Home Page Icon
Home Page
Table of Contents for
Glossary
Close
Glossary
by Emmett Dulaney
CompTIA Security+™: Study Guide, Fourth Edition
Copyright
Dear Reader
Dedication
Acknowledgments
About the Author
Introduction
Assessment Test
General Security Concepts
Understanding Information Security
Understanding the Goals of Information Security
Comprehending the Security Process
Authentication Issues to Consider
Distinguishing between Security Topologies
Exam Essentials
Hands-On Labs
Review Questions
Identifying Potential Risks
Calculating Attack Strategies
Recognizing Common Attacks
Understanding Software Exploitation
Understanding OVAL
Surviving Malicious Code
Understanding Social Engineering
Introducing Auditing Processes and Files
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
Infrastructure and Connectivity
Understanding Infrastructure Security
Understanding the Different Network Infrastructure Devices
Monitoring and Diagnosing Networks
Securing Workstations and Servers
Understanding Mobile Devices
Understanding Remote Access
Securing Internet Connections
Understanding Network Protocols
The Basics of Cabling, Wires, and Communications
Employing Removable Storage
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
Monitoring Activity and Intrusion Detection
Understanding Intrusion Detection Systems
Working with Wireless Systems
Understanding Instant Messaging's Features
Working with 8.3 File Naming
Understanding Protocol Analyzers
Understanding Signal Analysis and Intelligence
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
Implementing and Maintaining a Secure Network
Overview of Network Security Threats
Defining Security Baselines
Hardening the OS and NOS
Hardening Network Devices
Hardening Applications
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
Securing the Network and Environment
Understanding Business Continuity Planning
Developing Policies, Standards, and Guidelines
Working with Security Standards and ISO 17799
Classifying Information
Summary
Exam Essentials
Hands-On Lab
Answers to Review Questions
Cryptography Basics, Methods, and Standards
An Overview of Cryptography
Understanding Cryptographic Algorithms
Using Cryptographic Systems
Using Public Key Infrastructure
Preparing for Cryptographic Attacks
Understanding Cryptography Standards and Protocols
Understanding Key Management and the Key Life Cycle
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
Security Policies and Procedures
Understanding Business Continuity
Reinforcing Vendor Support
Generating Policies and Procedures
Enforcing Privilege Management
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
Security Administration
Simplifying Security Administration
Understanding Security Awareness and Education
Staying on Top of Security
Summary
Exam Essentials
Hands-On Labs
Review Questions
Answers to Review Questions
About the Companion CD
What You'll Find on the CD
System Requirements
Using the CD
Troubleshooting
Glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
X
Z
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Troubleshooting
Next
Next Chapter
Glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset