Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [324]

By Root 3094 0

three-way handshake

well-known ports

TCP ACK flood attack

TCP/IP (Transmission Control Protocol/ Internet Protocol)

NetBIOS binding to

vulnerability

TCP/IP hijacking

TCP/IP (Transmission Control Protocol/ Internet Protocol)

architectural layers

Application layer

encapsulation

Host-to-Host (Transport) layer

Internet layer

Network Interface layer

common ports

recognizing attacks

security concerns

susceptibility to attacks

TCP packet

TCP ports, viewing active, lab

TCP sequence number attack

TCP SYN flood attack

TCP wrappers

technical staff, education on security issues

technology standards

telecom/PBX systems

telephony issues

Telnet

for attacks

port

security risks

temperature

TEMPEST project

Temporal Key Integrity Protocol (TKIP)

temporary files in web browser, clearing, lab

“Ten Commandments of Computer Ethics”

Terminal Access Controller Access Control System (TACACS)

terminated employees, as threat

terminating processes or sessions

termination policies

termination process, in coax network

testing environment

setup for lab exercises

TFTP (Trivial File Transfer Protocol)

theft, detection

thin clients

third party

in transaction

third-party cookies, lab

thp

threat

assessment

identification

terminated employees as

three-layer security model

three-tier model for database

thumb drives

tickets, for Kerberos

time-of-day restrictions

time synchronization, for Kerberos

TKIP (Temporal Key Integrity Protocol)

TLS (Transport Layer Security)

tokens

Top Secret information

TPM (Trusted Platform Module)

Traceroute

trade publications, on security

traffic generation DoS attacks

training, importance of

Transmission Control Protocol. See TCP (Transmission Control Protocol)

Transmission Control Protocol/Internet Protocol (TCP/IP). See TCP/IP (Transmission Control Protocol/Internet Protocol)

transmission in network, intercepting

Transport Layer Security (TLS)

transposition ciphers

trash, access to

tree structure, in hierarchical trust model

trial versions of software

Triple-DES (3DES)

Trivial File Transfer Protocol (TFTP)

Trojan horse

troubleshooting, companion CD

troubleshooting guide

access control issues

accountability concerns

antivirus software

auditing

authentication schemes

backup management

baselining security

certificate management

communications security

directory services

disaster planning

documentation

e-mail issues

file sharing

getting started

hardening

honeypot

incident response

infrastructure security

Internet common sense and

intrusion detection systems (IDSs)

key management

passwords

personnel management

physical security

preventing malicious events

security zones

social engineering

wireless network security

trust, and e-commerce

trust models for PKI

bridge

hierarchical

hybrid

mesh

Trusted Computer System Evaluation Criteria (TCSEC)

Trusted Computing Group

Trusted Platform Module (TPM)

trusted transaction

tunneling

tunneling protocols

two-factor authentication system

two-tier model for database

two-way (client and server) authentication, in WAP

two-way hash

Twofish

.txt file extension

U

Ubuntu, website on security

UDP ports, viewing active, lab

umask utility, lab

unclassified information

undeliverable e-mails, log report of

unicasts

uninterruptible power supply (UPS)

United States

automatic declassification system

federal laws on privacy and security

Computer Fraud and Abuse Act

Computer Security Act of 1987

Cyber Security Enhancement Act

Cyberspace Electronic Security Act (CESA)

Family Education Rights and Privacy Act

Gramm-Leach-Bliley Act of 1999

Health Insurance Portability and Accountability Act (HIPAA)

PATRIOT act

U.S. Air Force, security audit on password

Uniting and Strengthening

Return Main Page Previous Page Next Page

®Online Book Reader