Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [322]

By Root 3268 0
goal

responsibilities

accountability and

defining

in guidelines document

in standards statement

restore point in Windows XP, lab

restricted information

retinal scanners

retrovirus

reverse hash matching

reverse lookups

review questions

attack strategies

cryptography

hardening

information security

infrastructure

intrusion detection systems (IDSs)

physical security

policies and procedures

security management

revoking keys

RF collar

RF (radio frequency) communications

RFCs. See Requests for Comments (RFCs)

RFI (radio frequency interference)

Rijmen, Vincent

Rijndael algorithm

RIP (Routing Information Protocol)

risk analysis

risk assessment

computations

conducting

Rivest, Ron

Rivest, Shamir, and Adleman (RSA) algorithm

Rivest’s Cipher

rogue access points

rogue servers

Role-Based Access Control (RBAC) model

roles

in guidelines document

in security process

in standards statement

root CA

root directories

rootkits

rot13 encoding algorithm

rotation schemes for tape

routers

and block for external attacks

configuring

as defense against external attacks

and security zones

Routing and Remote Access Services (RRAS)

Routing Information Protocol (RIP)

routing table, lab

RPC (Remote Procedure Call)

RSA (Rivest, Shamir, and Adleman) algorithm

rubber hose attack

Rule-Based Access Control (RBAC)

S

S-HTTP (Secure HTTP)

S/MIME (Secure Multipurpose Internet Mail Extensions)

salt

sandbox, for Java applets

SANS Institute

policy website

scanner

scanning

environment

scanning ports

schemes

Schneier, Bruce

scope statement

in guidelines document

in policy

in standards statement

.scr file extension

screensaver password

for openSUSE, lab

for Windows XP, lab

scripts

Common Gateway Interface (CGI)

disabling

to turn off unneeded Unix service

secret handshake

secret information

Secure Electronic Transaction (SET)

Secure File Transfer Protocol (SFTP)

Secure Hash Algorithm (SHA)

Secure HTTP (S-HTTP)

Secure Multipurpose Internet Mail Extensions (S/MIME)

Secure Shell (SSH)

Secure Sockets Layer (SSL)

in Windows Server 2003, lab

SecureLogix, voice firewall

SecurID

security

analogy

baselines for

troubleshooting

circumventing

evaluating

standards

from Windows Server 2003 administrator’s view

of wireless connection

Security Center dialog box

Security+ certificate

Security Enhanced Linux (SELinux)

configuring in Fedora, lab

security events, locating in Windows XP, lab

Security Focus

security groups

security guard

security logs

security management. See also best practices

exam essentials

privacy regulation

Computer Fraud and Abuse Act

Computer Security Act of 1987

Cyber Security Enhancement Act

Cyberspace Electronic Security Act (CESA)

Family Education Rights and Privacy Act

Gramm-Leach-Bliley Act of 1999

Health Insurance Portability and Accountability Act (HIPAA)

international efforts

PATRIOT act

review questions

security awareness and education program

simplifying

staying current

trade publications

websites tracking issues

security policies

drafting and documentation

personnel knowledge of

security process

access control implementation

antivirus software

authentication

biometrics

certificates. See also certificates

Challenge Handshake Authentication Protocol (CHAP)

in cryptographic systems

issues

Kerberos

multi-factor

mutual

Password Authentication Protocol (PAP)

for remote user

security tokens

smart cards

username/password

in WAP

security professional

security templates

comparing system to, lab

security tokens

security topologies

business concerns

assets identification

risk assessment

threat identification

design goals

security zones

demilitarized zones (DMZ)

extranets


Return Main Page Previous Page Next Page

®Online Book Reader