Access control administration models, 31 “33
Centralized Administration Model, 31 “32
Decentralized Administration Model, 32
Hybrid Administration Model, 32 “33
Access Control Lists (ACLs), 34 “35
advanced, 34
defined, 34
elementary, 34
examples, 35
Access control models, 26 “30
data categorization, 27 “28
discretionary access control, 28 “29
mandatory access control, 26 “27
nondiscretionary access control, 29 “30
Access Control(s), 23 “38
administration models, 31 “33
bypass techniques, 38
criteria, 25 “26
discretionary, 26, 28 “29
distributed, 139 “40
encryption, 33 “34
entities, 24
external, 36
fundamental concepts, 24 “25
identity-based, 26, 28
internal, 33
mandatory, 26 “27
mechanisms, 33 “38
non-discretionary, 26
passwords, 33
purpose, 23 “24
Role-Based, 269 “70
user -discretionary, 26, 28
uses, 30 “31
Access management, 23 “44
Accountability Policy, 164
Acquisition Guidelines Policy, 164
Active attacks, 199
defined, 51, 200
performing, 200
See also Attacks; Passive attacks
Advanced Encryption Standard (AES), 150 “52, 302
block sizes and, 151
cipher, 151 “52
defined, 150
evaluation criteria, 151 “52
See also Encryption schemes
Agency Data Telecommunications Network (ADTN), 50
Application-based attacks, 86
Application layer analyzers, 215
Assets, identifying, 167 “68
Attacks
active, 51, 199
application-based, 86
brute force, 42
close-in, 51
DDoS, 53
dictionary, 42
distribution, 52
DoS, 38, 53
hybrid, 42
infrastructure, 8
insider, 51 “52
malicious code, 71 “72
passive, 51, 199, 200
password, 44, 334, 354
unpredictability of, 278
Web-based, 87 “90
WLAN, 200 “201
Audit and discovery tools, 196 “98
AiroPeek NX, 197 “98
Kismet, 197
MiniStumbler, 196
NetStumbler, 196
Sniffer Wireless, 198
Authentication, 138
802.1x, 229
DHCP services for, 280 “82
EAP, 232, 234 “40
EAP-TLS, 235
EAP-TTLS, 236, 237
host-based, 37 “38
IPSec, 257
Java and, 137
multifactor , 301 “2
mutual, 283
public key, 256 “58
weakness exploitation, 204
WPA, 304
Authentication Policy, 164
Availability Statements, 164