CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [316]
Grandfather-Father-Son backup method
grep
group policies
to lock configuration settings
groups
changing association for file, lab
GroupWise
GSM (Global System for Mobile Communications)
Guest account, turning off in Windows XP, lab
guidelines
H
Hacken9
hacking, international laws in
hand scanners
hard drives
hardening
Apple Macintosh
applications
DHCP services
DNS servers
e-mail servers
file and print servers
FTP servers
NNTP servers
web servers
exam essentials
filesystems
network devices
Novell NetWare
operating systems
review questions
troubleshooting
Unix/Linux
Windows 2000
Windows Server 2003
Windows Vista
Windows XP
hardware-based keystroke loggers
hash total
hash value
creating rule, lab
hashing
science of
hashing algorithm
Health Insurance Portability and Accountability Act (HIPAA)
Heisenberg, Werner
Heisenberg Uncertainty Principle
hiding
files in Linux, lab
IP addresses
Windows shares, lab
hierarchical trust models for PKI
high availability
fault tolerance
formulating
RAID
redundancy
HIPAA (Health Insurance Portability and Accountability Act)
hiring policies
.hlp file extension
hoaxes, identifying
Homeland Security Act of 2002, Section
honeyd
Honeynet Project
honeypot
troubleshooting
host
host-based intrusion detection systems (HIDSs)
Host-to-Host (Transport) layer
hostnames, resolving to IP addresses
hot site
hotfixes
HTML (Hypertext Markup Language)
HTTP (Hypertext Transfer Protocol)
port
HTTPS (Hypertext Transport Protocol Secure)
port
hubs
attaching N-IDS to network
human error, and encryption vulnerabilities
human resource policies
acceptable use policy
background investigations
ethics policies
hiring policies
need-to-know policies
privacy policies
termination policies
human vulnerabilities
humidity control
hushmail.com
hybrid attacks
hybrid physical cryptography systems
hybrid trust models for PKI
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
port
Hypertext Transport Protocol Secure (HTTPS)
port
I
IANA (Internet Assigned Numbers Authority)
ICMP (Internet Control Message Protocol)
disabling traffic
packets
tunneling
IDEA (International Data Encryption Algorithm)
identification and authentication (I & A)
identity proofing
identity theft
IDPS
IDSs (intrusion detection systems)
active response
components
exam essentials
host-based
network-based
passive response
review questions
troubleshooting
IEEE (Institute of Electrical and Electronics Engineers)
802.1x protocols
802.11x wireless protocols
IETF (Internet Engineering Task Force)
IGMP (Internet Group Management Protocol)
IIS. See Internet Information Services (IIS)
IIS (Internet Information Services)
default mail system in early versions
security patches
IM (instant messaging)
attacks by
privacy
vulnerabilities
IMAP (Internet Message Access Protocol)
port
impersonation
to gain access
implicit denies
incident response
adjusting procedures
cycle
damage repair
documenting and reporting
identification
investigation
plan functioning
troubleshooting
incident response plan (IRP)
incident response policies
incidents
detection
incremental backup
inductive pickup
industry associations
info utility
information
access control
classifying
full distribution information
government and military
internal information
limited distribution information
private information
public information
restricted information
social engineering to obtain
information classification policies
drafting and documentation
information destruction policies, drafting and documentation
Information Flow model of information access
information integrity
Biba model