Wireless Operational Security
T
Target profiling, 191 “92
TCP Wrappers, 60 “62
availability, 60
client/server relationship and, 61
defined, 60
functioning of, 61
problems with, 61 “62
software bugs , 62
See also Host-based intrusion detection
Temporal Key Integrity Protocol. See TKIP
Theft, 4 “5
computer hardware/software, 5
identity, 277
motive, 4
Thin clients , 280
Threats
identifying, 168
likelihood , determining, 161
to personal privacy, 4
WLAN, analysis, 312
TKIP, 125, 225
defined, 223
using, 226 “27
WEP weaknesses and, 225 “26
WPA, 303 “4
Total Cost of Ownership (TCO), 280, 312
Training, 170 “71
Transport Layer Security (TLS), 182, 221
Triple DES, 154 “55
defined, 154 “55
key length, 155
See also Encryption schemes
Tripwire, 64 “65
attribute verification, 65
defined, 64
protection, 65
purpose, 64
See also Host-based intrusion detection
Trojan horses, 219
Tunneling, 241