Wireless Operational Security

T

Target profiling, 191 “92

TCP Wrappers, 60 “62

availability, 60

client/server relationship and, 61

defined, 60

functioning of, 61

problems with, 61 “62

software bugs , 62

See also Host-based intrusion detection

Temporal Key Integrity Protocol. See TKIP

Theft, 4 “5

computer hardware/software, 5

identity, 277

motive, 4

Thin clients , 280

Threats

identifying, 168

likelihood , determining, 161

to personal privacy, 4

WLAN, analysis, 312

TKIP, 125, 225

defined, 223

using, 226 “27

WEP weaknesses and, 225 “26

WPA, 303 “4

Total Cost of Ownership (TCO), 280, 312

Training, 170 “71

Transport Layer Security (TLS), 182, 221

Triple DES, 154 “55

defined, 154 “55

key length, 155

See also Encryption schemes

Tripwire, 64 “65

attribute verification, 65

defined, 64

protection, 65

purpose, 64

See also Host-based intrusion detection

Trojan horses, 219

Tunneling, 241

Категории