Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
camera systems, internal physical security campus access policy card bus (wireless NIC) CAs (Certificate Authorities) CAs (certificate authorities) 2nd creating your own CA 2ndCAs (Certificate Authorities) enrolling inCAs (certificate authorities) enrollment procedure for PKI users hierarchical CAs single root CACAs (Certificate Authorities) validating signature ofCBAC inspection rules, creating (example) CDP (Cisco Discovery Protocol )certificate authorities
[See CAs]certificate revocation lists
[See CRLs] certificates [See also digital IDs] placement on a CRL types of certificates, digital 2nd 3rd chalk marks (war-chalking) Challenge Handshake Authentication Protocol (CHAP) change control (business processes) Chargen attack Check Point, software firewalls checksums CIA (confidentiality, integrity, and availability) ciphers block and stream ciphers Rijndael cipherCisco Advanced Services for Network Security (ASNS) Internet Operating System. SeeIOS Intrusion Detection Host sensor Intrusion Detection System (IDS) IOS IOS-based IDSs, deployment on a router or PIX-based IDS Light Extensible Authentication Protocol (LEAP) Linksys product line PIX firewall Router Security Configuration Guide SAFE Blueprint 2nd Secure Agent Manager 2nd Secure Integrated Software Wireless Security Suite 2nd Cisco Discovery Protocol (CDP)Cisco IOS Firewall CBAC engine
[See CBAC]Cisco Press website certificates Cisco Secure Encyclopedia (CSEC) 2ndCiscoSecure Access Control Server
[See ACS]CiscoSecure Private Internet Exchange Firewall
[See PIX Firewall] CiscoSecure products CiscoView application CiscoWorks VMS Suite client-based firewallsclients VPN client, setting up ClipBook Viewer closed networkcoded messages
[See ciphers] cold site (disaster recovery plan) command and control network command and control port, network IDS command line interface (CLI), PIX Firewall andcommands IOS privileged executive commands monitoring and troubleshooting SNMP SAA operations, specifying comments, adding in named access lists Common Criteria EAL 4 ratings (NetScreen and PIX) community networks, wireless community strings, SNMP 2nd assigning a view to compormised keys compression algorithm (LZS)computer resources summary of use and protection, in security policies computers, cryptography andconduits
[See access lists, PIX Firewall] confidentiality, integrity, and availability (CIA) Connect accounting function Connection Establishment timer connection hijacking (TCP) connection-based security policy 2nd connection-killing attacks connectivity and associated policies consensus, communicating console access to devices, avoidingconsoles accessing routers from constraints, network design content filtering 2ndContext Based Access Control
[See CBAC] cookies managing by forcing all to be session cookies costs and benefits of security countermeasures against vulnerabilities, information about covert channelsCPU tie-ups in attacks CPU processing speed crackers 2nd hackers versus script kiddies cracking codes (cryptoanalysis) credentials, Kerberos CRLs (certificate revocation lists) cross certifying cryptography 2nd 3rd 4th [See also encryption] asymmetric key algorithms 2nd Diffie-Hellman PGP RSA cryptoanalysis versus digital certificates encryption 2nd hashing algorithms MD5 SHA-1 history of 2nd computers, advent of crypto machines manual systems NSA research and education on PKCS (Public Key Cryptography Standard) secret key, Kerberos SSL and TLSsymmetric key algorithms AES DES Triple DES (3DES)wireless equivalent privacy keys
[See WEP protocol] CSEC (Cisco Secure Encyclopedia)