CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [322]
responsibilities
accountability and
defining
in guidelines document
in standards statement
restore point in Windows XP, lab
restricted information
retinal scanners
retrovirus
reverse hash matching
reverse lookups
review questions
attack strategies
cryptography
hardening
information security
infrastructure
intrusion detection systems (IDSs)
physical security
policies and procedures
security management
revoking keys
RF collar
RF (radio frequency) communications
RFCs. See Requests for Comments (RFCs)
RFI (radio frequency interference)
Rijmen, Vincent
Rijndael algorithm
RIP (Routing Information Protocol)
risk analysis
risk assessment
computations
conducting
Rivest, Ron
Rivest, Shamir, and Adleman (RSA) algorithm
Rivest’s Cipher
rogue access points
rogue servers
Role-Based Access Control (RBAC) model
roles
in guidelines document
in security process
in standards statement
root CA
root directories
rootkits
rot13 encoding algorithm
rotation schemes for tape
routers
and block for external attacks
configuring
as defense against external attacks
and security zones
Routing and Remote Access Services (RRAS)
Routing Information Protocol (RIP)
routing table, lab
RPC (Remote Procedure Call)
RSA (Rivest, Shamir, and Adleman) algorithm
rubber hose attack
Rule-Based Access Control (RBAC)
S
S-HTTP (Secure HTTP)
S/MIME (Secure Multipurpose Internet Mail Extensions)
salt
sandbox, for Java applets
SANS Institute
policy website
scanner
scanning
environment
scanning ports
schemes
Schneier, Bruce
scope statement
in guidelines document
in policy
in standards statement
.scr file extension
screensaver password
for openSUSE, lab
for Windows XP, lab
scripts
Common Gateway Interface (CGI)
disabling
to turn off unneeded Unix service
secret handshake
secret information
Secure Electronic Transaction (SET)
Secure File Transfer Protocol (SFTP)
Secure Hash Algorithm (SHA)
Secure HTTP (S-HTTP)
Secure Multipurpose Internet Mail Extensions (S/MIME)
Secure Shell (SSH)
Secure Sockets Layer (SSL)
in Windows Server 2003, lab
SecureLogix, voice firewall
SecurID
security
analogy
baselines for
troubleshooting
circumventing
evaluating
standards
from Windows Server 2003 administrator’s view
of wireless connection
Security Center dialog box
Security+ certificate
Security Enhanced Linux (SELinux)
configuring in Fedora, lab
security events, locating in Windows XP, lab
Security Focus
security groups
security guard
security logs
security management. See also best practices
exam essentials
privacy regulation
Computer Fraud and Abuse Act
Computer Security Act of 1987
Cyber Security Enhancement Act
Cyberspace Electronic Security Act (CESA)
Family Education Rights and Privacy Act
Gramm-Leach-Bliley Act of 1999
Health Insurance Portability and Accountability Act (HIPAA)
international efforts
PATRIOT act
review questions
security awareness and education program
simplifying
staying current
trade publications
websites tracking issues
security policies
drafting and documentation
personnel knowledge of
security process
access control implementation
antivirus software
authentication
biometrics
certificates. See also certificates
Challenge Handshake Authentication Protocol (CHAP)
in cryptographic systems
issues
Kerberos
multi-factor
mutual
Password Authentication Protocol (PAP)
for remote user
security tokens
smart cards
username/password
in WAP
security professional
security templates
comparing system to, lab
security tokens
security topologies
business concerns
assets identification
risk assessment
threat identification
design goals
security zones
demilitarized zones (DMZ)
extranets