Index_E


E

EAP, 231 “34
advantages, 231
authentication process, 232
authentication types, 234 “40
development, 232
dynamic key generation, 230
implementation, 232
LEAP, 234 “35
EAP-MD5, 237 “38
defined, 237
security risks, 238
EAP-TLS, 235 “36
advantages, 236
defined, 235
mutual authentication, 235
security features, 237
EAP-TTLS, 236 “37
authentication, 236, 237
defined, 236
Economic and Espionage Act of 1996, 10 “11
Economic espionage, 10
Elementary ACLs, 34
E-mail, 172 “74
nationwide search warrants for, 108
policy, 172 “74
Win32.Sobig.F worm, 172 “74
Employees
sabotage , 7 “8
termination procedures, 170
Enclave boundaries, 49
Encryption, 33 “34
for Access Control, 33 “34
defined, 33
settings, establishing, 178
Encryption schemes, 150 “56
AES, 150 “52
DES, 152 “54
RSA encryption, 155 “56
Triple DES, 154 “55
See also WLANs
Enterprise Encryption Gateways (EEGs), 264
Enterprise Wireless Gateways (EWGs), 264 “67, 272, 284, 301
appliances, 265 “66
defined, 264 “65
firewall features, 265
scalability, 267
selection, 266
software, 266
types of, 265
uses, 265
Eradication, 78 “79
Espionage, 72
economic, 10
industrial, 9 “12
Ethics, 113 “14
Ettercap, 206
Exploitable WLAN configurations, 199
Extensible Authentication Protocol (EAP), 271
External Access Controls, 36



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net