|
|
fail-over, 402–403, 509
false positive, 189, 510
Faraday Cage, 272, 510
fault tolerance, 404, 510
fault-tolerant network, 510
Federal Information Processing Standard (FIPS), 371, 510
FERPA (Family Educational Right to Privacy Act), 484
FHSS (frequency-hopping spread spectrum), 193, 510
fie extensions in PC systems, 198
file servers, 240
file systems
common, 228–231, 230
finding file information in FAT, 457
File Transfer Protocol. See FTP
files
audit, 88
backups of user, 411–412
naming conventions for instant messaging, 197–198
sharing via FTP, 138
FIPS (Federal Information Processing Standard), 371, 510
fire extinguishers, 274–275
fire suppression, 274–276, 275, 510
firewalls, 106–110, 107
defined, 106, 510
packet filters, 107
placement of N-IDS with, 179
proxy firewalls, 107–109, 107, 523
securing network with IDS and, 119
five nines availability, 402
flash cards, 154
flood attacks
TCP SYN or TCP ACK, 70–71, 70
terminating connections when detected, 181, 182
footprinting
defined, 200, 510
DNS servers, 238
forensics, 454, 510
frequency analysis, 316–317
frequency-hopping spread spectrum (FHSS), 193, 510
FTP (File Transfer Protocol)
anonymous logon for, 137
defined, 20, 137, 510
file sharing, 138
FTP proxy, 510
hardening FTP servers, 237–238
Secure FTP, 138
vulnerabilities and sniffing, 138
full backups, 412, 415, 510
full distribution, 288, 510
|
|