Index


A

Access control administration models, 31 “33
Centralized Administration Model, 31 “32
Decentralized Administration Model, 32
Hybrid Administration Model, 32 “33
Access Control Lists (ACLs), 34 “35
advanced, 34
defined, 34
elementary, 34
examples, 35
Access control models, 26 “30
data categorization, 27 “28
discretionary access control, 28 “29
mandatory access control, 26 “27
nondiscretionary access control, 29 “30
Access Control(s), 23 “38
administration models, 31 “33
bypass techniques, 38
criteria, 25 “26
discretionary, 26, 28 “29
distributed, 139 “40
encryption, 33 “34
entities, 24
external, 36
fundamental concepts, 24 “25
identity-based, 26, 28
internal, 33
mandatory, 26 “27
mechanisms, 33 “38
non-discretionary, 26
passwords, 33
purpose, 23 “24
Role-Based, 269 “70
user -discretionary, 26, 28
uses, 30 “31
Access management, 23 “44
Access points, 214
Access Policy, 163
Accountability, 25
Accountability Policy, 164
Acquisition Guidelines Policy, 164
Active attacks, 199
defined, 51, 200
performing, 200
See also Attacks; Passive attacks
Advanced ACLs, 34 “35
Advanced Encryption Standard (AES), 150 “52, 302
block sizes and, 151
cipher, 151 “52
defined, 150
evaluation criteria, 151 “52
See also Encryption schemes
Agency Data Telecommunications Network (ADTN), 50
AiroPeek NX, 197 “98
Antennas, 210
Application-based attacks, 86
Application layer analyzers, 215
Assets, identifying, 167 “68
Assurance, 25
AtGuard, 63 “64
Attacks
active, 51, 199
application-based, 86
brute force, 42
close-in, 51
DDoS, 53
dictionary, 42
distribution, 52
DoS, 38, 53
hybrid, 42
infrastructure, 8
insider, 51 “52
malicious code, 71 “72
passive, 51, 199, 200
password, 44, 334, 354
unpredictability of, 278
Web-based, 87 “90
WLAN, 200 “201
Audit and discovery tools, 196 “98
AiroPeek NX, 197 “98
Kismet, 197
MiniStumbler, 196
NetStumbler, 196
Sniffer Wireless, 198
Audits, 16
Authentication, 138
802.1x, 229
DHCP services for, 280 “82
EAP, 232, 234 “40
EAP-TLS, 235
EAP-TTLS, 236, 237
host-based, 37 “38
IPSec, 257
Java and, 137
multifactor , 301 “2
mutual, 283
public key, 256 “58
weakness exploitation, 204
WPA, 304
Authentication Policy, 164
Availability Statements, 164
Awareness, 14



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net