CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [313]
C
CA. See certificate authorities (CA)
cabling
coaxial
fiber-optic technology
unshielded (UTP) and shielded twisted pair (STP)
cache in web browser, clearing, lab
CALEA (Communications Assistance for Law Enforcement Act of 1994)
callback security
caller ID verification
Canonical Name (CN)
carrier, victim system as
CAST algorithm
Category 5 cable standard
CC (Common Criteria)
CCITT (Comité Consultatif International Téléphonique et Télégraphique)
CD-R/DVD-R
CD-RW
CEH (Certified Ethical Hacker)
cell phones
acceptable use policies on
Center for Education and Research in Information Assurance and Security (CERIAS)
centralization, of network monitoring
centralized key generation
CERIAS (Center for Education and Research in Information Assurance and Security)
CERT/CC Current Activity web page
CERT Coordination Center (CERT/CC)
CERT organization
CertCities
certificate authorities (CA)
designing
in hierarchical trust model
Certificate Management Protocol (CMP)
certificate policies
Certificate Practice Statement (CPS)
Certificate Revocation List (CRL)
certificates
implementing
management, troubleshooting
certification programs
Certified Ethical Hacker (CEH)
CGI (Common Gateway Interface)
vulnerabilities of
chain of custody
Challenge Handshake Authentication Protocol (CHAP)
change documentation
drafting and documentation
change management
checksums
chgrp command
chip creep
chmod utility, lab
CIO
cipher
cipher command, lab
ciphering
circuit-level proxy
Cisco
IP Telephony Security in Dept white paper
Switched Port Analyzer (SPAN)
Cisco Certified Internetwork Expert (CCIE) certification
Clark-Wilson model of information access
classified information model
classifying information
classifying
full distribution information
government and military
internal information
limited distribution information
private information
public information
restricted information
client
Clipper
clustering, for fail-over capabilities
CMOS (complimentary metal oxide semiconductor)
CMP (Certificate Management Protocol)
CN (Canonical Name)
code escrow agreements
Code Red attack
code words
cold site
collusion
.com file extension
Comité Consultatif International Téléphonique et Télégraphique (CCITT)
Common Criteria (CC) standards
Common Gateway Interface (CGI)
vulnerabilities of
communications
of security issues
troubleshooting security
Communications Assistance for Law Enforcement Act of 1994 (CALEA)
companion CD
system requirements
troubleshooting
using
companion virus
compartmentalization
complimentary metal oxide semiconductor (CMOS)
CompTIA Security+ certification
computer battery
computer crime, state laws on
Computer Fraud and Abuse Act
Computer Management console
Computer Professionals for Social Responsibility (CPSR)
Computer Security Act of 1987
Computer Security Incident Response Team (CSIRT)
Computer Security Institute
computer startup in Windows XP
adding legal notice, lab
configuration, lab
confidential data classification
confidentiality
in cryptographic systems
of information
as topology design goal
configuration settings
group policies to lock
management policies
drafting and documentation
connection
filtering for remote access
Initial Sequence Number (ISN) for
contingency plan. See also Business Continuity Planning (BCP)
Control Panel (Vista), Security applet
cookies
limiting to first party, lab
vulnerabilities of
in web browser, clearing, lab
core dump, to obtain key
Counterpane Systems
counters, in System Monitor
CPS (Certificate Practice Statement)
CPSR (Computer Professionals for Social Responsibility)
cracking systems
credit card numbers
encryption for
transmission of information
criminal investigation
critical business functions