|
|
T-connector on coax, 144
TACACS/+ (Terminal Access Controller Access Control System), 125, 531
tainted evidence, 458
tap, 174, 174, 530
tape, 151–152
targets, 469
TCP ACK flood attacks, 70–71, 70, 530
TCP/IP (Transport Control Protocol/Internet Protocol)
application interfaces, 67, 67
Application layer, 60–61, 60
defined, 532
encapsulation, 63–64, 64
Host-to-Host (Transport) layer, 60, 61–62
Internet layer, 62–63, 514
Network Interface layer, 63, 518
network sniffers, 68–69
overview, 59
port scans, 69–70
potential threats to, 68–75, 169–170, 220–221
dealing with smurf attacks, 140
IGMP, 63, 140–141, 512
new types of, 74–75
SNMP, 139–140
TCP/IP hijacking, 72, 72
TCP sequence number attacks, 71–72, 71, 530
TCP SYN or TCP ACK attacks, 70–71, 70
protocol suite for, 59–60, 60
TCP and UDP ports, 65–66
TCP attacks, 70–72
TCP three-way handshake, 66–67, 66
UDP attacks, 72–74
TCP/IP hijacking, 72, 72, 530
TCP sequence number attacks, 71–72, 71, 530
TCP (Transport Control Protocol)
attacks, 70–72
connections in, 66
defined, 531
functions in TCP/IP, 61–62
ports, 65–66
three-way handshake, 66–67, 66
TCP packets, 128
TCP SYN flood attacks, 70–71, 70
TCP wrappers, 226–227, 530
teardrop attacks, 530
telecom/PBX systems, 115–116, 116
Telnet
checking port or protocol availability with, 69
defined, 531
as protocol, 61
TEMPEST shielding protection, 274
10Base-T network with attached sniffer, 146, 146
Terminal Access Controller Access Control System (TACACS/+), 125, 531
terminal emulator, 531
terminating resistor, 141, 144
termination policies, 424, 531
test accounts, 531
test engine, xvi
TFTP (Trivial File Transfer Protocol), 532
thin clients, 153
third party, 430, 531
threats
exam objectives, 49
identifying, 32–35, 33
external threats, 34–35, 509
internal threats, 33–34, 513
to secure networks, 214–216
to TCP/IP, 68–75, 139–141, 169–170, 220–221
three-tier model, 245–246, 531
3DES (Triple-DES), 321, 500, 532
Time to Live (TTL), 531
TLS (Transport Layer Security)
as cryptography standard, 365–366, 366
defined, 133, 532
tokens, 15, 15, 527, 531
toolkits for computer forensics, 456
Tracert, 531
trade publications, 480–481
trailer, 531
transceiver, 112, 531
transmission
defined, 531
of viruses, 83
transmission media, 532
Transport layer, 60, 61–62, 532
Transport Layer Security. See TLS
transposition ciphers, 312
Triple-DES (3DES), 321, 500, 532
Trivial File Transfer Protocol (TFTP), 532
Trojan horses, 80, 83–84, 532
True Secure, 480
Trust List, 532
trust models, 338–343
bridge, 339–340, 341
granularity, 339
hierarchical, 339, 340
hybrid, 342–343, 342
mesh, 341–342, 341
overview, 338–339
trusted transaction, 430
TTL (Time to Live), 531
tunneling
defined, 29–30, 30, 532
ICMP, 74
protocols for, 126–127
two-factor authentication, 532
two-tier database model, 245
two-tier model, 532
|
|