|
|
L2TP protocol, 453
LAND attacks, 514
LANMAN hashes, 341
LANs (Local Area Networks), 408-424
large packet pings, 514
law enforcement, 301
Layer 2 Tunneling Protocol (L2TP), 453
layered design, for data protection, 141
layouts, 409-416
least privilege, 107-109
vs. separation of duties, 122
levels of access, 6
lifecycle
of keys, 368-379
of security, 115-117
System Development Life Cycle (SDLC), 187
link encryption, 402
link viruses, 486
LLC frames, 420
Local Area Networks (LANs), 408-424
locality, 364
log analysis, 292
log watching, 214
logging, 38-40, 177
audit trails and, 196-198
logic bombs, 131, 484, 491
logical access control, 329
logical/technical access control policy implementations, 59
long keys, 377
Loose Source Record Route (LSRR), 519
Lucifer algorithm, 334
|
|