Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 180
نمايش فراداده

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

IANA (Internet Assigned Number Authority) website

IAR (Internet Accessible Router)

IBSS (independent basic service set)

ICMP (Internet Control Message Protocol)

echo (ping) traffic to IP broadcast addresses

used in TCP/IP connection covert channels

identification policy

identification, two-factor

identify theft

IDM (IDS Device Manager)

IDSs [See intrusion detection systems]

IDSs (intrusion detection systems)

anomaly-based

case study 2nd

active response, blocking host 2nd

IDS Event Viewer

initializing and configuring network sensors 2nd

sensor placement on the network

tuning IDS

honey-pots

host-based 2nd

deploying in the network

host sensor components and architecture

network IDS 2nd 3rd

deploying in the network 2nd

evasion/antievasion techniques

management communications

notification and reporting

organizational issues and complications

network versus host

policy-based

sensor maintenance

signature-based IDSs

pros and cons of

IEEE (Institure of Electrical and Electronics Engineers) [See also 802.1X standards]

IEEE (Institute of Electrical and Electronics Engineers)

IETF (Internet Engineering Task Force)

IEV (IDS Event Viewer)

IIS (Internet Information Services)

enabling logging

hardening

website information on

log file formats

IKE (Internet Key Exchange)

IKE (Internet Key Exchange) protocol

establishing an IKE policy for VPNs

SA (security association) lifetime

implementation phase, network life cycle

in-band management, network IDS 2nd

InBand

inbound and outbound traffic

inbound packets, filtering 2nd

independent basic service set [See IBSS]

inform requests, SNMP

configuring router to send to a host

information sent to SYSLOG server

inside global address (NAT)

inside interfaces

inside intruders

inside local address (NAT)

insiders

intrusions by

inspect commands, router

inspection methodologies, firewalls

inspection of application-layer protocols by CBAC

creating inspection rules (example)

inspection of packets at application layer by CBAC 2nd

inspection rules, CBAC

assigning to router interface

Institute of Electrical and Electronics Engineers (IEEE) 2nd [See also 802.1X standards]

integrated Windows authentication

integrity of data

Intercept Correlate Rules Engine (INCORE) (Secure Agent)

interface bandwidth constraints, network design

interface command (PIX Firewall) 2nd

interface command to apply an access list to an interface

interfaces

configuring on VPN Contentrator Screen

firewall

DMZ

naming

firewall, internal and external

information about

NetScreen firewalls

network IDS

network, assigning IP addresses to

PIX Firewall

naming of

secuirty levels

router

assigning access list to

assigning CBAC inspection rules and access list to

monitoring interfaces

internal interface of the firewall

internal physical security 2nd

internal weaknesses and vulnerabilities

authenticated users

International Telecommunications Union (ITU-T)

Internet

access policy, coverage in security policy

availability of networks to

communication over

mail server attack launched via

restricted employee access to

traffic levels, IDS and

Internet Accessible Router (IAR)

Internet Assigned Number Authority (IANA) website

Internet Control Message Protocol [See ICMP]

Internet Engineering Task Force (IETF)

Internet Explorer 2nd

security levels

predefined, listing of

security zones

changing settings for

security, website information on

Internet Information Services [See IIS]

Internet Key Exchange [See IKE protocol]

Internet Operating System [See IOS]

Internet Security Association and Key Management Protocol (ISAKMP)

Internet security zone (Internet Explorer)

Internet-enabled business

intranet

security zone for Internet Explorer

intro

intrusion detection system (IDS) sensors

getting past in Ping of Death attack

Intrusion Detection System (IDS), Cisco

intrusion detection systems (IDSs) 2nd 3rd 4th

fundamentals of

IDS sensors

introduction to

signature-based IDS

IOS (Internet Operating System)

AAA configuration on 2nd

Debug command reference for SNMP

IDSs based on, deployment on network

Kerberos support

Service Assurance Agent (SAA) 2nd

SNMP versions supported

SSH server

TACACS+ support

IP

router access lists

IP address space, NetScreen firewalls and

IP addresses

access control based on (for a PC)

identifying VPN peers by

inside and outside, defining for network interfaces

internal network, translation to global addresses

NAT (network address translation) and

source and destination, TCP/IP connections

IP fragment reassembly vulnerability

IP protocol 2nd [See also TCP/IP protocol suite[IP protocol:aaaSee]]

address spoofing

Explicit Congestion Notification (ECN)

fragmentation offset 2nd

mobile IP

IP redirect

IP redirection attacks

IP sessions, logging of by network IDSs

IP telephony, network design planning for

IPSec (IP Security) 2nd

antireplay protection

configuring all parameters for VPN

data integrity function

encryption

establishing IPSec policy for VPNs

eToken, storing certificates with

four major functions of

origin authentication 2nd

preshared keys method

RSA signatures method

RSA-encrypted nonces

preshared keys, peer authentication by

protocol framework

AH (authentication header)

ESP (encapsulating security payload)

selecting Security Association (SA)

transform sets

tunnel or transport mode

VPNs with

configuring IPSec

preparation for

wireless network security, using for

IPSec concentrator

iris and retina recognition

ISAKMP (Internet Security Association and Key Management Protocol)

isc

ISDN networks, NetScreen firewalls and