CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [312]
armored virus
ARO (annualized rate of occurrence)
Art of Deception: Controlling the Human Element of Security (Mitnick)
assets identification
asymmetric algorithms
at service
AT&T Wireless, Network Operations Center (NOC)
attachments to e-mail
common file extensions
attack strategies
access attacks
exam essentials
modification attacks
recognizing
backdoor attacks
man-in-the-middle attacks
password-guessing attacks
privilege escalation
replay attacks
spoofing attacks
repudiation attacks
responding to
review questions
attacks
frequency of
through NetBIOS services
attributes, for Unix file or directory
audit
audit files
for database transactions
audit logs
auditing
administrative auditing
escalation auditing
and log files
privilege auditing
processes
reporting to management
usage auditing
auditors
authentication
biometrics
certificates. See also certificates
Challenge Handshake Authentication Protocol (CHAP)
in cryptographic systems
issues
Kerberos
SSO and
time synchronization for
multi-factor
mutual
Password Authentication Protocol (PAP)
for remote user
security tokens
smart cards
individuals forgetting
for keys
username/password
in WAP
authentication factors
Authentication Header (AH)
authentication protection
Automated System Recovery, in Windows Server 2003, lab
Automatic Private IP Addressing (APIPA)
availability, as topology design goal
B
Back Orifice
backdoor attacks
background investigations
BackTrack
backup plan
developing
backup policy
drafting and documentation
backup power
Backup Server method
backups
for disaster recovery
media
recovery
security for
in SuSE Linux, lab
troubleshooting management
types
baseband signaling
vs. broadband
coaxial cable support for
baselines
for Internet access, lab
for security
troubleshooting
standards
basic input/output (BIOS) chip
.bat file extension
BCP. See Business Continuity Planning (BCP)
behavior-based baseline for IDS
Bell La-Padula model of information access
benchmarking
best practices
defining responsibility
drafting and documentation
backup policy
change documentation
configuration management policies
information classification policies
information destruction policies
information retention and storage policies
logs and inventories
notification policies
security policies
system architecture
use policies
user management
minimizing mistakes
policy and procedure enforcement
resource allocation
beta test software
BIA (Business Impact Analysis)
Biba model of information access
bindery services, in NetWare
binding
biometrics
BIOS (basic input/output) chip
birthday attack
Bitlocker
black lists
blind/anonymous FTP
block cipher
Blowfish encryption system
blue jacking
bluesnarfing
Bluetooth
BNC connectors
bootable CD
bootable portable operating system
booting to good Windows configuration, lab
botnet
bounced e-mails, log report of
bridge trust models for PKI
bridges
broadband signaling
vs. baseband
coaxial cable support for
broadcasts
in IM systems
brute-force attack
for code breaking
budget, for security
buffer overflow
vulnerabilities of
Business Continuity Planning (BCP)
disaster recovery plans (DRPs)
backups
creating
planning for alternate sites
testing
troubleshooting
high availability
fault tolerance
formulating
RAID
redundancy
testing
troubleshooting
utilities
vendor support reinforcement
code escrow agreements
service-level agreement (SLA)
Business Impact Analysis (BIA)
business partner, creating corporate connection to
business policies
document disposal and destruction policies
due care policies
physical access control policies
separation of duties