CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [323]
Internet
intranets
technologies
Network Address Translation (NAT)
tunneling
virtual local area networks (VLAN)
virtualization
telephony issues
vulnerabilities
security triad
security zones
troubleshooting
SEI (Software Engineering Institute)
SELinux (Security Enhanced Linux)
configuring in Fedora, lab
selling old computers
and operating systems
sender, authenticating
sensitive but unclassified information
sensor
separation of duties
Sequenced Packet Exchange (SPX)
Serial Line Internet Protocol (SLIP)
servers
authentication
in WAP
as e-mail relay
hardening
implementing secure environment
security for
service-level agreement (SLA)
service packs (Microsoft)
services
enabling and disabling
removing unneeded
session hijacking attacks
sessions in web browser, clearing, lab
sessions, terminating
SET (Secure Electronic Transaction)
SFTP (Secure File Transfer Protocol)
SGID files, finding in Linux, lab
SHA (Secure Hash Algorithm)
shadow copies
Shamir, Adi
shared folders, preventing, lab
shared resources, and security risk
shareware software
sheep-dip system
shielded twisted pair (STP)
common cable specifications
shielding
shoulder surfing
SHTTP (Secure HTTP)
shunning, in IDS
signal analysis
signal intelligence
signature-based-detection IDS
signed applets, vulnerabilities of
SIM (Subscriber Identification Module)
Simple Mail Transfer Protocol (SMTP)
port
relay vulnerabilities
virus
Simple Network Management Protocol (SNMP)
single loss expectancy (SLE)
single sided certificates
single sign-on (SSO)
single-tier environment
site surveys
SLA (service-level agreement)
Slammer attack
Slapper attack
SLE (single loss expectancy)
SLIP (Serial Line Internet Protocol)
smart cards
individuals forgetting
for keys
SMTP (Simple Mail Transfer Protocol)
port
virus
vulnerabilities of relay
smurf attack
sniffers
10Base-T network with
SNMP (Simple Network Management Protocol)
snooping
snort
lab
social engineering
testing, lab
troubleshooting
sockets
software. See applications
Software Engineering Institute (SEI)
software exploitation attack
Sophos Anti-Virus
source code, conditions of release
source port
spam
ACL to control
spare parts
sPing
split generation system
split-system key generation
spoofing attacks
SPX (Sequenced Packet Exchange)
Spybot
spyware
Spyware Doctor
SQL (Structured Query Language)
SQL Server (Microsoft)
SSH (Secure Shell)
SSID broadcast
SSL (Secure Sockets Layer)
in Windows Server 2003, lab
SSO (single sign-on)
standards
state laws on computer crime
stateful inspection firewalls
stateful packet filtering
static electricity
preventing
stealth virus
steganography
storage. See removable media
storing keys
STP (shielded twisted pair)
common cable specifications
stream cipher
Structured Query Language (SQL)
Subscriber Identification Module (SIM)
subscriber, in transaction
substitution ciphers
SUID files, finding in Linux, lab
support packs (Novell)
surge protectors
surveillance systems
survey
of operational environment
of physical environment
of surroundings
SuSE Linux
backups in, lab
installing OpenLDAP, lab
suspending keys
switches
Sybex test engine
Symantec Corporation
symmetric algorithms
symmetric key
SysAdmin, Audit, Network, Security (SANS) certification
system architecture, drafting and documentation
System Configuration Utility (Windows), lab
system files, clearing infection from
system logs
reviewing
system vulnerabilities
Systems Monitor
T
T-connector (BNC)
TACACS (Terminal Access Controller Access Control System)
port
TACACS/+
tailgating
tap
tape
for backups
tar pit
Tavares, Stafford
TCP (Transmission Control Protocol)
attacks