Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Access Controls
Figure 2.1: Access Control
Figure 2.2: Obtaining Access Flowchart
Figure 2.3: Connecting to an FTP Site
Figure 2.4: FTP User ID
Figure 2.5: FTP Password
Figure 2.6: FTP Capture
Figure 2.7: Kerberos Required Components
Figure 2.8: Authentication Path for Logon Access in a Kerberos Realm
Figure 2.9: Resource Access in Kerberos Realms
Figure 2.10: RBAC Inheritance
Figure 2.11: Access Control Account Lifecycle
Figure 2.12: L0phtCrack Main Screen
Figure 2.13: L0phtCrack Accounts View
Figure 2.14: L0phtCrack Session Options
Figure 2.15: L0phtCrack Passwords Cracked
Figure 2.16: L0phtCrack All Passwords Cracked
Figure 2.17: MITM Attack
Chapter 3: Administration
Figure 3.1: The Life Cycle of Information Security
Figure 3.2: Impact of Effort on Information Assurance
Figure 3.3: Risk Relationship Pyramid
Figure 3.4: Process Layers Diagram
Chapter 4: Audit and Monitoring
Figure 4.1: The AppScan Test Progress Screen
Figure 4.2: AppScan Vulnerability Discovery Report
Figure 4.3: The Dialing Demon Splash Screen
Figure 4.4: The Dialing Demon Configuration Screen
Figure 4.5: The Dialing Demon Number Range Configuration Screen
Chapter 5: Risk, Response, and Recovery
Figure 5.1: Risk Management Cycle
Figure 5.2: Risk Mitigation Options
Figure 5.3: Primary Roles in an Investigation Involving Computer Forensics
Figure 5.4: The EnCase "Create an Evidence File" Screen
Figure 5.5: EnCase "Identification" Screen
Chapter 6: Cryptography
Figure 6.1: Diagram of the DES Encryption Algorithm
Figure 6.2: Diagram of Cipher Block Chaining
Figure 6.3: Diagram of Cipher Feedback Mode
Figure 6.4: Diagram of Electronic Code Book Mode
Figure 6.5: Diagram of Output Feedback Mode
Figure 6.6: The PKI Key Exchange
Figure 6.7: A Sample Drivers License
Figure 6.8: The "General" Tab of a Certificate
Figure 6.9: The "Details" Tab of a Certificate
Figure 6.10: A Two-Way Trust Relationship
Figure 6.11: A Chain of Trust
Figure 6.12: A Single CA Model
Figure 6.13: The Key Escrow Process
Chapter 7: Data Communications
Figure 7.1: The Path a Data Packet Takes as it Travels from Computer A to Computer B
Figure 7.2: A Complete TCP Handshake; A Connection with the Server is Opened and Logged
Figure 7.3: A SYN Scan does not Complete the TCP Handshake
Figure 7.4: The Star Topology: Each Device is Connected to a Central Hub/Switch
Figure 7.5: Bus Topology: Each Device on the Network Connected to a Single Central Backbone
Figure 7.6: The Tree Topology Combines the Star Topology and Bus Topology
Figure 7.7: The Tree Topology can Utilize Meshing to Increase Fault Tolerance
Figure 7.8: A Token Ring Topology
Figure 7.9: A Mesh Topology
Figure 7.10: A FDDI Ring Uses High-Speed Cabling and Contains Two Rings for Redundancy
Figure 7.11: A WAN is Two or More LANs that are Connected over a High Speed Line(s)
Figure 7.12: Diagram of an IP Header
Figure 7.13: Checking the Strength of an SSL Server
Figure 7.14: A DMZ is an Area in Between the Public Internet and the Private Network
Figure 7.15: A Packet Filtering Firewall
Figure 7.16: A Screened Host Firewall Provides Two Layers of Protection
Figure 7.17: A Screened Subnet Firewall with a DMZ
Figure 7.18: Stateful Inspection Technology
Figure 7.19: A VPN Creates a Virtual Tunnel Using Public Networks Like the Internet
Figure 7.20: IP Header that Includes Spoofed Source IP
Figure 7.21: NetBIOS Packet
Chapter 8: Malicious Code and Malware
Figure 8.1: TCP Uses a "Three-way Handshake" to Establish a Connection
Figure 8.2: Building a FTP-based Filter for Your Protocol Analyzer
Figure 8.3: Setting FTP as the Only Protocol to Capture with the Sniffer
Figure 8.4: Viewing Captured FTP Data
Figure 8.5: A Closer Look at the Captured Password
Previous page
Table of content
Next page
SSCP Study Guide and DVD Training System
ISBN: 1931836809
EAN: 2147483647
Year: 2003
Pages: 135
Authors:
Jeffrey Posulns
,
Robert J. Shimonski
,
Jeremy Faircloth
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Adaptive Equalization: Accelerant Networks Transceiver
150- W STP-A Signal Propagation
Wavelengths of Operation
Effect of Clock Receiver Thresholds
Reduced-Voltage Signaling
Snort Cookbook
Upgrading Snort on Linux
Sniffing Gigabit Ethernet
Configuring MySQL for Snort
Not Logging
Installing and Configuring ACID
SQL Hacks
Hack 5. Solve a Crossword Puzzle Using SQL
Hack 66. Use Optimistic Locking
Hack 79. Identify Updates Uniquely
Hack 94. Create Users and Administrators
Hack 95. Issue Automatic Updates
Data Structures and Algorithms in Java
Classes and Objects
Vocabulary
List Nodes
Projects
B.1. Class Diagrams
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with Windows
Working with Templates
Working with a Document
Code Access Security Versus Role-Based Security
Local Machine Deployment Without a Deployment Manifest
GDI+ Programming with C#
Graphics Class Methods
Advanced Typography
Alpha Blending
The Matrix Class and Transformation
Using GDI in the Managed Environment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies