Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [314]

By Root 3028 0
(CBF)

identifying and prioritizing

CRL (Certificate Revocation List)

cross certification

cross-site scripting (XSS), vulnerabilities of

cryptanalysts

cryptographers

cryptographic algorithms

cryptographic systems

access control

attacks

authentication

confidentiality

digital signature

integrity

nonrepudiation

cryptography

exam essentials

mathematical

myth of unbreakable codes

physical

hybrid systems

steganography

substitution ciphers

transposition ciphers

public domain

quantum

review questions

SSL (Secure Sockets Layer)

standards

origins

CSIRT (Computer Security Incident Response Team)

CSO Magazine

current keys, in archiving system

custodian of data

customer care from Wiley

Cyber Security Enhancement Act

Cybercrime Treaty

Cyberspace Electronic Security Act (CESA)

D

DAC (Discretionary Access Control) method

Daemen, Joan

data assets, assigning value to

data breaches, chronology of

data classification matrix

data depositories

data emanation, radio frequency signals for

Data Encryption Standard (DES)

data source

data storage. See removable media

database transactions, audit files for

databases

exploitation

date-stamp, and user file backup

DDoS (distributed denial-of-service) attacks

decentralized key generation

default account names, changing

default password, changing

default permissions, for new files in Linux, lab

definition database files, for antivirus software

degaussing

deleting files

demilitarized zones (DMZ)

demo versions of software

denial-of-service (DoS) attacks

and NetWare

DES (Data Encryption Standard)

desensitizing

destination port

destroying keys

detection, as information security goal

DHCP (Dynamic Host Configuration Protocol)

troubleshooting

dial-up, troubleshooting security

dictionary attack

differential backup

Diffie-Hellman key exchange

digital signature

in cryptographic systems

direct-sequence spread spectrum (DSSS)

directory services

troubleshooting

disaster recovery plans (DRPs)

backups

creating

planning for alternate sites

testing

troubleshooting

Discretionary Access Control (DAC) model

disk duplexing

disk mirroring

disk striping

disk striping with parity

disk striping with parity disk

disk wiping

diskettes

Distinguished Name (DN)

distributed denial-of-service (DDoS) attacks

distributing keys

DMZ (demilitarized zones)

DN (Distinguished Name)

DNA scanners

DNS (Domain Name Service)

hardening servers

DNS poisoning

DNS spoofing

.doc file extension

documentation. See also best practices, drafting and documentation

for alternative sites

disposal and destruction policies

troubleshooting

dollar sign ($), for hidden shares, lab

Domain Name Kiting

Domain Name Service (DNS). See DNS (Domain Name Service)

domain password policy

DoS (denial-of-service) attacks

and NetWare

draft documents

DSSS (direct-sequence spread spectrum)

dual-homed firewall

dual sided certificates

due care policies

due diligence

dumpster diving

duplexing

DVD-R

Dynamic Host Configuration Protocol (DHCP)

troubleshooting

E

e-mail incident

e-mail servers, hardening

e-mails

attachments

common extensions for

encrypting

exploitation

troubleshooting

and virus spread

viruses in

EALs (Evaluation Assurance Levels)

EAP (Extensible Authentication Protocol)

eavesdropping

eBay, nonrepudiation and

EC Council

ECC (Elliptic Curve Cryptography)

EDGAR (business research website)

eDirectory

education

to prevent virus spread

on security issues

against social engineering

El Gamal algorithm

electromagnetic interference (EMI)

electronic flashcards

electronic wallet

electronic watermarking

Elliptic Curve Cryptography (ECC)

EMI (electromagnetic interference)

employees. See also users

knowledge of security

Return Main Page Previous Page Next Page

®Online Book Reader