Wireless Operational Security

D

Data

availability, 24

categorization, 27 “28

flooding, 211, 212 “13

hijacking, 211, 213

integrity, 23, 203

mobile, securing, 147 “48

sensitive, 310

Data Encryption Standard (DES), 150, 152 “54

defined, 152

functioning of, 153 “54

Triple, 154 “55

uses, 152 “53

See also Encryption schemes

Decentralized Administration Model, 32

Defense-in-Depth strategy, 52 “56

defined, 52

detect and respond infrastructure, 55 “56

IATF and, 53

key management infrastructure, 55

operations, 53

people, 52 “53

technology, 53

De-Militarized Zone (DMZ), 189 “90

Denial of Service (DoS) attacks, 38, 53, 210 “13

baselining analysis, 283

data flooding, 211, 212 “13

hijacking, 211, 213

jamming, 210, 211

types of, 210 “11

See also Attacks

Detect and respond infrastructure, 55 “56

Device security, 140

Device-specific APIs, 147

Dictionary attacks, 42

Digital certificates, 135, 256

Digital signature process, 135

Directory Information Tree (DIT), 300

Discretionary access control, 26, 28 “29

Disruption of service, 72

Distribute Denial-of-Service (DDoS) attacks, 53

Distribution attacks, 52

Domains

defined, 47

single sign-on, 140

Dynamic Host Configuration Protocol (DHCP), 181

for authentication, 280 “82

clients , 281

servers, 281, 282

Dynamic WEP, 227 “40

defined, 227 “28

key updates, 228

Категории