Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [311]

By Root 3304 0
devices, organized by job function or proximity to shared resources.

working copy The copy of the data currently in use on a network.

workstation A computer that isn’t a server but is on a network. Generally, a workstation is used to do work, whereas a server is used to store data or perform a network function.

World Wide Web Consortium (W3C) An association concerned with interoperability, growth, and standardization of the World Wide Web (WWW). This group is the primary sponsor of XML and other web-enabled technologies.

worm A program similar to a virus. Worms, however, propagate themselves over a network. See also virus.

X

X.500 The International Telecommunications Union (ITU) standard for directory services in the late 1980s. The standard was the basis for later models of directory structure, such as Lightweight Directory Access Protocol (LDAP).

Z

zombie Any system taking directions from a master control computer. Zombies are often utilized in distributed denial of service (DDoS) attacks.

zone An area in a building where access is individually monitored and controlled.

Index


Note to the reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.

Symbols and Numbers

$ (dollar sign), for hidden shares, lab

3DES (Triple-DES)

8.3 file naming

802.11 protocol

802.16 standard

2600: The Hacker Quarterly

A

ABA (American Bankers Association)

acceptable use policy

access control

common methods

in cryptographic systems

implementation

for information

location of computers

partitioning

perimeter security

physical barriers

security zones

three-layer security model

troubleshooting

access control list (ACL)

changing on all files in Linux directory, lab

to control spam

access control models

Bell La-Padula model

Biba model

Clark-Wilson model

Information Flow model

Noninterference model

account database in Windows XP, encryption, lab

accountability

as topology design goal

accountability statement, in policy

accounts

changing default names

expiration

ACL. See access control list (ACL)

active/active model

active backup model

Active Directory (AD)

active sniffing

ActiveX, vulnerabilities of

activity

AD. See Active Directory (AD)

Adams, Carlisle

AdAware

Address Resolution Protocol (ARP)

Adleman, Leonard

administrative auditing

administrative policies

administrative requirements, in standards

administrative shares, in Windows systems

administrator

user accounts with access as, lab

Adobe Reader

Advanced Encryption Standard (AES)

adware

AES (Advanced Encryption Standard)

AES256

AFS (Apple File Sharing)

AH (Authentication Header)

alarm systems

ALE (annual loss expectancy)

alert

algorithms

attacking

errors, for code breaking

American Bankers Association (ABA)

analyzer

annual loss expectancy (ALE)

annualized rate of occurrence (ARO)

anomaly-detection IDS

anonymity, on Internet

anonymous authentication, in WAP

anonymous logon, to FTP site

anti-antiviruses

antiquated protocols

antivirus software

definition database files for

log files

retrovirus attack of

troubleshooting

APIPA (Automatic Private IP Addressing)

AppArmor

configuring in openSUSE, lab

viewing reports, lab

Apple File Sharing (AFS)

Apple Macintosh, hardening

Apple protocol

AppleTalk

appliances

firewalls as

Application layer

application-level proxy functions

Application Programming Interface (API)

applications

backup plan for

design requirements

exploitation

hardening

DHCP services

DNS servers

e-mail servers

file and print servers

FTP servers

NNTP servers

web servers

removing unneeded

types

updates

upgrades to new versions, timing of

users installing unauthorized

apropos utility

archive

archive bit

archiving

keys

media for

Return Main Page Previous Page Next Page

®Online Book Reader