Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [313]

By Root 3229 0

C

CA. See certificate authorities (CA)

cabling

coaxial

fiber-optic technology

unshielded (UTP) and shielded twisted pair (STP)

cache in web browser, clearing, lab

CALEA (Communications Assistance for Law Enforcement Act of 1994)

callback security

caller ID verification

Canonical Name (CN)

carrier, victim system as

CAST algorithm

Category 5 cable standard

CC (Common Criteria)

CCITT (Comité Consultatif International Téléphonique et Télégraphique)

CD-R/DVD-R

CD-RW

CEH (Certified Ethical Hacker)

cell phones

acceptable use policies on

Center for Education and Research in Information Assurance and Security (CERIAS)

centralization, of network monitoring

centralized key generation

CERIAS (Center for Education and Research in Information Assurance and Security)

CERT/CC Current Activity web page

CERT Coordination Center (CERT/CC)

CERT organization

CertCities

certificate authorities (CA)

designing

in hierarchical trust model

Certificate Management Protocol (CMP)

certificate policies

Certificate Practice Statement (CPS)

Certificate Revocation List (CRL)

certificates

implementing

management, troubleshooting

certification programs

Certified Ethical Hacker (CEH)

CGI (Common Gateway Interface)

vulnerabilities of

chain of custody

Challenge Handshake Authentication Protocol (CHAP)

change documentation

drafting and documentation

change management

checksums

chgrp command

chip creep

chmod utility, lab

CIO

cipher

cipher command, lab

ciphering

circuit-level proxy

Cisco

IP Telephony Security in Dept white paper

Switched Port Analyzer (SPAN)

Cisco Certified Internetwork Expert (CCIE) certification

Clark-Wilson model of information access

classified information model

classifying information

classifying

full distribution information

government and military

internal information

limited distribution information

private information

public information

restricted information

client

Clipper

clustering, for fail-over capabilities

CMOS (complimentary metal oxide semiconductor)

CMP (Certificate Management Protocol)

CN (Canonical Name)

code escrow agreements

Code Red attack

code words

cold site

collusion

.com file extension

Comité Consultatif International Téléphonique et Télégraphique (CCITT)

Common Criteria (CC) standards

Common Gateway Interface (CGI)

vulnerabilities of

communications

of security issues

troubleshooting security

Communications Assistance for Law Enforcement Act of 1994 (CALEA)

companion CD

system requirements

troubleshooting

using

companion virus

compartmentalization

complimentary metal oxide semiconductor (CMOS)

CompTIA Security+ certification

computer battery

computer crime, state laws on

Computer Fraud and Abuse Act

Computer Management console

Computer Professionals for Social Responsibility (CPSR)

Computer Security Act of 1987

Computer Security Incident Response Team (CSIRT)

Computer Security Institute

computer startup in Windows XP

adding legal notice, lab

configuration, lab

confidential data classification

confidentiality

in cryptographic systems

of information

as topology design goal

configuration settings

group policies to lock

management policies

drafting and documentation

connection

filtering for remote access

Initial Sequence Number (ISN) for

contingency plan. See also Business Continuity Planning (BCP)

Control Panel (Vista), Security applet

cookies

limiting to first party, lab

vulnerabilities of

in web browser, clearing, lab

core dump, to obtain key

Counterpane Systems

counters, in System Monitor

CPS (Certificate Practice Statement)

CPSR (Computer Professionals for Social Responsibility)

cracking systems

credit card numbers

encryption for

transmission of information

criminal investigation

critical business functions

Return Main Page Previous Page Next Page

®Online Book Reader