incident response security policy planning incremental backups disaster recovery incremental backups (tapes) information leaks CGI script vulnerability Information Security Management Handbook InformIT Web site computer security resources infrastructure security exam practice questions 2nd 3rd 4th 5th 6th 7th FAQS.org Web site Invir.com Web site NIST Web site UC Davis Web site infrastructure security, [See also devices] infrastructure testing vulnerability scanning instant messaging products vulnerabilities file-sharing systems 2nd packet-sniffing 2nd integrity encryption benefits 2nd 3rd 4th 5th 6th intergrated circuit cards (ICCs) Interior Gateway Routing Protocol (BGP) Interior Gateway Routing Protocol (IGRP) internal motion detectors facility security International Data Encryption Algorithm (IDEA) symmetric key algorithm International Telecommunications Union (ITU) X.509 standards Internet Control Message Protocol (ICMP) port scans Internet Engineering Task Force X.509-based PKI Internet Key Exchange (IKE) protocol 2nd Internet Protocol Security (IPSec) Internet Protocol Security, [See IPSec] Internet Security Association and Key Management Protocol (ISAKMP) Internet service testing vulnerability scanning intranets security configuration Intrusion Countermeasure Equipment (ICE) intrusion detection Domain 3.0 skill set (infrastructure security) intrusion detection systems, [See IDSs] intrusion-detection systems, [See IDSs]2nd [See IDSs] intrusion-prevention systems versus IDSs Invir.com Web site IP addresses private Automatic Private IP Addressing (APIPA) spoofing attacks 2nd IP addressing private network address translation (NAT) 2nd IP Fundamentals IPConfig utility diagnostic functions IPSec (Internet Protocol Security) Internet Key Change (IKE) protocol 2nd Network layer (OSI model) 2nd VPN connection authentication 2nd 3rd 4th Authentication Header (AH) Encapsulating Security Payload (ESP) iris profiles (biometrics) ISAKMP (Internet Security Association and Key Management Protocol) ISO 17799 standard ISO 17799 standard (Code of Practice for Information Security) 2nd 3rd ISPs VPN connectivity ITU Web site cryptography resources |