Sei sulla pagina 1di 3

DoS (Denial-of-Service), 53, 309,

319–320
Drills, 401
dual-homed firewalls, 99
dumpster diving, 357
E
EALs (Evaluation Assurance
Levels), 159–160
EAP (Extensible Authentication
Protocol), 181–182
EAPOL (EAP over LAN),
60
ECC (Elliptic Curve
Cryptography), 254
ECDHE (Ephemeral Elliptic
Curve Diffie-Hellman), 254
EFS, 14
EIGamal, 254
electronic wallet, 270
electronic watermarking, 248
email, attachment filename
extensions, 307
email servers, hardening, 228–
229
EMI shielding, 380–382
encapsulation, 75, 79–80
encryption, 236
BitLocker, 290
data encryption, 290
databases, 290
exercise, 249
government agencies, 263–
264
hardware-based devices, 237,
290
ROT13 algorithm, 247–248
symmetric algorithms,
249–251
TrueCrypt, 290
Enigma machine, 248
enticement, honeypot and,
65
entrapment, honeypot and, 65
environmental controls, 377
EMI shielding, 380–382
environmental monitoring,
383
fire extinguishers, 378–379
fire suppression, 378
fixed systems, 379–380
hot and cold aisles, 382
humidity, 383
HVAC system, 378
temperature, 383
environmental monitoring, 383
error types, 28
Escape Plans, 401
escape routes, 402
ESP (Encapsulating Security
Payload), 274
event logs, viewing, 47–51
events, IDS (intrusion detection
system),
107
evercookie, 339
exception statement for policies,
20
exercises
Automated System Recovery
in Windows Server
2012, 442
certificates, viewing,
282–283
encryption in Linux, 249
IPSec performance errors,
275–277
Microsoft Baseline Security
Analyzer, 329–331
network preference order,
179–180
physical security,
377
pop-up blocker configuration,
222–223
risk-assessment computations,
6
social engineering test,
364–365
SSL settings in Windows
Server 2012, 269
TCP ports, 83–85
TPM chip presence,
237
trust relationship validation,
137, 333
UDP ports, 83–85
viewing running processes
Linux-based machine,
302–304
Windows-based machine,
302–304
web filtering configuration,
120–121
Windows Firewall
configuration, 223–226
wireless connection
not broadcasting,
connecting, 183–185
F
fail over, 31–32
false negatives, 28
false positives, 28
FAT (File Allocation Table),
58
fault tolerance, 32–33
backups, 233–234
clustering, 235
load balancing, 235
RAID (redundant array of
independent disks),
234–235
FCoE (Fibre Channel over
Ethernet), 87
federated identity, 136
federations, 135–136
fencing, 401
FERPA (Family Educational
Rights and Privacy Act),
416
Fibre Channel,
87
file servers, 53
filenames, email attachment
extensions, 307
filesystems, hardening and,
58–59
filters
InPrivate Filtering, 340
Phishing filter, 119
spam filters, 118–119
URL filters, 119
web filtering configuration
exercise, 120–121
Financial Modernization Act of
1999, 415
FIPS (Federal Information
Processing Standard), 278
fire extinguishers, 378–379
fire suppression, 378
firewall rules, 157

Potrebbero piacerti anche