687 Directory UMM :Networking Manual:

static passwords, 10, 714 static RAM, 384 static tokens, 18–19, 714 statistical attacks, 359, 714 statistical intrusion detection, 48 statistical sampling in auditing, 482 status accounting, configuration, 243 stealth viruses, 263, 714 steganography, 354, 714 STOP errors, 230–231, 714 stopped state, 378, 715 storage, 225 in disaster recovery planning, 554–557 of media, 459 security for, 388 threats to, 226–227 types of, 225–226, 386–388 storms, 539, 540 STP shielded twisted-pair wire, 81, 712 strategic plans, 182, 715 strategy development in business continuity planning, 519–520 stream attacks, 55, 715 stream ciphers, 310, 715 strikes, 544 strong passwords, 11, 715 structured protection B2 systems, 426 Structured Query Language SQL, 76, 218–219, 715 structured walk-through tests, 560–561, 715 sub-technologies, 84–85 subjects in access, 2 defined, 715 in secure systems, 420–421 subnet masks, 94–95 subpoenas, 614, 715 substitution ciphers, 306–308, 715 SUM function, 223 supervisor states, 376, 715 supervisory operating mode, 245, 381, 715 supplies in disaster recovery planning, 558 surge protectors, 641 surges, 641, 715 suspicious activity, 614 SVCs switched virtual circuits, 108, 127, 716 SWIPE software IP encryption protocol, 104, 713 Switched Multimegabit Data Services SMDS, 108, 130, 716 switched virtual circuits SVCs, 108, 127, 716 switches, 100 in Data Link layer, 75 defined, 715–716 switching technologies, 126–127 symmetric cryptography, 316 AES, 320–322 Blowfish, 319–320 DES, 316–318 IDEA, 319 keys in, 312–313, 312, 322–323, 716 Skipjack, 320 Triple DES, 318–319 symmetric multiprocessing SMP, 372, 716 SYN flood attacks, 53–55, 271–272, 272, 716 SYN packets, 91 synchronous communications, 85 Synchronous Data Link Control SDLC protocol defined, 716 polling in, 87 in WANs, 79, 108, 130 synchronous dynamic password tokens, 18–19, 716 system calls, 376, 716 system compromises, 611–612, 670 system development controls, 229 exam essentials for, 248–249 Gannt charts, 240, 241 life cycles in. See life cycles in system development PERT, 242 review questions, 250–255 security control architecture, 244–246, 245 software development, 229–234 software testing, 243–244 summary, 247 written lab for, 249, 256 system failures, 230–231, 231 system-high security mode, 246, 379–380, 716 system operating mode, 381 system test review, 236 T table-top exercises, 560–561 tables in databases, 217, 717 TACACS Terminal Access Controller Access Control System, 27–28, 106, 717 tactical plans, 182, 717 Tagged Image File Format TIFF, 77 Take-Grant model, 398, 717 tapes for backups, 556–557 Target of Evaluation TOE, 428 task-based access controls, 23, 717 TCB trusted computing base, 417–418, 720 TCP Transmission Control Protocol, 76, 90, 719 TCPIP protocol, 89–90, 90 model, 78–79, 78 Network layer, 91–95 Transport layer, 90–91 TCP wrappers, 717 TCSEC Trusted Computer System Evaluation Criteria classes, 184, 425–426, 452 teams for business continuity planning, 512 for penetration testing, 488 teardrop attacks, 55, 274–275, 275, 717 technical controls, 4, 629, 636–640, 717 technical protection mechanisms, 391–393 telecommuting, 107 telephone trees, 554 Telnet protocol, 77, 95 temperature, 642 TEMPEST Transient Electromagnetic Pulse Equipment Shielding Techniques devices, 370 combating, 639–640 defined, 717 monitors, 388–389, 490 10Base-2 cable, 80–81, 660 10Base-5 cable, 80–81, 660 10Base-T cable, 80–81, 660 Terminal Access Controller Access Control System TACACS, 27–28, 106, 717 termination procedure policies, 178–179 termination process, 465 terrorist acts, 541–542 terrorist attacks, 608–609, 718 test data method, 244, 718 testimonial evidence, 593, 718 testing in business continuity planning, 513, 526 in disaster recovery planning, 560–561 penetration. See penetration testing software, 243–244 TFN Tribal Flood Network toolkit, 273–274 TFTP Trivial File Transfer Protocol, 77, 95 TGS Ticket Granting Service, 21–22, 718 theft, 493, 544–545 thicknet cable, 80 thin clients, 22, 718 thinnet cable, 80 threads, 373 threat agents, 186, 718 threat events, 186, 718 threats, 186, 492–496, 718 3–4–5 rule, 82 3DES Triple DES standard, 318–319, 720 throughput rate with biometric devices, 17, 718 Ticket Granting Service TGS, 21–22, 718 tickets, 21, 718 Tier 3 countries, 585 Tier 4 countries, 585 TIFF Tagged Image File Format, 77 time frames auditing, 480 record retention, 483 reporting, 482 time-of-check TOC, 439, 718 time-of-check-to-time-of-use TOCTTOU attacks, 278, 439, 718 time-of-use TOU, 439, 718 time slices, 377, 718 time stamps, 221 timing as security flaw, 439 TLS Transport Layer Security protocol, 353 TOE Target of Evaluation, 428 Token Ring, 74, 84, 718 tokens, 6, 18–20 in CSMACD, 86 defined, 718 in security models, 418 in Token Ring, 84 Top Secret classification, 163, 718 topologies, 87–89, 87–89, 719 tornadoes, 539 total risk, 195, 719 TOU time-of-use, 439, 718 Tower of Hanoi strategy, 557 TPs transformation procedures, 420 trade secrets, 582–583, 719 trademarks, 581–582, 719 traffic analysis, 485, 495–496, 719 training and education, 197 in business continuity planning, 513, 522–523 for crises, 546 defined, 679, 719 in disaster recovery planning, 559–560 on inappropriate activities, 492