CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [311]
working copy The copy of the data currently in use on a network.
workstation A computer that isn’t a server but is on a network. Generally, a workstation is used to do work, whereas a server is used to store data or perform a network function.
World Wide Web Consortium (W3C) An association concerned with interoperability, growth, and standardization of the World Wide Web (WWW). This group is the primary sponsor of XML and other web-enabled technologies.
worm A program similar to a virus. Worms, however, propagate themselves over a network. See also virus.
X
X.500 The International Telecommunications Union (ITU) standard for directory services in the late 1980s. The standard was the basis for later models of directory structure, such as Lightweight Directory Access Protocol (LDAP).
Z
zombie Any system taking directions from a master control computer. Zombies are often utilized in distributed denial of service (DDoS) attacks.
zone An area in a building where access is individually monitored and controlled.
Index
Note to the reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.
Symbols and Numbers
$ (dollar sign), for hidden shares, lab
3DES (Triple-DES)
8.3 file naming
802.11 protocol
802.16 standard
2600: The Hacker Quarterly
A
ABA (American Bankers Association)
acceptable use policy
access control
common methods
in cryptographic systems
implementation
for information
location of computers
partitioning
perimeter security
physical barriers
security zones
three-layer security model
troubleshooting
access control list (ACL)
changing on all files in Linux directory, lab
to control spam
access control models
Bell La-Padula model
Biba model
Clark-Wilson model
Information Flow model
Noninterference model
account database in Windows XP, encryption, lab
accountability
as topology design goal
accountability statement, in policy
accounts
changing default names
expiration
ACL. See access control list (ACL)
active/active model
active backup model
Active Directory (AD)
active sniffing
ActiveX, vulnerabilities of
activity
AD. See Active Directory (AD)
Adams, Carlisle
AdAware
Address Resolution Protocol (ARP)
Adleman, Leonard
administrative auditing
administrative policies
administrative requirements, in standards
administrative shares, in Windows systems
administrator
user accounts with access as, lab
Adobe Reader
Advanced Encryption Standard (AES)
adware
AES (Advanced Encryption Standard)
AES256
AFS (Apple File Sharing)
AH (Authentication Header)
alarm systems
ALE (annual loss expectancy)
alert
algorithms
attacking
errors, for code breaking
American Bankers Association (ABA)
analyzer
annual loss expectancy (ALE)
annualized rate of occurrence (ARO)
anomaly-detection IDS
anonymity, on Internet
anonymous authentication, in WAP
anonymous logon, to FTP site
anti-antiviruses
antiquated protocols
antivirus software
definition database files for
log files
retrovirus attack of
troubleshooting
APIPA (Automatic Private IP Addressing)
AppArmor
configuring in openSUSE, lab
viewing reports, lab
Apple File Sharing (AFS)
Apple Macintosh, hardening
Apple protocol
AppleTalk
appliances
firewalls as
Application layer
application-level proxy functions
Application Programming Interface (API)
applications
backup plan for
design requirements
exploitation
hardening
DHCP services
DNS servers
e-mail servers
file and print servers
FTP servers
NNTP servers
web servers
removing unneeded
types
updates
upgrades to new versions, timing of
users installing unauthorized
apropos utility
archive
archive bit
archiving
keys
media for