Network Perimeter Security: Building Defense In-Depth

H

Hacking attacks, 350, See also Denial-of-service (DoS) attacks; Network penetration testing; specific attacks

computer crime trends, 364

confusing switches, 67–68

control bit combinations, 107

detection, See Intrusion detection systems

DHCP vulnerabilities, 89–90

DNS and, 354–355

footprinting, 352–357

game consoles, 61, 90

hacker motivations, 349–352

ICMP vulnerabilities, 84–87, 215

passwords, 157–158

"phone home" configurations, 217

plaintext attacks, 342–343

routing protocols and, 98

social engineering, 353, 359

SYN attack, 111–112, 231–232

wardialing, 354

Hand geometry, 162

Hard drive analysis, 378–379

Hashed message authentication code (HMAC), 315

Hashing, 123–126

digital signatures, 125

file integrity checking, 270

forensic applications, 379

IPSec applications, 125–126

passwords, 155

HDLC, 64, 72, 304

Health Information Portability and Accountability Act (HIPAA), 12

Hellman, Martin, 130

HMAC, 315

"Honeypots," 271–274

Hop Count field, 79

HTTP

firewall configuration for return traffic, 212

router configuration protocol, 207

Hubs, 62–63

Категории