CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [324]
three-way handshake
well-known ports
TCP ACK flood attack
TCP/IP (Transmission Control Protocol/ Internet Protocol)
NetBIOS binding to
vulnerability
TCP/IP hijacking
TCP/IP (Transmission Control Protocol/ Internet Protocol)
architectural layers
Application layer
encapsulation
Host-to-Host (Transport) layer
Internet layer
Network Interface layer
common ports
recognizing attacks
security concerns
susceptibility to attacks
TCP packet
TCP ports, viewing active, lab
TCP sequence number attack
TCP SYN flood attack
TCP wrappers
technical staff, education on security issues
technology standards
telecom/PBX systems
telephony issues
Telnet
for attacks
port
security risks
temperature
TEMPEST project
Temporal Key Integrity Protocol (TKIP)
temporary files in web browser, clearing, lab
“Ten Commandments of Computer Ethics”
Terminal Access Controller Access Control System (TACACS)
terminated employees, as threat
terminating processes or sessions
termination policies
termination process, in coax network
testing environment
setup for lab exercises
TFTP (Trivial File Transfer Protocol)
theft, detection
thin clients
third party
in transaction
third-party cookies, lab
thp
threat
assessment
identification
terminated employees as
three-layer security model
three-tier model for database
thumb drives
tickets, for Kerberos
time-of-day restrictions
time synchronization, for Kerberos
TKIP (Temporal Key Integrity Protocol)
TLS (Transport Layer Security)
tokens
Top Secret information
TPM (Trusted Platform Module)
Traceroute
trade publications, on security
traffic generation DoS attacks
training, importance of
Transmission Control Protocol. See TCP (Transmission Control Protocol)
Transmission Control Protocol/Internet Protocol (TCP/IP). See TCP/IP (Transmission Control Protocol/Internet Protocol)
transmission in network, intercepting
Transport Layer Security (TLS)
transposition ciphers
trash, access to
tree structure, in hierarchical trust model
trial versions of software
Triple-DES (3DES)
Trivial File Transfer Protocol (TFTP)
Trojan horse
troubleshooting, companion CD
troubleshooting guide
access control issues
accountability concerns
antivirus software
auditing
authentication schemes
backup management
baselining security
certificate management
communications security
directory services
disaster planning
documentation
e-mail issues
file sharing
getting started
hardening
honeypot
incident response
infrastructure security
Internet common sense and
intrusion detection systems (IDSs)
key management
passwords
personnel management
physical security
preventing malicious events
security zones
social engineering
wireless network security
trust, and e-commerce
trust models for PKI
bridge
hierarchical
hybrid
mesh
Trusted Computer System Evaluation Criteria (TCSEC)
Trusted Computing Group
Trusted Platform Module (TPM)
trusted transaction
tunneling
tunneling protocols
two-factor authentication system
two-tier model for database
two-way (client and server) authentication, in WAP
two-way hash
Twofish
.txt file extension
U
Ubuntu, website on security
UDP ports, viewing active, lab
umask utility, lab
unclassified information
undeliverable e-mails, log report of
unicasts
uninterruptible power supply (UPS)
United States
automatic declassification system
federal laws on privacy and security
Computer Fraud and Abuse Act
Computer Security Act of 1987
Cyber Security Enhancement Act
Cyberspace Electronic Security Act (CESA)
Family Education Rights and Privacy Act
Gramm-Leach-Bliley Act of 1999
Health Insurance Portability and Accountability Act (HIPAA)
PATRIOT act
U.S. Air Force, security audit on password
Uniting and Strengthening