Maximum Wireless Security

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

I Love You worm

       estimated damages  

i-mode

       (cHTML)   2nd  

       Japanese PCS devices   2nd  

IBM Wireless Security Auditor

       application window  

       configuration screen  

       features   2nd  

       GPS support  

       Help menu  

       launching  

       root background window  

       supported WNICs  

IDS

       (intrusion detection systems)  

       diagnostic software

               sensitivity versus specificity   2nd  

       future  

               embedded IDS   2nd  

               geometric data display  

               host versus network-based IDS  

               strict anomaly detection  

               strict anomaly detection;   [See fluctuations]2nd   [See fluctuations]

       hacking strategies

               fragmentation  

               HTTP mutation   2nd  

               spoofing TCP sequence number  

       host-based  

       integrity monitors

               Tripwire   2nd  

       limitations

               switched network sensoring  

               update maintenance  

               vulnerability to attack  

       log file monitors  

               Swatch   2nd  

       network-based  

       predictive value

               Bayes theorem  

               function of  

       predictive values

                likelihood ratios (LRs)   2nd   3rd  

       problems and solutions  

       ROC curves

               accuracy measurements  

       sensitivity

               accuracy results   2nd  

               mathematical formula   2nd  

       signature scanners

               anomaly detectors  

               Snort   2nd  

       specificity

               accuracy results   2nd  

               mathematical formula  

       stateful  

       Whister tool (Anti-IDS)  

IDSs

       WLAN implementation   2nd  

IEEE

       (Institute of Electrical and Electronics Engineers)  

       802 group

               certification subsets  

               function of  

       802.11 standard  

               CSMA/Collision Avoidance   2nd  

               overview   2nd  

               prior technoligies  

       802.11a standard

               5GHz range  

               Orthogonal Frequency Division Multiplexing  

               overview  

               versus 802.11b standard   2nd  

       802.11b standard

               2.4 GHz range   2nd  

               DSSS (direct-sequence spread spectrum)  

               versus 802.11a standard   2nd  

       802.11g standard

               overview  

       802.3 standard

               CSMA/CD   2nd  

IEEE 802.11 standard

       administrative issues  

       future enhancements

               AES (Advanced Encryption Standard)   2nd  

               TKIP (Temporal Key Integrity Protocol)   2nd   3rd   4th  

       security issues

               flaws   2nd  

       security protocols

               Shared Key authentication   2nd  

               WEP encryption   2nd  

       WEP

               128-bit  

               development of   2nd  

               flaws   2nd  

               original intent of  

               RC4 algorithm  

Info panel (Kismet)   2nd   3rd   4th  

information utility (NetForce)  

information utility (vxUtil)  

Initialization Vector (IV)

       RC4 encryption   2nd  

       WEP flaws   2nd  

installing

       AiroPeek NX   2nd   3rd  

       AirSnort   2nd  

       CENiffer

               Compaq iPAQ  

       Ethereal for Linux   2nd   3rd  

               RPMs   2nd  

               troubleshooting errors   2nd  

       Ethereal for Windows   2nd  

       Kismet   2nd   3rd  

               options   2nd  

       MiniStumbler

               Compaq iPAQ  

       Net Force

               Compaq iPAQ   2nd   3rd   4th  

       NetStumbler   2nd   3rd  

       Pocket PC programs   2nd  

       Pocket PC WLAN drivers   2nd  

       Swatch log file monitor   2nd  

       vxUtil

               Compaq iPAQ   2nd   3rd   4th  

       WEPCrack  

       WinPcap utility

               Ethereal for Windows  

       WNICs

               Windows XP   2nd  

instant mesaging

       hacker technique   2nd  

integrity monitors (IDS)

       Tripwire   2nd  

Internet Explorer

       security settings  

Internet Information Server (IIS)

       configuring for WML applications  

intrusion detection systems (IDSs)

       WLAN implementation   2nd  

intrusion detection systems,   [See IDS]

IP addresses

       masks (VPNs)  

ipconfig tool

       MAC addresses

               displaying (Windows NT/2000/XP/.NET)  

ipconfig-a tool

       MAC addresses

               displaying (Linux)  

IPSec

       (Internet Protocol Security)  

       3DES (Triple DES)  

       DES (Data Encryption Standard)  

       embedded IDS   2nd  

       encryption  

       machine-level authentication  

       RFCs 2401-2409  

       transport mode  

       tunnel mode  

IPX packets

       transporting (VPNs)  

IrDA protocol

       (Infrared Data Association)   2nd   3rd   4th   5th  

       overview   2nd   3rd  

       PANs (personal area networks)  

       potential light transmission problems  

ISM (Industrial, Science, and Medical) frequencies  

isotropic Antennas  

IV (Initalization Vector)

       WEP  

               collisions   2nd   3rd   4th  

IV (Initialization Vector)

       WEP

               weak formats   2nd  

Категории