The index that appeared in the print version of this title was intentionally removed from the eBook. Please use the search function on your eReading device to search for terms of interest. For your reference, the terms that appear in the print index are listed below.
128-bit key
802.1x
2048-bit asymmetric key
A
AAA. See authentication, authorization, and accounting
acceptable use policy (AUP)
access control. See also authorization
access control list (ACL)
access management
accidental threats
accidents
accounting
ACL. See access control list
active sniffing
active threats
addressing
administrator account password
ADS. See alternate data streams
ADSL. See Asymmetrical Digital Subscriber Line
Advanced Encryption Standard (AES)
advanced persistent threat (APT)
adware
adware scanner. See anti-malware scanners
agents
AH. See Authentication Header
ALE. See annualized loss expectancy
alerts
algorithm encryption standard (AES)
algorithms
allow by default
allow by exception
allow-exception rule
alternate data streams (ADS)
annualized loss expectancy (ALE)
annualized rate of occurrence (ARO)
anomaly-based detection
anonymity
anonymous connectivity
anti-forensics
anti-malware scanners
anti-SPAM filters
anti-spyware scanner
antivirus scanners
anycast address
AppleTalk
appliance firewalls
appliance format
application conflicts
application firewall
application gateway
Application Layer (Layer 7)
application-level firewall
application proxy
application proxy firewalls
APT. See advanced persistent threat
arbitrary code execution
ARO. See annualized rate of occurrence
ARP flooding
ARP spoofing
asset value (AV)
assets
asymmetric cryptography
Asymmetrical Digital Subscriber Line (ADSL)
at-firewall authentication
attack surface
attacking
audit capabilities
auditing
auditors
AUP. See acceptable use policy
authentication
authentication, authorization, and accounting (AAA)
Authentication Header (AH)
authenticity
authorization
availability
availability attack
avalanche effect
awareness
B
Back Orifice
backdoor account attack
backdoors
Backtrack
backups
bandwidth for VPN
banner
banner grabbing
basic packet filtering
bastion host
bastion host OS
behavioral-based detection
benign address
best practices
biometrics
BIOS/firmware flashing
BitTorrent
blacklist
blogs
“Blue Screen of Death”
boot sector
border firewall
border sentry
border-crossing communications
botnet army
botnets
bots
bottlenecks. See also chokepoint
boundary networks
breach
bricking
bridges
Bring Your Own Device (BYOD)
brute force attack
brute-force password attack
buffer overflows
buffers
build-it-yourself firewall bump-in-the-stack
bump-in-the-wire
business continuity plan
business operations
business tasks
BYOD. See Bring Your Own Device
bypass VPN implementation
C
CA. See Certificate Authority
cable modem devices
caching
centralized logging system
CERN. See European Laboratory for Particle Physics
Certificate Authority (CA)
CGI scripts. See Common Gateway Interface scripts
channels
chip creep
chokepoint
ciphertext
circuit
circuit firewall
circuit proxy
Cisco
Cisco Linksys wireless router
client virtualization. See desktop virtualization
clients
client/server network
client-side configuration
client-to-server VPNs
Clipper Chip
closed source software
cloud backup storage
cloud computing
cloud implementation
clusters
code testing
coding errors
cold calling
co-location of Web server
command-line-based interface
command shell
commercial firewall
commercial hardware firewall
commercial off-the-shelf (COTS) software
commercial software firewall
commercial VPNs
Common Gateway Interface (CGI) scripts
communication encryption
communications in business environment
communications pathways
communications to block
compartmentalization
compliance
compliance auditing
compromise
computer viruses
conditional trust
confidentiality
configuration errors
configuration of VPN
configuration scans
Connection Protocol
containment
content filtering
contract workers
cookie filters
corporate firewall VPN termination
cost/benefit analysis
cost-effective network security
COTS software. See commercial off-the-shelf software
covert channels
CPE. See customer premise equipment
credential sharing
cross-site scripting (XSS)
Cryptcat
cryptography
customer premise equipment (CPE)
cybersecurity role
D
data at rest
data encryption. See encryption
Data Encryption Standard (DES)
data integrity
data leakage
data leakage prevention (DLP)
Data Link Layer (Layer 2)
data origin authentication
data protection firewall
database-based detection
database firewall
data-centric security model
data-encrypted tunnel
DDoS attacks. See distributed denial of service attacks
dead-man switch
decryption
dedicated application-specific proxy firewall
dedicated connection
dedicated leased lines
de-encapsulation
default allow
default deny
default-deny rule default password
default-permit stance
defense in depth
defensive programming technique
delay
deliberate threats
demilitarized zone (DMZ)-based implementation
demilitarized zones (DMZs)
denial of service (DoS)
denial of service (DoS) attacks
deny by default
deny by exception
deny exception rule
deployment of a VPN
DES. See Data Encryption Standard
desktop virtualization
detailed implementation plans
detection
deterrence
deterrent
device firmware replacement options
DHCP. See Dynamic Host Configuration Protocol
dialers
dial-up modem connections
dictionary attacks
dictionary password cracking
Diffie-Hellmann
digital certificates
digital envelope
digital forensic techniques
digital signatures
digital subscriber line (DSL) modems
DirectAccess
directory services
disaster recovery plan
disasters
disgruntled employees
distributed denial of service (DDoS) attacks
distributed LAN
diversity of defense
divide and conquer
DLP. See data leakage prevention
DMZ pinholes
DMZ Web server
DMZs. See demilitarized zones
DNS poisoning
DNS spoofing
documentation
do-it-yourself firewall
Domain Name System (DNS)
domain registrations
domains
domains of IT infrastructure
DoS. See denial of service
DoS attacks. See denial of service attacks downtime
DSL modems. See digital subscriber line modems
dual IP stacks
dual-homed firewall
dual-stack migration strategy
dumpster diving
duplicate servers
dynamic addressing
dynamic filtering system
Dynamic Host Configuration Protocol (DHCP)
dynamic NAT
dynamic packet filtering
dynamic password token
E
easy access management console port or interface
easy-access power switch
eavesdropping
ECC. See elliptical curve cryptography
edge routers
education
EF. See exposure factor
efficient network security
egress filtering
electricity consumption
Electronic Privacy Information Center (EPIC)
electrostatic discharge (ESD)
elliptical curve cryptography (ECC)
Encapsulating Security Payload (ESP)
encapsulation
encapsulation protocols. See also tunneling protocols
encrypted protocols
encryption
encryption filtering
encryption key sets
encryption level
endpoint security
enhancements for firewall
enumeration
EPIC. See Electronic Privacy Information Center
equipment selection for secure network design
eradication, incident response
ESD. See electrostatic discharge
ethernet frame
ethical hackers
ethical hacking. See penetration testing
European Laboratory for Particle Physics (CERN)
experts
exploitation of system vulnerability
exploits
exposure factor (EF)
external attacks
external entities threats
external service access
external threats
external-only communications
extranet VPNs
extranets
F
factory defaults
fail-close state
fail-open state
fail-safe security stance
fail-safe/fail-secure response
fail-secure state
failures
fair queuing
fallback attacks
false negative
false positives
Federal Information Processing Standards (FIPS) Publications
file encryption
file sharing
File Transfer Protocol (FTP)
filtering
filters
firewalking
firewall checklist
firewall filtering
firewall limitation
firewall logging
firewall management
firewall monitoring
firewall policy
firewall rules
firewall specialization
firewall-to-firewall VPN
firewall troubleshooting
firewalls
firmware flash memory on-board chip
flaw exploitation attacks
flexibility
flooding
focus for information security
follow-up, incident response
footprinting
forced universal participation
Forefront Unified Access Gateway (UAG)
forensic techniques
formal change management
forms-based authentication
Fport
FQDNs. See fully qualified domain names
fragmentation
fragmentation attacks
frames
free software
FTP. See File Transfer Protocol
full mesh of leased lines
fully qualified domain names (FQDNs)
future developments
fuzzing tools
G
gateway
gateway-to-gateway VPN
general filter firewall
general purpose OSs
goals of network security GoToAssist
GoToMyPC
governance
governance, risk, and compliance (GRC)
granular access control
graphical user interface (GUI)-based interface
growth scenario contingencies
GUI-based interface. See graphical user interface-based interface
H
hackers
hacking
hacktivism
hairpinning
handoff authentication
hard drives
hardening firewall
hardening host
hardening networks
hardening servers
hardening systems
hardware address
hardware failures
hardware firewalls
hardware VPNs
hardware/software platform
hashing
hash algorithm
hash value
hashing
headers
heat
HFS. See hierarchical file system
hierarchical file system (HFS)
hijacking attack
home office wireless
home routers
honeynets
honeypots
host
host firewalls. See also software firewall
host security controls
host software firewall
host VPN software product
hosting
HOSTS file
host-to-gateway VPN
host-to-host VPN
Hot Standby Router Protocol (HSRP)
HotSpotShield
HotSpotVPN
HSRP. See Hot Standby Router Protocol
HTTP Proxy
HTTPS. See Hypertext Transfer Protocol Secure
hybrid attack
hybrid firewall
hybrid VPN
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol Secure (HTTPS)
I
IAM. See identity and access management
IANA. See Internet Assigned Numbers Authority
ICMP. See Internet Control Message Protocol
ICMP redirect
identity
identity and access management (IAM)
identity proofing
IDS. See intrusion detection systems
IDS insertion
IEEE 802.1x
IEMI. See intentional electromagnetic interference
IETF. See Internet Engineering Task Force
IKEv2. See Internet Key Exchange v2
IM. See instant message
IMS. See IP Multimedia Subsystem
inbound rules for firewall
inbound traffic
incident response
incident response plan
individual firewall
industry-standard protocol
information gathering. See reconnaissance
information security professionals
Information Technology Infrastructure Library (ITIL)
infrastructure
ingress filtering
in-person policy training
insertion attacks
installer-induced security threats
instant message (IM)
intangible costs and value
Integrated Services Digital Network (ISDN)
integrity
intentional electromagnetic interference (IEMI)
interception attack
intermediary network
internal code planting
internal compliance audits
internal firewall
internal-only traffic
internal personnel
internally connected VPN
Internet Assigned Numbers Authority (IANA)
Internet Café VPNs
Internet Connection Sharing service
Internet connectivity
Internet Control Message Protocol (ICMP)
Internet Engineering Task Force (IETF)
Internet Key Exchange (IKE)
Internet Key Exchange v2 (IKEv2)
Internet Protocol Security (IPSec)
Internet Protocol version
Internet Protocol version 4 (IPv4)
Internet Protocol version 6 (IPv6)
Internet relay chat (IRC) channel
Internet service provider (ISP) devices
Internet threats
Internet-based Traceroute tools
Internet-facing servers
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
intranet
intranet VPNs
intruders
intrusion and incident response plan
intrusion detection systems (IDS)
intrusion prevention systems (IPS)
inventory of communications
IP addresses
IP block
IP forwarding
IP Multimedia Subsystem (IMS)
IP Network Address Translator
IPS. See intrusion prevention systems
IPSec. See Internet Protocol Security
IPSec VPNs
IPv4. See Internet Protocol version 4
IPv6. See Internet Protocol version 6
IPX/SPX. See Internetwork Packet Exchange/Sequenced Packet Exchange
IRC channel. See Internet relay chat channel
ISDN. See Integrated Services Digital Network
ISP devices. See Internet service provider (ISP) devices
IT infrastructure domains
IT infrastructure threats
ITIL. See Information Technology Infrastructure Library
J
JanusVM
job description
K
Keep It Simple: Security (KISS)
Kerberos
Kernel IP Security (KLIPS) key exchange
key pairs
key space
keycard security
keystroke logger
knowledge-based detection
known addresses
L
laboratory tests
LAN. See local area network; wireless local area network
LAN Domain. See Local Area Network Domain
LAN infrastructure security
LANMAN hash
LAN-to-LAN VPNs
LAN-to-WAN Domain
latency
Layer 2 Forwarding (L2F)
Layer 3 of the OSI model
Layer 7 of the OSI model
Layer 2 Transport Protocol (L2TP)
Layer 2 Tunneling Protocol (L2TP)
layered security approach
layers of OSI model
leased lines
leetspeak
Linksys access points
Linux firewalls
load balancers
load balancing
load-related performance
local area network (LAN)
Local Area Network (LAN) Domain
local host
location of VPN
location-aware anti-theft software
log contents
log file analysis
log file analysis tools
logging
logging on. See authentication
logic bomb
logical address
logical security checklist
LogMeIn
Loki
loophole
M
MAC address. See Media Access Control address
MAC addresses
MAC spoofing
Mac support
mainframe
malicious address
malicious code
malicious code scanner
malicious hackers
malicious traffic
malware
management
management interfaces
man-in-the-middle (MitM) attacks
maximum transmission unit (MTU)
MBSA. See Microsoft Baseline Security Analyzer
mean time between failures (MTBF)
mean time to failure (MTTF)
Media Access Control (MAC) address
metacharacters
metrics
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Point-to-Point Encryption (MPPE)
mission-critical issue
mission-critical process
MitM attacks. See man-in-the-middle attacks
MITRE
mobile code
mobile devices
Mobile IP
mobile wireless
modeling
modems
module-based VPN
monitoring
monkey-in-the-middle attack
MPPE. See Microsoft Point-to-Point Encryption
MSTSC command
MTBF. See mean time between failures
MTTF. See mean time to failure
MTU. See maximum transmission unit
multicast address
multifactor authentication
multi-homed firewall
multiple LANs
multiple-layered defense. See also defense in depth
Murphy’s Law
N
NAC. See network access control
NAC service. See network access/admission control service
NAS. See network access server
NAT. See network address translation
NAT-compatible encryption protocols
National Information Infrastructure (NII)
National Institute of Standards and Technology (NIST)
national security
National Security Agency (NSA)
National Vulnerability Database
native firewall
native operating system firewall
NAT-PT. See Network Address Translation–Protocol Translation
NAT-T. See NAT-Traversal
NAT-Traversal (NAT-T)
natural disasters
necessary business tasks
Nessus
Nessus vulnerability scanning
NetBEUI. See NetBios Extended User Interface
NetBios Extended User Interface (NetBEUI)
NetBus
Netcat
Netscape. Version 1.0
Netstat
network access control (NAC)
Network Access Protocol
network access server (NAS)
network access/admission control (NAC) service
network address translation (NAT)
Network Address Translation–Protocol Translation (NAT-PT)
network and resource availability threats
network compartmentalization. See compartmentalization
network design
network infrastructures examples
network interface card (NIC)
network interface controller (NIC)
network issues, internal and external
Network Layer (Layer 3)
Network Layer of the OSI model
Network News Transfer Protocol (NNTP)
network performance
network security
network security components
network security design
“Network Tools”
network topologies. See topologies
network traffic access control security policy
new technology file system (NTFS)
NIC. See network interface card
NII. See National Information Infrastructure
NIST. See National Institute of Standards and Technology
nmap
NNTP. See Network News Transfer Protocol
node
node security
no-exceptions policy
non-authenticating query service
non-content-filtering firewalls
non-dedicated connection
nonrepudiation
normal baseline
NSA. See National Security Agency
NTFS. See new technology file system
N-Tier deployment
NTRconnect
OC line. See optical carrier line
offsite storage
off-the-shelf firewall
one-time pad encryption systems
one-way function mathematical operation
Onion Router application, The. See Tor application
onion routing
online remote VPN options
online storage
onsite storage
open source software
Open Systems Interconnection (OSI) Reference Model
open-source applications and tools
open-source product
open-source software network firewall
open-source VPNs
Openswan
operating system-based VPNs
operating systems (OSs)
OPM. See Other People’s Money, Inc.
opportunistic hackers
optical carrier (OC) line
OS/2
OSI model. See Open Systems Interconnection (OSI) Reference Model
OSs. See operating systems
Other People’s Money, Inc. (OPM)
out of band communication
outbound rules for firewall
outbound traffic
overlapping
P
package filtering firewall
packet filtering
packet filtering firewall
packet header
packet payload
packet sniffer
PacketiX VPN
padded cells
partition
passive threats
password cracking
password-protected homegroup
PAT. See port address translation
patch management
patches
payloads
PBX. See private branch exchange
pcAnywhere
peer systems
peer-to-peer (P2P) communications
peer-to-peer (P2P) networks
penetration testing
performance
perimeter
perimeter network
permissions
personal communications
personal firewall
personal hardware firewall
personal software firewall
personal/individual VPN
personally identifiable information (PII)
personnel activity monitoring
phishing
physical access
physical addresses
physical attacks
physical damage
Physical Layer (Layer 1)
physical security
physical threats
PII. See personally identifiable information
piloting
PING
ping command
ping sweeps
PKI. See Public Key Infrastructure
placement of firewalls
plaintext protocols
platform independence
play configuration
playback attacks
plug configuration
PNAC. See port-based network access control
Point-to-Point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP)
POP. See Post Office Protocol
pop-up blockers
port address translation (PAT)
port forwarding
port numbers
port scanning
port validation
portability of equipment
port-based network access (admission) control (PNAC)
ports
POSIX
Post Office Protocol (POP)
post-attack activities
post-mortem assessment review
power faults
power switch
PPP. See Point-to-Point Protocol
PPTP. See Point-to-Point Tunneling
Protocol preparation, incident response
Presentation Layer (Layer 6)
prevention
principle of least privilege
privacy
private branch exchange (PBX)
private IP address
private key
private messages
private networks
private VPN
privilege control
privilege escalation
privileged access
privileges
PRNG. See pseudo random number generator
proactive security management
professional hackers
proprietary OSs
protocol encryption
protocols
proxies
proxy attack
proxy firewall
proxy manipulation
proxy servers
proxy-based encryption
pseudo random number generator (PRNG)
public IP addresses
public key
public key cryptography
Public Key Infrastructure (PKI)
public networks
public wireless
public-key cryptography
PuTTY application
pwned
Q
QoS. See quality of service
quality of service (QoS)
R
rack mountable equipment
RADIUS-based authentication
RAID. See redundant array of independent disks
random challenge-response dialog
RAS. See remote access server
RDC. See Remote Desktop Connection
RDP. See Remote Desktop Protocol
reconnaissance
recovery
recreational hackers
redundancy
redundant array of independent disks (RAID)
Regional Internet Registry (RIR)
regular self-assessment
rekeying processes
remote access
Remote Access Domain
remote access policy
remote access server (RAS)
remote access VPN
Remote Assistance
remote connection
remote control
Remote Desktop Connection (RDC)
Remote Desktop Protocol (RDP)
Remote Desktop Services
remote hacking
remote or mobile host
remote printing
remote VPN connection
remote-to-home VPN
remote-to-office VPN
removable case
removable media
replay attacks
requests for comments (RFCs)
research. See reconnaissance
reset button
resources
resources sites
response
return on investment (ROI)
reverse proxy
reverse proxy firewall service
RFC 791
RFC 1918
RFC 1918 addresses
RIR. See Regional Internet Registry
risk
risk assessment
risk management
risk matrix
Rivest-Shamir-Adelman (RSA)
rogue access point
rogue device insertion
rogue DHCP
ROI. See return on investment
roles
rootkits
round robin
round robin database tool (RRDtool)
routers
RPM install of Openswan
RRDtool. See round robin database tool
RSA. See Rivest-Shamir-Adelman
rule sets
rules
rule-set ordering
S
sabotage
sacrificial host
scalability
scanning
scope/binding nature statement
screened IDS/IPS solution
screening routers
script kiddie
SDRAM. See synchronous dynamic random access memory
search engine
sectors
secure network design. See network design
secure remote access
Secure Shell (SSH) protocol
Secure Socket Tunneling Protocol (SSTP)
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)–based tunneling protocols
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
secured VPN. See also virtual private network (VPN)
security
security assessment
security association (SA)
security assurance
security checklist
security goals
security infrastructure
security management
security mistakes
security objectives
security policies
security stance
security strategy
security suite firewall
Security Technical Implementation Guides (STIGs)
security technologies
security through obscurity
security troubleshooting
security zones
SED. See static electricity discharge
segment
self-assessments
sender fragmentation
senior management
separation of duties
servers
service level agreement (SLA)
service set identifier (SSID)
services tab of SmoothWall
session
session hijacking
Session Layer (Layer 5)
shell code
ShieldsUP! port scanning tool
Shorewall firewall
Shrew Soft
sieve firewall
signature-based detection
Simple Mail Transfer Protocol (SMTP)
simple network management protocol (SNMP)
simplicity
simulated firewall test
single-factor authentication
single loss expectancy (SLE)
single point of failure
single sign-on (SSO)
Skype
SLA. See service level agreement
slack space
SLE. See single loss expectancy
slideware
sliding window of recorded traffic
small office/home office (SOHO)
SmoothWall firewall
SmoothWall software
SMTP. See Simple Mail Transfer Protocol
SNA. See System Network Architecture
sniffer
SNMP. See simple network management protocol
Snort
Snort intrusion detection software
Snort intrusion detection solution
social engineering
socket
software coding errors
software firewall
software firewall products
software host firewalls
software VPNs
SOHO. See small office/home office
Solera DS series of network forensic appliances
solid VPN policy
spam
split knowledge. See separation of duties
split tunnel
spoofed addresses
spoofing
spyware
spyware scanner. See anti-malware scanners
SQL injection
SSH protocol. See Secure Shell protocol
SSID. See service set identifier
SSL. See Secure Sockets Layer
SSL VPNs
SSO. See single sign-on
SSTP. See Secure Socket Tunneling Protocol
stability of VPNs
state management
stateful inspection
stateful inspection filtering
stateful inspection firewalls
static addressing
static electricity
static electricity discharge (SED)
static filtering firewalls
static IP
static NAT
static packet filtering
steganography
STIGs. See Security Technical Implementation Guides
storage covert channel
strong authentication
strong encryption
subnet architecture
subnetting
sub-protocols
SubSeven
suite-member firewalls
sunk cost
switches
symmetric cryptography
symptoms
synchronous dynamic random access memory (SDRAM)
syslog
System Network Architecture (SNA)
System/Application Domain
system-by-system–based security
Systems/Applications Domain
T
TACACS+. See Terminal Access Controller Access-Control System Plus
tangible costs and value
targets of hackers
TCP. See Transmission Control Protocol
tcpdump command
TCP/IP. See Transmission Control Protocol/Internet Protocol
TCPView
telcos. See telecommunication service providers
telecommunication service providers (telcos)
telecommuting
telnet
Terminal Access Controller Access-Control System Plus (TACACS+)
terminal services
testing
testing firewall
theft
third-party software firewalls
third-party trust system
threats
time stamps
timing covert channel
TLS. See Transport Layer Security
tools
topology
Tor application
TPM chip. See Trusted Platform Module chip
traceroute command
traceroute tools
traffic and trend analysis
traffic congestion
traffic generation
traffic inventory
traffic loads
training
transaction security
translation migration strategy
Transmission Control Protocol (TCP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
transparent network security
Transport Layer (Layer 4)
Transport Layer Protocol
Transport Layer Security (TLS)
transport mode encryption
transport mode (host-to-host) of IPSec
trapdoor
trapping intruders and violators
triple-homed firewall
Trojan horse
troubleshooting
trust
Trusted Platform Module (TPM) chip
trusted third party
trusted VPN
trustworthy
TS RemoteApp
TS Web Access
tunnel mode encryption
tunnel mode of IPSec
tunneling
tunneling migration strategy
tunneling protocols
two-factor authentication
U
UAG. See Forefront Unified Access Gateway
ubiquitous firewall
UDP. See User Datagram Protocol
unauthorized software
unauthorized tunnels
unfiltered IDS/IPS installation
unicast address
unified threat management (UTM)
Uninterruptible Power Supply (UPS)
universal denial rule
universal participation
unknown zero-day attacks
unpartitioned space
updates
UPS. See Uninterruptible Power Supply
upstream filtering
URL injectors
usability
USENET newsgroups
User Authentication Protocol
user awareness
User Datagram Protocol (UDP)
User Domain
user training
userland-only install
UTM. See unified threat management
V
Van Eck phreaking
vaporware. See slideware
vendors
Verizon Data Breach Investigations Report
violations of security
violators
virtual firewall test
virtual firewalls
Virtual Local Area Network (VLAN)
virtual private network (VPN)
virtual reassembly
Virtual Router Redundancy Protocol (VRRP)
virtualization
virtualization security
virtualized firewall
virtualized network environment
virtualized networks
virus
VLAN. See Virtual Local Area Network
VMware
voluntary compliance
VPN. See virtual private network
VPN appliances
VPN authorization
VPN link
VRRP. See Virtual Router Redundancy Protocol
vulnerabilities
vulnerability assessments
vulnerability management
vulnerability research
vulnerability scanning
W
wake-on-LAN
WAN. See distributed LAN; wide area network
WAN Domain
WAN VPN connections
wardialing
wardriving
weakest link security stance
Web browsers
Web server
Web-based GUI
Web-based policy training
well-known port numbers
white-list controls
whitelists
whois
whole hard drive encryption
wide area network (WAN)
Windows Firewall
Windows Server 2008 Network Access
WinZapper tool
wired networks
wireless access points
wireless connectivity
wireless local area network (LAN)
wireless networking
wireless technologies
Wireshark
wirespeed functions
workgroup
Workstation Domain
WORM storage device. See write-once read-many storage device
worms
wrappers
write-once read-many (WORM) storage device
written firewall policy
written security policy
X
XSS. See cross-site scripting
Z
zero-day attacks
zero-day exploits
zeroization
zombie army
zombies
zone file
zone of risk
zones of trust