CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [314]
identifying and prioritizing
CRL (Certificate Revocation List)
cross certification
cross-site scripting (XSS), vulnerabilities of
cryptanalysts
cryptographers
cryptographic algorithms
cryptographic systems
access control
attacks
authentication
confidentiality
digital signature
integrity
nonrepudiation
cryptography
exam essentials
mathematical
myth of unbreakable codes
physical
hybrid systems
steganography
substitution ciphers
transposition ciphers
public domain
quantum
review questions
SSL (Secure Sockets Layer)
standards
origins
CSIRT (Computer Security Incident Response Team)
CSO Magazine
current keys, in archiving system
custodian of data
customer care from Wiley
Cyber Security Enhancement Act
Cybercrime Treaty
Cyberspace Electronic Security Act (CESA)
D
DAC (Discretionary Access Control) method
Daemen, Joan
data assets, assigning value to
data breaches, chronology of
data classification matrix
data depositories
data emanation, radio frequency signals for
Data Encryption Standard (DES)
data source
data storage. See removable media
database transactions, audit files for
databases
exploitation
date-stamp, and user file backup
DDoS (distributed denial-of-service) attacks
decentralized key generation
default account names, changing
default password, changing
default permissions, for new files in Linux, lab
definition database files, for antivirus software
degaussing
deleting files
demilitarized zones (DMZ)
demo versions of software
denial-of-service (DoS) attacks
and NetWare
DES (Data Encryption Standard)
desensitizing
destination port
destroying keys
detection, as information security goal
DHCP (Dynamic Host Configuration Protocol)
troubleshooting
dial-up, troubleshooting security
dictionary attack
differential backup
Diffie-Hellman key exchange
digital signature
in cryptographic systems
direct-sequence spread spectrum (DSSS)
directory services
troubleshooting
disaster recovery plans (DRPs)
backups
creating
planning for alternate sites
testing
troubleshooting
Discretionary Access Control (DAC) model
disk duplexing
disk mirroring
disk striping
disk striping with parity
disk striping with parity disk
disk wiping
diskettes
Distinguished Name (DN)
distributed denial-of-service (DDoS) attacks
distributing keys
DMZ (demilitarized zones)
DN (Distinguished Name)
DNA scanners
DNS (Domain Name Service)
hardening servers
DNS poisoning
DNS spoofing
.doc file extension
documentation. See also best practices, drafting and documentation
for alternative sites
disposal and destruction policies
troubleshooting
dollar sign ($), for hidden shares, lab
Domain Name Kiting
Domain Name Service (DNS). See DNS (Domain Name Service)
domain password policy
DoS (denial-of-service) attacks
and NetWare
draft documents
DSSS (direct-sequence spread spectrum)
dual-homed firewall
dual sided certificates
due care policies
due diligence
dumpster diving
duplexing
DVD-R
Dynamic Host Configuration Protocol (DHCP)
troubleshooting
E
e-mail incident
e-mail servers, hardening
e-mails
attachments
common extensions for
encrypting
exploitation
troubleshooting
and virus spread
viruses in
EALs (Evaluation Assurance Levels)
EAP (Extensible Authentication Protocol)
eavesdropping
eBay, nonrepudiation and
EC Council
ECC (Elliptic Curve Cryptography)
EDGAR (business research website)
eDirectory
education
to prevent virus spread
on security issues
against social engineering
El Gamal algorithm
electromagnetic interference (EMI)
electronic flashcards
electronic wallet
electronic watermarking
Elliptic Curve Cryptography (ECC)
EMI (electromagnetic interference)
employees. See also users
knowledge of security