CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [321]
Post Office Protocol (POP)
port
postmortem
POTS (Plain Old Telephone Service)
power conditioners
power generators
power systems
PPP (Point-to-Point Protocol)
remote access with
PPTP (Point-to-Point Tunneling Protocol)
preauthentication systems, for remote access
Pretty Good Privacy (PGP)
prevention, as information security goal
previous keys
prime numbers, and key generation
principle, for Key Distribution Center
print servers, hardening
privacy
for IM systems
information obtained through monitoring
policies
privacy regulation
Computer Fraud and Abuse Act
Computer Security Act of 1987
Cyber Security Enhancement Act
Cyberspace Electronic Security Act (CESA)
Family Education Rights and Privacy Act
Gramm-Leach-Bliley Act of 1999
Health Insurance Portability and Accountability Act (HIPAA)
international efforts
PATRIOT act
Private Branch Exchange (PBX) system
attack
private information
clearing from Firefox, lab
clearing from Internet Explorer, lab
data classification
private IP addresses
NAT assignment to internal hosts
private key
protection
privilege auditing
privilege creep
privilege management
access control
auditing
administrative auditing
escalation auditing
and log files
privilege auditing
reporting to management
usage auditing
decision making
privilege escalation
user and group role management
procedures. See best practices; policies and procedures
processes
counting number running in Linux, lab
identifying running, lab
terminating
programs. See applications
promiscuous mode, for NIC
protocol analyzers
protocols
antiquated
checking available on system
configuring
enabling and disabling
well-known ports
working with
proxy, NAT as
proxy firewalls
ps utility (Linux), lab
public data classification
public domain cryptography
public information
public key
distribution procedure
Public Key Cryptography (PKC)
Public-Key Cryptography Standards (PKCS)
Public Key Infrastructure (PKI)
certificate authorities (CA)
certificate implementation
certificate policies
certificate revocation
trust models
bridge
hierarchical
hybrid
mesh
X.509 standard
purpose statement
in guidelines document
in standards statement
PUT command (FTP)
PuTTY
Q
quantum cryptography
queries in SQL
R
radio frequency interference (RFI)
radio frequency (RF) communications
RADIUS (Remote Authentication Dial-In User Service)
RAID (Redundant Array of Independent Disks)
rainbow tables
RDN (Relative Distinguished Name)
real time detection
reciprocal agreement
reconstitution
recovering keys
recovery. See also disaster recovery plans (DRPs)
from backups
Red Hat, website on security
redundancy
Redundant Array of Independent Disks (RAID)
reference documents, for standards
registrar
registration authority (RA)
Registry
editing to display message at login
virus change to
relational database
Relative Distinguished Name (RDN)
releases, to repair multiple problems
relying party, in transaction
remote access
network connections for
with Point-to-Point Protocol
troubleshooting
with tunneling protocols
with wireless protocols
Remote Access Services (RAS)
remote authentication
Remote Authentication Dial-In User Service (RADIUS)
remote clients, compromise of
remote control/remote shell, troubleshooting security
remote desktop, running, lab
Remote Procedure Call (RPC)
removable media
CD-R/DVD-R
diskettes
flash cards
hard drives
network attached storage
smart cards
tape
USB drives
and virus spread
renewing keys
replay attacks
reporting audit to management
repudiation attacks
Requests for Comments (RFCs)
1466 on subnetting
1918 on subnetting
rescue disk, in Linux, lab
resources, in Linux
response, as information security