Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
e-business necessity of network security for e-commerce e-mail protection during transmission with PC encryption cards social engineering attacks, use in EAP (Extensible Authentication Protocol) eavesdropping (sniffing) on publicly accessible networks echo and Echo-Reply messages echo messages to IP broadcast addresses economic constraints, network design EDE (encrypt-decrypt-encrypt) Electronic Communications Privacy Act (EPCA) email attacks enable secret command 2ndencapsulating security payload
[See ESP protocol] encrypt-decrypt-encrypt (EDE) method encrypted logins Kerberos SSH (Secure Shell) encryption 2nd Diffie-Hellman key exchange ESP (encapsulating security payload) protocol file PC encryption cards public/private keys, digital IDs RSA-encrypted nonces 2nd SEP (Scalable Encryption Processing) symmetric key algorithms 2nd AES DES Triple DES (3DES) WEP, improvement with TKIP wired equivalent privacy (WEP) keysencryption algorithms Advanced Encryption Standard (AES) DES and 3DES establishing in IPSec policy identified in IPSec transform sets identifying for ESP in IKE Phase 2 identifying for IKE Phase 1 encryption file system (EFS)end stations, wireless
[See stations, wireless]enforcement section, security policies example VPN security policy enhanced access lists 2nd Enigma machine enrolllment procedure, PKIEnterprise Composite Network Model out-of-band IDS management environmental monitoring, high-level security areas environmental requirements for network equipment 2nd EPCA (Electronic Communications Privacy Act) equipment failure, risk oferrors detection in data streams ESP (encapsulating security payload) protocol establishing use of in IPSec policy identified in IPSec transform sets identifying for IKE Phase 2 transport mode tunnel mode Ethereal toolEthernet crossover cables NetScreen firewalls and speed, possible values for to wireless bridge[Ethernet:wireless] WLANs, 802.3 IEEE standard eToken evaluate command evasion techniques for network IDSs events and alarms (RMON), monitoring traffic with exclusive OR (XOR) function exec-timeout, setting Explicit Congestion Notification (ECN) extended access lists reflexive extended IP acccess lists extended Log File Format, W3C extended numbered access lists 2nd extended service set (ESS) Extensible Authentication Protocol (EAP) external interface of the firewall external physical security external physical security, options for external weaknesses