Index_D


D

Data
availability, 24
categorization, 27 “28
flooding, 211, 212 “13
hijacking, 211, 213
integrity, 23, 203
mobile, securing, 147 “48
sensitive, 310
Data Encryption Standard (DES), 150, 152 “54
defined, 152
functioning of, 153 “54
Triple, 154 “55
uses, 152 “53
See also Encryption schemes
Decentralized Administration Model, 32
Defense-in-Depth strategy, 52 “56
defined, 52
detect and respond infrastructure, 55 “56
IATF and, 53
key management infrastructure, 55
operations, 53
people, 52 “53
technology, 53
De-Militarized Zone (DMZ), 189 “90
Denial of Service (DoS) attacks, 38, 53, 210 “13
baselining analysis, 283
data flooding, 211, 212 “13
hijacking, 211, 213
jamming, 210, 211
types of, 210 “11
See also Attacks
Detect and respond infrastructure, 55 “56
Device security, 140
Device-specific APIs, 147
Dictionary attacks, 42
Digital certificates, 135, 256
Digital signature process, 135
Directory Information Tree (DIT), 300
Discretionary access control, 26, 28 “29
Disruption of service, 72
Distribute Denial-of-Service (DDoS) attacks, 53
Distribution attacks, 52
Domains
defined, 47
single sign-on, 140
Dynamic Host Configuration Protocol (DHCP), 181
for authentication, 280 “82
clients , 281
servers, 281, 282
Dynamic WEP, 227 “40
defined, 227 “28
key updates, 228



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net