Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 189
نمايش فراداده

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

radio frequency (RF) technology, use by WLANs

radio, cryptography and

RADIUS 2nd 3rd

ACS setup for RADIUS authentication

authentication

attribute pairs

summary of

TACACS+ versus

with 802.11i authentication framework[RADIUS:802.11i]

RDEP (Remote Data Exchange Protocol)

communication between network IDS sensor and director

IP session logging, network IDSs

realm

recovery from disasters

Redirect messages

redirection

IP redirect service, routers

redundancy in network designs

reflect option

reflexive access lists

Registered Ports

remarks, adding in named access lists

remote access 2nd 3rd 4th

AAA model

accounting 2nd

authentication 2nd

authorization

servers 2nd

configuration of AAA server (CiscoSecure ACS) 2nd

lock-and-key feature 2nd

security policy coverage of

two-factor identification

Remote Access tunnel type

remote access VPNs

case study 2nd

Remote Authentication Dial-In User Service [See RADIUS]

Remote Data Exchange Protocol [See RDEP]

Remote Monitory [See RMON]

remote Telnet sessions and logins, securing

reporting features, network IDS

requirements and constraints, network design

resetting TCP connections

network IDS response to attacks

router configured for network IDS

Response Time Reporter (RTR) [See SAA]

responses to alerts, network IDS

restricted security zone (Internet Explorer)

retina and iris recognition

return on investment (ROI), network design and

reusable passwords

policy for (example)

reverse lookup, countering DNS spoofing with

reverse social engineering attacks

RFCs (Request for Comments)

protocol analysis for violations of

rights, permissions versus

Rijndael cipher

risk assessment

Annualized Rate of Occurrrence (ARO)

Single Loss Expectancy (SLE)

types of risks

risks

reducing with tools to support design process

vulnerabilities and

Rivest, Shamir, Adelman algorithm [See RSA algorithm]

Rivest, Shamir, and Adelman (RSA) algorithm

RMON (Remote Monitory)

robust defenses

roles

defining

route command (PIX Firewall)

router security

administrative access, configuring

routers

AAA configurations on Cisco IOS router 2nd

AAA model, enabling

Cisco Router Security Configuration Guide

configuring GRE tunnels on

configuring IPSec on

configuring to send only warnings to SYSLOG server

content filtering

extended access lists

filtering, placement of

IDS features and network modules

NAT translation table, viewing

PIX Firewall and

security

case study of telecommuter connecting to branch office 2nd

CBAC (Cisco IOS Firewall) 2nd

commands to configure a new router

security for network protection 2nd

access lists

security for the router 2nd

banner to warn intruders

console port, timeout

enable and user-level passwords configured

online information, Cisco web site

passwords assigned to console, VTY, AUX lines and enable

services, turning off or restricting access

RSA (Rivest, Shamir, and Adelman) algorithm

RSA algorithm

RSA Laboratories, PKCS standards

RSA signatures (peer authentication method) 2nd

RSA-encrypted nonces (peer authentication method) 2nd

RST (Reset the connection), TCP header flag

RTR (Response Time Reporter) [See SAA]

rtr operation-number command