CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [318]
Key Exchange Algorithm (KEA)
key life cycle
key management. See also private key; public key infrastructure (PKI)
centralized vs. decentralized generation
destruction
expiration
key escrow
recovery and archiving
renewal
revocation
storage and distribution
suspension
troubleshooting
usage
keystroke loggers, hardware-based
Klez32 virus
L
L2F (Layer 2 Forwarding)
L2TP (Layer 2 Tunneling Protocol)
LANMAN protocol
passwords
last command
last known good configuration, booting to, lab
lastlog utility
lab
latency
law enforcement
key escrow for
rules of evidence
Layer 2 Forwarding (L2F)
Layer 2 Tunneling Protocol (L2TP)
LCP (Link Control Protocol)
LDAP (Lightweight Directory Access Protocol)
openSUSE as client, lab
port
leaf CA
leaf objects in NetWare
least privilege
legal notice, adding to computer startup, lab
license server
Lightweight Directory Access Protocol (LDAP)
openSUSE as client, lab
port
limited distribution information
Link Control Protocol (LCP)
Linux. See also Unix/Linux
changing ACL on all files in directory, lab
changing password, lab
changing permissions on all files in directory, lab
counting number of running processes, lab
default permissions for new files, lab
encryption in, lab
help for utilities
hiding file, lab
identifying running processes, lab
installing snort, lab
log files in
network traffic monitoring, lab
Novell product conversion to
rescue disk in, lab
resources in
routing table, lab
setup for lab exercises
updating system, lab
viewing failed login attempts, lab
viewing logins, lab
LinuxSecurity
Local Area Connection Properties dialog box, General tab
local policies
local registration authority (LRA)
locking down desktop
locks
logged warnings, viewing in openSUSE, lab
logging
in IDS
in Linux
logic bombs
logical tokens
login prompt, message display prior to accessing, lab
logins
viewing failed attempts in Linux, lab
viewing in Linux, lab
logon process
spoofing attacks as part of
logon spoofing
logs
and auditing
drafting and documentation
Event Viewer for reviewing
in Linux
reviewing
low-level format
LRA (local registration authority)
M
M of N Control method of access
MAC, various meanings of acronym
MAC (Mandatory Access Control) model
MAC (Media Access Control) address
MAC (message authentication code)
for verifying integrity
macro virus
Magic Lantern
maintenance contracts
maintenance requirements, in standards
malicious code, surviving
malicious events, preventing
malware
training users to avoid
man-in-the-middle attacks
man tool
Managed Security Service Provider (MSSP)
management
education on security issues
manager
Mandatory Access Control (MAC) model
mandatory vacations
mantrap
masquerading
mathematical attacks
mathematical cryptography
McAfee Corporation
MD (Message Digest Algorithm)
mean time between failure (MTBF)
mean time to repair (MTTR)
media
Media Access Control (MAC) address
Media Access layer
Melissa virus
memory dump, to obtain key
memory sticks
mesh trust models for PKI
message authentication code (MAC)
for verifying integrity
Message Digest Algorithm (MD)
metal oxide varistors (MOVs)
Microsoft
AntiSpyware
Baseline Security Analyzer, lab
Internet Information Services (IIS)
default mail system in early versions
security patches
Office, susceptibility to exploitation
protocols
SQL Server
Systems Management Server (SMS) package
TechNet website
website on security
Windows Group Policy FAQ
microwave systems
middletier server
military classification of information
MIME
minimum age of passwords, changing in Windows XP, lab
misuse-detection IDS
Mitnick, Kevin, Art of Deception: Controlling the Human Element of Security
mobile