685 hoaxes, 264 Directory UMM :Networking Manual:

SKIP Simple Key Management for Internet Protocols tool, 75, 104, 712 Skipjack algorithm, 320, 713 SLAs Service Level Agreements in contracts, 515 defined, 711 for hardware, 648 issues addressed by, 247 SLE single loss expectancy, 191 defined, 712 in impact assessment, 518 SLIP Serial Line Internet Protocol, 74, 105, 711 smart cards, 637, 713 SMDS Switched Multimegabit Data Services, 108, 130, 716 smoke actuated systems, 645 smoke damage, 647 smoke stage in fires, 643, 644 SMP symmetric multiprocessing, 372, 716 SMTP Simple Mail Transfer Protocol in Application layer, 77, 95 defined, 712 in WANs, 132 Smurf attacks, 54, 55, 273–274, 274, 713 sniffer attacks, 57, 713 sniffing, 489, 713 SNMP Simple Network Management Protocol in Application layer, 77, 96 for scans, 611 snooping attacks, 57 social engineering, 12, 491 defined, 713 in password attacks, 270 through voice communications, 136–137 sockets, 713 software confiscating, 614–615 copyrights for, 579 developing, 229 assurance procedures, 229–230, 231 object-oriented programming, 233–234 programming languages in, 232 system failure avoidance, 230–231, 231 escrow arrangements for, 557–558 failures in, 543 testing, 243–244 software capability maturity model, 239–240 software IP encryption SWIPE protocol, 104, 713 SPA Anti-Piracy group, 584 spam, 713 spamming attacks, 57–58, 134, 713 SPAP Shiva Password Authentication Protocol, 124 spikes, 641, 713 spiral model, 238–239, 239 split knowledge, 304, 713 spoofing with ARP, 141 defined, 714 in e-mail, 134 IP, 280–281 spoofing attacks, 55–56, 714 sprinklers, 646 SPX Sequenced Packet Exchange, 76, 711 SQL Structured Query Language, 76, 218–219, 715 SS Property Simple Security Property, 400, 419, 712 SSH Secure Shell, 355–356, 710 SSL Secure Sockets Layer protocol, 104 defined, 710 in Session layer, 76, 96 for Web, 353 X.509 for, 347 SSO Single Sign On mechanism, 20 defined, 712 examples, 22–23 Kerberos authentication in, 21–22 standards, 184 for computer security, 576 defined, 714 star topology, 88, 88 state changes, 439 state laws, 573 state machine model, 397–398, 714 state packet-filtering firewalls, 714 stateful inspection firewalls, 98, 714 stateful NAT, 126 statements in business continuity planning of importance, 523–524 of organizational responsibility, 524 of priorities, 524 of urgency and timing, 524 states defined, 714 process, 377–378, 378 static electricity, 642 static NAT, 93 static packet-filtering firewalls, 97–98 static passwords, 10, 714 static RAM, 384 static tokens, 18–19, 714 statistical attacks, 359, 714 statistical intrusion detection, 48 statistical sampling in auditing, 482 status accounting, configuration, 243 stealth viruses, 263, 714 steganography, 354, 714 STOP errors, 230–231, 714 stopped state, 378, 715 storage, 225 in disaster recovery planning, 554–557 of media, 459 security for, 388 threats to, 226–227 types of, 225–226, 386–388 storms, 539, 540 STP shielded twisted-pair wire, 81, 712 strategic plans, 182, 715 strategy development in business continuity planning, 519–520 stream attacks, 55, 715 stream ciphers, 310, 715 strikes, 544 strong passwords, 11, 715 structured protection B2 systems, 426 Structured Query Language SQL, 76, 218–219, 715 structured walk-through tests, 560–561, 715 sub-technologies, 84–85 subjects in access, 2 defined, 715 in secure systems, 420–421 subnet masks, 94–95 subpoenas, 614, 715 substitution ciphers, 306–308, 715 SUM function, 223 supervisor states, 376, 715 supervisory operating mode, 245, 381, 715 supplies in disaster recovery planning, 558 surge protectors, 641 surges, 641, 715 suspicious activity, 614 SVCs switched virtual circuits, 108, 127, 716 SWIPE software IP encryption protocol, 104, 713 Switched Multimegabit Data Services SMDS, 108, 130, 716 switched virtual circuits SVCs, 108, 127, 716 switches, 100 in Data Link layer, 75 defined, 715–716 switching technologies, 126–127 symmetric cryptography, 316 AES, 320–322 Blowfish, 319–320 DES, 316–318 IDEA, 319 keys in, 312–313, 312, 322–323, 716 Skipjack, 320 Triple DES, 318–319 symmetric multiprocessing SMP, 372, 716 SYN flood attacks, 53–55, 271–272, 272, 716 SYN packets, 91 synchronous communications, 85 Synchronous Data Link Control SDLC protocol defined, 716 polling in, 87 in WANs, 79, 108, 130 synchronous dynamic password tokens, 18–19, 716 system calls, 376, 716 system compromises, 611–612, 670 system development controls, 229 exam essentials for, 248–249 Gannt charts, 240, 241 life cycles in. See life cycles in system development PERT, 242 review questions, 250–255 security control architecture, 244–246, 245 software development, 229–234 software testing, 243–244 summary, 247 written lab for, 249, 256 system failures, 230–231, 231 system-high security mode, 246, 379–380, 716 system operating mode, 381 system test review, 236 T table-top exercises, 560–561 tables in databases, 217, 717 TACACS Terminal Access Controller Access Control System, 27–28, 106, 717 tactical plans, 182, 717 Tagged Image File Format TIFF, 77