Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [321]

By Root 3262 0

Post Office Protocol (POP)

port

postmortem

POTS (Plain Old Telephone Service)

power conditioners

power generators

power systems

PPP (Point-to-Point Protocol)

remote access with

PPTP (Point-to-Point Tunneling Protocol)

preauthentication systems, for remote access

Pretty Good Privacy (PGP)

prevention, as information security goal

previous keys

prime numbers, and key generation

principle, for Key Distribution Center

print servers, hardening

privacy

for IM systems

information obtained through monitoring

policies

privacy regulation

Computer Fraud and Abuse Act

Computer Security Act of 1987

Cyber Security Enhancement Act

Cyberspace Electronic Security Act (CESA)

Family Education Rights and Privacy Act

Gramm-Leach-Bliley Act of 1999

Health Insurance Portability and Accountability Act (HIPAA)

international efforts

PATRIOT act

Private Branch Exchange (PBX) system

attack

private information

clearing from Firefox, lab

clearing from Internet Explorer, lab

data classification

private IP addresses

NAT assignment to internal hosts

private key

protection

privilege auditing

privilege creep

privilege management

access control

auditing

administrative auditing

escalation auditing

and log files

privilege auditing

reporting to management

usage auditing

decision making

privilege escalation

user and group role management

procedures. See best practices; policies and procedures

processes

counting number running in Linux, lab

identifying running, lab

terminating

programs. See applications

promiscuous mode, for NIC

protocol analyzers

protocols

antiquated

checking available on system

configuring

enabling and disabling

well-known ports

working with

proxy, NAT as

proxy firewalls

ps utility (Linux), lab

public data classification

public domain cryptography

public information

public key

distribution procedure

Public Key Cryptography (PKC)

Public-Key Cryptography Standards (PKCS)

Public Key Infrastructure (PKI)

certificate authorities (CA)

certificate implementation

certificate policies

certificate revocation

trust models

bridge

hierarchical

hybrid

mesh

X.509 standard

purpose statement

in guidelines document

in standards statement

PUT command (FTP)

PuTTY

Q

quantum cryptography

queries in SQL

R

radio frequency interference (RFI)

radio frequency (RF) communications

RADIUS (Remote Authentication Dial-In User Service)

RAID (Redundant Array of Independent Disks)

rainbow tables

RDN (Relative Distinguished Name)

real time detection

reciprocal agreement

reconstitution

recovering keys

recovery. See also disaster recovery plans (DRPs)

from backups

Red Hat, website on security

redundancy

Redundant Array of Independent Disks (RAID)

reference documents, for standards

registrar

registration authority (RA)

Registry

editing to display message at login

virus change to

relational database

Relative Distinguished Name (RDN)

releases, to repair multiple problems

relying party, in transaction

remote access

network connections for

with Point-to-Point Protocol

troubleshooting

with tunneling protocols

with wireless protocols

Remote Access Services (RAS)

remote authentication

Remote Authentication Dial-In User Service (RADIUS)

remote clients, compromise of

remote control/remote shell, troubleshooting security

remote desktop, running, lab

Remote Procedure Call (RPC)

removable media

CD-R/DVD-R

diskettes

flash cards

hard drives

network attached storage

smart cards

tape

USB drives

and virus spread

renewing keys

replay attacks

reporting audit to management

repudiation attacks

Requests for Comments (RFCs)

1466 on subnetting

1918 on subnetting

rescue disk, in Linux, lab

resources, in Linux

response, as information security

Return Main Page Previous Page Next Page

®Online Book Reader