Wireless Operational Security

H

Hackers

aggregating damage caused by, 110

intent vs. degree of damages, 109 “10

internal, 8

malicious, 8

maximum penalty for, 109

state convictions and, 111 “12

Hacking, vendor-assisted, 90

Hacking Techniques: Introduction to Password Cracking, 42

Health Insurance Portability and Accountability Act (HIPAA), 19 “21

action mandated areas, 20 “21

goals, 19

guarantees , 20

impact, 19

See also Privacy standards/regulations

Hidden manipulation, 87 “88

Hijacking, 211, 213

Hoaxes, 72

Homeland Security Act of 2002, 101

Honeynets, 67

Honeypots, 67

Host-based authentication, 37 “38

Host-based intrusion detection, 60 “65

AtGuard, 63 “64

BackOfficer Friendly, 62 “63

Back Orifice (BO), 63

NukeNabber, 62

syslog, 64

TCP Wrappers, 60 “62

Tripwire, 64 “65

See also Intrusion detection

Hot Standby Routing Protocol (HSRP), 268

HTTPS, 138, 139

Hybrid Administration Model, 32 “33

Hybrid attacks, 42

Категории