Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [312]

By Root 3144 0

armored virus

ARO (annualized rate of occurrence)

Art of Deception: Controlling the Human Element of Security (Mitnick)

assets identification

asymmetric algorithms

at service

AT&T Wireless, Network Operations Center (NOC)

attachments to e-mail

common file extensions

attack strategies

access attacks

exam essentials

modification attacks

recognizing

backdoor attacks

man-in-the-middle attacks

password-guessing attacks

privilege escalation

replay attacks

spoofing attacks

repudiation attacks

responding to

review questions

attacks

frequency of

through NetBIOS services

attributes, for Unix file or directory

audit

audit files

for database transactions

audit logs

auditing

administrative auditing

escalation auditing

and log files

privilege auditing

processes

reporting to management

usage auditing

auditors

authentication

biometrics

certificates. See also certificates

Challenge Handshake Authentication Protocol (CHAP)

in cryptographic systems

issues

Kerberos

SSO and

time synchronization for

multi-factor

mutual

Password Authentication Protocol (PAP)

for remote user

security tokens

smart cards

individuals forgetting

for keys

username/password

in WAP

authentication factors

Authentication Header (AH)

authentication protection

Automated System Recovery, in Windows Server 2003, lab

Automatic Private IP Addressing (APIPA)

availability, as topology design goal

B

Back Orifice

backdoor attacks

background investigations

BackTrack

backup plan

developing

backup policy

drafting and documentation

backup power

Backup Server method

backups

for disaster recovery

media

recovery

security for

in SuSE Linux, lab

troubleshooting management

types

baseband signaling

vs. broadband

coaxial cable support for

baselines

for Internet access, lab

for security

troubleshooting

standards

basic input/output (BIOS) chip

.bat file extension

BCP. See Business Continuity Planning (BCP)

behavior-based baseline for IDS

Bell La-Padula model of information access

benchmarking

best practices

defining responsibility

drafting and documentation

backup policy

change documentation

configuration management policies

information classification policies

information destruction policies

information retention and storage policies

logs and inventories

notification policies

security policies

system architecture

use policies

user management

minimizing mistakes

policy and procedure enforcement

resource allocation

beta test software

BIA (Business Impact Analysis)

Biba model of information access

bindery services, in NetWare

binding

biometrics

BIOS (basic input/output) chip

birthday attack

Bitlocker

black lists

blind/anonymous FTP

block cipher

Blowfish encryption system

blue jacking

bluesnarfing

Bluetooth

BNC connectors

bootable CD

bootable portable operating system

booting to good Windows configuration, lab

botnet

bounced e-mails, log report of

bridge trust models for PKI

bridges

broadband signaling

vs. baseband

coaxial cable support for

broadcasts

in IM systems

brute-force attack

for code breaking

budget, for security

buffer overflow

vulnerabilities of

Business Continuity Planning (BCP)

disaster recovery plans (DRPs)

backups

creating

planning for alternate sites

testing

troubleshooting

high availability

fault tolerance

formulating

RAID

redundancy

testing

troubleshooting

utilities

vendor support reinforcement

code escrow agreements

service-level agreement (SLA)

Business Impact Analysis (BIA)

business partner, creating corporate connection to

business policies

document disposal and destruction policies

due care policies

physical access control policies

separation of duties

Return Main Page Previous Page Next Page

®Online Book Reader