Virus and Worms

Physical Security

Table FF.11. Power Faults

Fault

Description

Blackout

Prolonged loss of power

Brownout

Power degradation that is low and less than normal

Sag

Momentary low voltage

Fault

Momentary loss of power

Spike

Momentary high voltage

Surge

Prolonged high voltage

Noise

Interference superimposed onto the power line

Transient

Noise disturbances of a short duration

Inrush

Initial surge of power at startup

  • A turnstile is a form of gate that prevents more than one person at a time from gaining access to a controlled area. Turnstiles usually only turn in one direction to restrict movement to only that direction.
  • Piggybacking is the primary way that someone would try to bypass a mantrap. To prevent and detect this, guards and CCTV can be used.
  • Fire prevention should be performed to make sure that employees are trained and know how to prevent fires from occurring and how to respond when they do.
  • Fire detection systems are used to signal employees that there might be a problem.
  • Fire suppression addresses the means of extinguishing a fire. Not all fires are composed of the same combustible components.
  • Passwords and pin numbers These authentication systems are based on something you know: as an example, a name and an alphanumeric password or pin number.
  • Tokens, smart cards, and magnetic strip cards These authentication systems are based on something you have. As an example, your employer might have issued you a smart card with your ID embedded in it that is read by readers throughout the organization and will allow you to access controlled areas.
  • Biometrics These authentication systems are based on what you are, such as a fingerprint, retina scan, or voice print. As an example, the company you work for might have placed a fingerprint reader outside the server room to keep unauthorized individuals out.
  • The discretionary access control model is one most users are familiar with. Access control is left to the owner's discretion.
  • Mandatory access control features a static model and is based on a predetermined list of access privileges.
  • Defense in depth is about building multiple layers of security that will protect the organization better than one single layer.

Linux Hacking

Part I: Exam Preparation

The Business Aspects of Penetration Testing

The Technical Foundations of Hacking

Footprinting and Scanning

Enumeration and System Hacking

Linux and Automated Security Assessment Tools

Trojans and Backdoors

Sniffers, Session Hijacking, and Denial of Service

Web Server Hacking, Web Applications, and Database Attacks

Wireless Technologies, Security, and Attacks

IDS, Firewalls, and Honeypots

Buffer Overflows, Viruses, and Worms

Cryptographic Attacks and Defenses

Physical Security and Social Engineering

Part II: Final Review

Part III: Appendixes

Appendix A. Using the ExamGear Special Edition Software



Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net