[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
packet filters for routers [See access lists, router]
passive response to attacks, network IDS
passive scanning for wireless stations or access points
Password Authentication Protocol (PAP)
passwords
combined with digital signatures
configuring secure passwords for routers
encryption
service password-encryption command
router
assigned to the console, VTY, AUX lines, and enable
enable and user-level passwords
router, recovery procedure for
PAT (Port Address Translation)
patching
pattern-matching IDS signatures
PC card-based solutions (security) 2nd
PCI (Peripheral Component Interconnect
PDIOO (planning, design, implementation, operation, and optimization)
peer authentication methods on VPNs
performance
Peripheral Component Interconnect [See PCI]
permissions
router access list, example of
web content directory, changing for Internet Explorer
Windows file systems, hardening security settings 2nd
Personal Computer Memory Card International Association [See PCMCIA]
personal digital ID or certificate
personnel awareness of security policy
personnel training in physical security
physical security issues, network design 2nd
governmental specifications for physical security
intrusion into secured facility by tailgating
ping
requests, treatment by ASA algorithm
traffic to IP broadcast addresses, in Smurf attacks
commands for managing and troubleshooting
configuration as cut-through proxy
features and functions not convered in detail
full working configuration (case study)
NAT (network address translation) 2nd
PKCS (Public Key Cryptography Standard)
PKI (Public Key Infrastructure) 2nd 3rd
planning stage (network life cycle)
plug-ins
point-to-multipoint bridge (WLANs)
policy section (example security policy for a VPN)
political constraints on network IDS
political constraints, network design
Port Address Translation (PAT)
port numbers
source and destination, TCP/IP connections
used by TCP to passinformation to upper layers
ports
power blackouts, countering with UPSs
preshared keys (peer authentication method) 2nd
Pretty Good Privacy [See PGP]
prime numbers
parameter p, Diffie-Hellman algorithm
privacy policies, financial institutions
private data traversing public networks
Private Internet Exchange. SeePIX Firewall
protocol decode-based IDS signatures
protocol stacks (802.11 standard)
protocols
adaptive, checking in network traffic simulation
CBAC intelligent filtering for
establishing use of in IPSec policy
identification of in transform sets
proxies
proxy servers
configuring PIX Firewall as cut-through proxy
proxy servers, limiting attacks with
PSH (Push function), TCP field
Public Key Infrastructure [See PKI]
Public Service Segment (PSS) 2nd [See also DMZs]