Index_T

T

T-connector on coax, 144

TACACS/+ (Terminal Access Controller Access Control System), 125, 531

tainted evidence, 458

tap, 174, 174, 530

tape, 151–152

targets, 469

TCP ACK flood attacks, 70–71, 70, 530

TCP/IP (Transport Control Protocol/Internet Protocol)

application interfaces, 67, 67

Application layer, 60–61, 60

defined, 532

encapsulation, 63–64, 64

Host-to-Host (Transport) layer, 60, 61–62

Internet layer, 62–63, 514

Network Interface layer, 63, 518

network sniffers, 68–69

overview, 59

port scans, 69–70

potential threats to, 68–75, 169–170, 220–221

dealing with smurf attacks, 140

IGMP, 63, 140–141, 512

new types of, 74–75

SNMP, 139–140

TCP/IP hijacking, 72, 72

TCP sequence number attacks, 71–72, 71, 530

TCP SYN or TCP ACK attacks, 70–71, 70

protocol suite for, 59–60, 60

TCP and UDP ports, 65–66

TCP attacks, 70–72

TCP three-way handshake, 66–67, 66

UDP attacks, 72–74

TCP/IP hijacking, 72, 72, 530

TCP sequence number attacks, 71–72, 71, 530

TCP (Transport Control Protocol)

attacks, 70–72

connections in, 66

defined, 531

functions in TCP/IP, 61–62

ports, 65–66

three-way handshake, 66–67, 66

TCP packets, 128

TCP SYN flood attacks, 70–71, 70

TCP wrappers, 226–227, 530

teardrop attacks, 530

telecom/PBX systems, 115–116, 116

Telnet

checking port or protocol availability with, 69

defined, 531

as protocol, 61

TEMPEST shielding protection, 274

10Base-T network with attached sniffer, 146, 146

Terminal Access Controller Access Control System (TACACS/+), 125, 531

terminal emulator, 531

terminating resistor, 141, 144

termination policies, 424, 531

test accounts, 531

test engine, xvi

TFTP (Trivial File Transfer Protocol), 532

thin clients, 153

third party, 430, 531

threats

exam objectives, 49

identifying, 32–35, 33

external threats, 34–35, 509

internal threats, 33–34, 513

to secure networks, 214–216

to TCP/IP, 68–75, 139–141, 169–170, 220–221

three-tier model, 245–246, 531

3DES (Triple-DES), 321, 500, 532

Time to Live (TTL), 531

TLS (Transport Layer Security)

as cryptography standard, 365–366, 366

defined, 133, 532

tokens, 15, 15, 527, 531

toolkits for computer forensics, 456

Tracert, 531

trade publications, 480–481

trailer, 531

transceiver, 112, 531

transmission

defined, 531

of viruses, 83

transmission media, 532

Transport layer, 60, 61–62, 532

Transport Layer Security. See TLS

transposition ciphers, 312

Triple-DES (3DES), 321, 500, 532

Trivial File Transfer Protocol (TFTP), 532

Trojan horses, 80, 83–84, 532

True Secure, 480

Trust List, 532

trust models, 338–343

bridge, 339–340, 341

granularity, 339

hierarchical, 339, 340

hybrid, 342–343, 342

mesh, 341–342, 341

overview, 338–339

trusted transaction, 430

TTL (Time to Live), 531

tunneling

defined, 29–30, 30, 532

ICMP, 74

protocols for, 126–127

two-factor authentication, 532

two-tier database model, 245

two-tier model, 532



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net