Index

The index that appeared in the print version of this title was intentionally removed from the eBook. Please use the search function on your eReading device to search for terms of interest. For your reference, the terms that appear in the print index are listed below.

128-bit key

802.1x

2048-bit asymmetric key

A

AAA. See authentication, authorization, and accounting

acceptable use policy (AUP)

access control. See also authorization

access control list (ACL)

access management

accidental threats

accidents

accounting

ACL. See access control list

active sniffing

active threats

addressing

administrator account password

ADS. See alternate data streams

ADSL. See Asymmetrical Digital Subscriber Line

Advanced Encryption Standard (AES)

advanced persistent threat (APT)

adware

adware scanner. See anti-malware scanners

agents

AH. See Authentication Header

ALE. See annualized loss expectancy

alerts

algorithm encryption standard (AES)

algorithms

allow by default

allow by exception

allow-exception rule

alternate data streams (ADS)

annualized loss expectancy (ALE)

annualized rate of occurrence (ARO)

anomaly-based detection

anonymity

anonymous connectivity

anti-forensics

anti-malware scanners

anti-SPAM filters

anti-spyware scanner

antivirus scanners

anycast address

AppleTalk

appliance firewalls

appliance format

application conflicts

application firewall

application gateway

Application Layer (Layer 7)

application-level firewall

application proxy

application proxy firewalls

APT. See advanced persistent threat

arbitrary code execution

ARO. See annualized rate of occurrence

ARP flooding

ARP spoofing

asset value (AV)

assets

asymmetric cryptography

Asymmetrical Digital Subscriber Line (ADSL)

at-firewall authentication

attack surface

attacking

audit capabilities

auditing

auditors

AUP. See acceptable use policy

authentication

authentication, authorization, and accounting (AAA)

Authentication Header (AH)

authenticity

authorization

AV. See asset value

availability

availability attack

avalanche effect

awareness

B

Back Orifice

backdoor account attack

backdoors

Backtrack

backups

bandwidth for VPN

banner

banner grabbing

basic packet filtering

bastion host

bastion host OS

behavioral-based detection

benign address

best practices

biometrics

BIOS/firmware flashing

BitTorrent

blacklist

blogs

“Blue Screen of Death”

boot sector

border firewall

border sentry

border-crossing communications

botnet army

botnets

bots

bottlenecks. See also chokepoint

boundary networks

breach

bricking

bridges

Bring Your Own Device (BYOD)

brute force attack

brute-force password attack

buffer overflows

buffers

build-it-yourself firewall bump-in-the-stack

bump-in-the-wire

business continuity plan

business operations

business tasks

BYOD. See Bring Your Own Device

bypass VPN implementation

C

CA. See Certificate Authority

cable modem devices

caching

centralized logging system

CERN. See European Laboratory for Particle Physics

Certificate Authority (CA)

CGI scripts. See Common Gateway Interface scripts

channels

chip creep

chokepoint

ciphertext

circuit

circuit firewall

circuit proxy

Cisco

Cisco Linksys wireless router

client virtualization. See desktop virtualization

clients

client/server network

client-side configuration

client-to-server VPNs

Clipper Chip

closed source software

cloud backup storage

cloud computing

cloud implementation

clusters

code testing

coding errors

cold calling

co-location of Web server

command-line-based interface

command shell

commercial firewall

commercial hardware firewall

commercial off-the-shelf (COTS) software

commercial software firewall

commercial VPNs

Common Gateway Interface (CGI) scripts

communication encryption

communications in business environment

communications pathways

communications to block

compartmentalization

compliance

compliance auditing

compression

compromise

computer viruses

conditional trust

confidentiality

configuration errors

configuration of VPN

configuration scans

Connection Protocol

containment

content filtering

contract workers

cookie filters

corporate firewall VPN termination

cost/benefit analysis

cost-effective network security

COTS software. See commercial off-the-shelf software

covert channels

CPE. See customer premise equipment

credential sharing

cross-site scripting (XSS)

Cryptcat

cryptography

customer premise equipment (CPE)

cybersecurity role

D

data at rest

data encryption. See encryption

Data Encryption Standard (DES)

data integrity

data leakage

data leakage prevention (DLP)

Data Link Layer (Layer 2)

data origin authentication

data protection firewall

database-based detection

database firewall

data-centric security model

data-encrypted tunnel

DDoS attacks. See distributed denial of service attacks

dead-man switch

decryption

dedicated application-specific proxy firewall

dedicated connection

dedicated leased lines

de-encapsulation

default allow

default deny

default-deny rule default password

default-permit stance

defense in depth

defensive programming technique

delay

deliberate threats

demilitarized zone (DMZ)-based implementation

demilitarized zones (DMZs)

denial of service (DoS)

denial of service (DoS) attacks

deny by default

deny by exception

deny exception rule

deployment of a VPN

DES. See Data Encryption Standard

desktop virtualization

detailed implementation plans

detection

deterrence

deterrent

device firmware replacement options

DHCP. See Dynamic Host Configuration Protocol

dialers

dial-up modem connections

dictionary attacks

dictionary password cracking

Diffie-Hellmann

digital certificates

digital envelope

digital forensic techniques

digital signatures

digital subscriber line (DSL) modems

DirectAccess

directory services

disaster recovery plan

disasters

disgruntled employees

distributed denial of service (DDoS) attacks

distributed LAN

diversity of defense

divide and conquer

DLP. See data leakage prevention

DMZ pinholes

DMZ Web server

DMZs. See demilitarized zones

DNS. See Domain Name System

DNS poisoning

DNS spoofing

documentation

do-it-yourself firewall

Domain Name System (DNS)

domain registrations

domains

domains of IT infrastructure

DoS. See denial of service

DoS attacks. See denial of service attacks downtime

DSL modems. See digital subscriber line modems

dual IP stacks

dual-homed firewall

dual-stack migration strategy

dumpster diving

duplicate servers

dynamic addressing

dynamic filtering system

Dynamic Host Configuration Protocol (DHCP)

dynamic NAT

dynamic packet filtering

dynamic password token

E

easy access management console port or interface

easy-access power switch

eavesdropping

ECC. See elliptical curve cryptography

edge routers

education

EF. See exposure factor

efficient network security

egress filtering

electricity consumption

Electronic Privacy Information Center (EPIC)

electrostatic discharge (ESD)

elliptical curve cryptography (ECC)

Encapsulating Security Payload (ESP)

encapsulation

encapsulation protocols. See also tunneling protocols

encrypted protocols

encryption

encryption filtering

encryption key sets

encryption level

endpoint security

enhancements for firewall

enumeration

EPIC. See Electronic Privacy Information Center

equipment selection for secure network design

eradication, incident response

ESD. See electrostatic discharge

ethernet frame

ethical hackers

ethical hacking. See penetration testing

European Laboratory for Particle Physics (CERN)

experts

exploitation of system vulnerability

exploits

exposure factor (EF)

external attacks

external entities threats

external service access

external threats

external-only communications

extranet VPNs

extranets

F

factory defaults

fail-close state

fail-open state

fail-safe security stance

fail-safe/fail-secure response

fail-secure state

failures

fair queuing

fallback attacks

false negative

false positives

Federal Information Processing Standards (FIPS) Publications

file encryption

file sharing

File Transfer Protocol (FTP)

filtering

filters

firewalking

firewall checklist

firewall filtering

firewall implementation

firewall limitation

firewall logging

firewall management

firewall monitoring

firewall policy

firewall rules

firewall specialization

firewall-to-firewall VPN

firewall troubleshooting

firewalls

firmware flash memory on-board chip

flaw exploitation attacks

flexibility

flooding

focus for information security

follow-up, incident response

footprinting

forced universal participation

Forefront Unified Access Gateway (UAG)

forensic techniques

formal change management

forms-based authentication

Fport

FQDNs. See fully qualified domain names

fragmentation

fragmentation attacks

frames

free software

FTP. See File Transfer Protocol

full mesh of leased lines

fully qualified domain names (FQDNs)

future developments

fuzzing tools

G

gateway

gateway-to-gateway VPN

general filter firewall

general purpose OSs

goals of network security GoToAssist

GoToMyPC

governance

governance, risk, and compliance (GRC)

granular access control

graphical user interface (GUI)-based interface

growth scenario contingencies

GUI-based interface. See graphical user interface-based interface

H

hackers

hacking

hacktivism

hairpinning

handoff authentication

hard drives

hardening firewall

hardening host

hardening networks

hardening servers

hardening systems

hardware address

hardware failures

hardware firewalls

hardware VPNs

hardware/software platform

hashing

hash algorithm

hash value

hashing

headers

heat

HFS. See hierarchical file system

hierarchical file system (HFS)

hijacking attack

home office wireless

home routers

honeynets

honeypots

host

host firewalls. See also software firewall

host security controls

host software firewall

host VPN software product

hosting

HOSTS file

host-to-gateway VPN

host-to-host VPN

host-to-site VPN

Hot Standby Router Protocol (HSRP)

HotSpotShield

HotSpotVPN

HSRP. See Hot Standby Router Protocol

HTTP Proxy

HTTPS. See Hypertext Transfer Protocol Secure

hybrid attack

hybrid firewall

hybrid VPN

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol Secure (HTTPS)

I

IAM. See identity and access management

IANA. See Internet Assigned Numbers Authority

ICMP. See Internet Control Message Protocol

ICMP redirect

identity

identity and access management (IAM)

identity proofing

IDS. See intrusion detection systems

IDS insertion

IEEE 802.1x

IEMI. See intentional electromagnetic interference

IETF. See Internet Engineering Task Force

IKEv2. See Internet Key Exchange v2

IM. See instant message

IMS. See IP Multimedia Subsystem

inbound rules for firewall

inbound traffic

incident response

incident response plan

individual firewall

industry-standard protocol

information gathering. See reconnaissance

information security professionals

Information Technology Infrastructure Library (ITIL)

infrastructure

ingress filtering

in-person policy training

insertion attacks

installer-induced security threats

instant message (IM)

intangible costs and value

Integrated Services Digital Network (ISDN)

integrity

intentional electromagnetic interference (IEMI)

interception attack

intermediary network

internal code planting

internal compliance audits

internal firewall

internal-only traffic

internal personnel

internally connected VPN

Internet Assigned Numbers Authority (IANA)

Internet Café VPNs

Internet Connection Sharing service

Internet connectivity

Internet Control Message Protocol (ICMP)

Internet Engineering Task Force (IETF)

Internet Key Exchange (IKE)

Internet Key Exchange v2 (IKEv2)

Internet Protocol Security (IPSec)

Internet Protocol version

Internet Protocol version 4 (IPv4)

Internet Protocol version 6 (IPv6)

Internet relay chat (IRC) channel

Internet service provider (ISP) devices

Internet threats

Internet-based Traceroute tools

Internet-facing servers

Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)

intranet

intranet VPNs

intruders

intrusion and incident response plan

intrusion detection systems (IDS)

intrusion prevention systems (IPS)

inventory of communications

IP addresses

IP block

IP forwarding

IP Multimedia Subsystem (IMS)

IP Network Address Translator

IPS. See intrusion prevention systems

IPSec. See Internet Protocol Security

IPSec VPNs

IPSec-tools RPM package

IPv4. See Internet Protocol version 4

IPv6. See Internet Protocol version 6

IPX/SPX. See Internetwork Packet Exchange/Sequenced Packet Exchange

IRC channel. See Internet relay chat channel

ISDN. See Integrated Services Digital Network

ISP devices. See Internet service provider (ISP) devices

IT infrastructure domains

IT infrastructure threats

ITIL. See Information Technology Infrastructure Library

J

JanusVM

job description

K

Keep It Simple: Security (KISS)

Kerberos

Kernel IP Security (KLIPS) key exchange

key pairs

key space

keycard security

keystroke logger

knowledge-based detection

known addresses

L

laboratory tests

LAN. See local area network; wireless local area network

LAN Domain. See Local Area Network Domain

LAN infrastructure security

LANMAN hash

LAN-to-LAN VPNs

LAN-to-WAN Domain

latency

Layer 2 Forwarding (L2F)

Layer 3 of the OSI model

Layer 7 of the OSI model

Layer 2 Transport Protocol (L2TP)

Layer 2 Tunneling Protocol (L2TP)

layered security approach

layers of OSI model

leased lines

leetspeak

Linksys access points

Linux firewalls

load balancers

load balancing

load-related performance

local area network (LAN)

Local Area Network (LAN) Domain

local host

location of VPN

location-aware anti-theft software

log contents

log file analysis

log file analysis tools

logging

logging on. See authentication

logic bomb

logical address

logical security checklist

LogMeIn

Loki

loophole

M

MAC address. See Media Access Control address

MAC addresses

MAC spoofing

Mac support

mainframe

malicious address

malicious code

malicious code scanner

malicious hackers

malicious traffic

malware

management

management interfaces

man-in-the-middle (MitM) attacks

maximum transmission unit (MTU)

MBSA. See Microsoft Baseline Security Analyzer

mean time between failures (MTBF)

mean time to failure (MTTF)

Media Access Control (MAC) address

metacharacters

metrics

Microsoft Baseline Security Analyzer (MBSA)

Microsoft Point-to-Point Encryption (MPPE)

mission-critical issue

mission-critical process

MitM attacks. See man-in-the-middle attacks

MITRE

mobile code

mobile devices

Mobile IP

mobile wireless

modeling

modems

module-based VPN

monitoring

monkey-in-the-middle attack

MPPE. See Microsoft Point-to-Point Encryption

MSTSC command

MTBF. See mean time between failures

MTTF. See mean time to failure

MTU. See maximum transmission unit

multicast address

multifactor authentication

multi-homed firewall

multiple LANs

multiple-layered defense. See also defense in depth

Murphy’s Law

N

NAC. See network access control

NAC service. See network access/admission control service

NAS. See network access server

NAT. See network address translation

NAT-compatible encryption protocols

National Information Infrastructure (NII)

National Institute of Standards and Technology (NIST)

national security

National Security Agency (NSA)

National Vulnerability Database

native firewall

native operating system firewall

NAT-PT. See Network Address Translation–Protocol Translation

NAT-T. See NAT-Traversal

NAT-Traversal (NAT-T)

natural disasters

necessary business tasks

Nessus

Nessus vulnerability scanning

NetBEUI. See NetBios Extended User Interface

NetBios Extended User Interface (NetBEUI)

NetBus

Netcat

Netscape. Version 1.0

Netstat

network access control (NAC)

Network Access Protocol

network access server (NAS)

network access/admission control (NAC) service

network address translation (NAT)

Network Address Translation–Protocol Translation (NAT-PT)

network and resource availability threats

network compartmentalization. See compartmentalization

network design

network infrastructures examples

network interface card (NIC)

network interface controller (NIC)

network issues, internal and external

Network Layer (Layer 3)

Network Layer of the OSI model

Network News Transfer Protocol (NNTP)

network performance

network security

network security components

network security design

“Network Tools”

network topologies. See topologies

network traffic access control security policy

new technology file system (NTFS)

NIC. See network interface card

NII. See National Information Infrastructure

NIST. See National Institute of Standards and Technology

nmap

NNTP. See Network News Transfer Protocol

node

node security

no-exceptions policy

non-authenticating query service

non-content-filtering firewalls

non-dedicated connection

nonrepudiation

normal baseline

NSA. See National Security Agency

NTFS. See new technology file system

N-Tier deployment

NTRconnect

O

OC line. See optical carrier line

offsite storage

off-the-shelf firewall

one-time pad encryption systems

one-way function mathematical operation

Onion Router application, The. See Tor application

onion routing

online remote VPN options

online storage

onsite storage

open source software

Open Systems Interconnection (OSI) Reference Model

open-source applications and tools

open-source product

open-source software network firewall

open-source VPNs

Openswan

operating system-based VPNs

operating systems (OSs)

OPM. See Other People’s Money, Inc.

opportunistic hackers

optical carrier (OC) line

OS/2

OSI model. See Open Systems Interconnection (OSI) Reference Model

OSs. See operating systems

Other People’s Money, Inc. (OPM)

out of band communication

outbound rules for firewall

outbound traffic

overlapping

P

package filtering firewall

packet filtering

packet filtering firewall

packet header

packet payload

packet sniffer

PacketiX VPN

padded cells

partition

passive threats

password cracking

password-protected homegroup

PAT. See port address translation

patch management

patches

payloads

PBX. See private branch exchange

pcAnywhere

peer systems

peer-to-peer (P2P) communications

peer-to-peer (P2P) networks

penetration testing

performance

perimeter

perimeter network

permissions

personal communications

personal firewall

personal hardware firewall

personal software firewall

personal/individual VPN

personally identifiable information (PII)

personnel activity monitoring

phishing

physical access

physical addresses

physical attacks

physical damage

Physical Layer (Layer 1)

physical security

physical threats

PII. See personally identifiable information

piloting

PING

ping command

ping sweeps

PKI. See Public Key Infrastructure

placement of firewalls

plaintext protocols

platform independence

play configuration

playback attacks

plug configuration

PNAC. See port-based network access control

Point-to-Point Protocol (PPP)

Point-to-Point Tunneling Protocol (PPTP)

POP. See Post Office Protocol

pop-up blockers

port address translation (PAT)

port forwarding

port numbers

port scanning

port validation

portability of equipment

portal authentication

port-based network access (admission) control (PNAC)

ports

POSIX

Post Office Protocol (POP)

post-attack activities

post-mortem assessment review

power faults

power switch

PPP. See Point-to-Point Protocol

PPTP. See Point-to-Point Tunneling

Protocol preparation, incident response

Presentation Layer (Layer 6)

prevention

principle of least privilege

privacy

private branch exchange (PBX)

private IP address

private key

private messages

private networks

private VPN

privilege control

privilege escalation

privileged access

privileges

PRNG. See pseudo random number generator

proactive security management

professional hackers

proprietary OSs

protocol encryption

protocols

proxies

proxy attack

proxy firewall

proxy manipulation

proxy servers

proxy-based encryption

pseudo random number generator (PRNG)

public IP addresses

public key

public key cryptography

Public Key Infrastructure (PKI)

public networks

public wireless

public-key cryptography

PuTTY application

pwned

Q

QoS. See quality of service

quality of service (QoS)

R

rack mountable equipment

RADIUS-based authentication

RAID. See redundant array of independent disks

random challenge-response dialog

RAS. See remote access server

RDC. See Remote Desktop Connection

RDP. See Remote Desktop Protocol

reconnaissance

recovery

recreational hackers

redundancy

redundant array of independent disks (RAID)

Regional Internet Registry (RIR)

regular self-assessment

rekeying processes

remote access

Remote Access Domain

remote access policy

remote access server (RAS)

remote access VPN

Remote Assistance

remote connection

remote control

Remote Desktop Connection (RDC)

Remote Desktop Protocol (RDP)

Remote Desktop Services

remote hacking

remote or mobile host

remote printing

remote VPN connection

remote-to-home VPN

remote-to-office VPN

removable case

removable media

replay attacks

requests for comments (RFCs)

research. See reconnaissance

reset button

resources

resources sites

response

return on investment (ROI)

reverse caching

reverse proxy

reverse proxy firewall service

RFC 791

RFC 1918

RFC 1918 addresses

RIR. See Regional Internet Registry

risk

risk assessment

risk management

risk matrix

Rivest-Shamir-Adelman (RSA)

rogue access point

rogue device insertion

rogue DHCP

ROI. See return on investment

roles

rootkits

round robin

round robin database tool (RRDtool)

routers

RPM install of Openswan

RRDtool. See round robin database tool

RSA. See Rivest-Shamir-Adelman

rule sets

rules

rule-set ordering

S

sabotage

sacrificial host

scalability

scanning

scope/binding nature statement

screened IDS/IPS solution

screening routers

script kiddie

SDRAM. See synchronous dynamic random access memory

search engine

sectors

secure network design. See network design

secure remote access

Secure Shell (SSH) protocol

Secure Socket Tunneling Protocol (SSTP)

Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL)–based tunneling protocols

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

secured VPN. See also virtual private network (VPN)

security

security assessment

security association (SA)

security assurance

security checklist

security goals

security infrastructure

security management

security mistakes

security objectives

security policies

security stance

security strategy

security suite firewall

Security Technical Implementation Guides (STIGs)

security technologies

security through obscurity

security troubleshooting

security zones

SED. See static electricity discharge

segment

self-assessments

sender fragmentation

senior management

separation of duties

servers

service level agreement (SLA)

service set identifier (SSID)

services tab of SmoothWall

session

session hijacking

Session Layer (Layer 5)

shell code

ShieldsUP! port scanning tool

Shorewall firewall

Shrew Soft

sieve firewall

signature-based detection

Simple Mail Transfer Protocol (SMTP)

simple network management protocol (SNMP)

simplicity

simulated firewall test

single-factor authentication

single loss expectancy (SLE)

single point of failure

single sign-on (SSO)

site-to-site VPNs

Skype

SLA. See service level agreement

slack space

SLE. See single loss expectancy

slideware

sliding window of recorded traffic

small office/home office (SOHO)

SmoothWall firewall

SmoothWall software

SMTP. See Simple Mail Transfer Protocol

SNA. See System Network Architecture

sniffer

SNMP. See simple network management protocol

Snort

Snort intrusion detection software

Snort intrusion detection solution

social engineering

socket

software coding errors

software firewall

software firewall products

software host firewalls

software VPNs

SOHO. See small office/home office

Solera DS series of network forensic appliances

solid VPN policy

spam

split knowledge. See separation of duties

split tunnel

spoofed addresses

spoofing

spyware

spyware scanner. See anti-malware scanners

SQL injection

SSH protocol. See Secure Shell protocol

SSID. See service set identifier

SSL. See Secure Sockets Layer

SSL VPNs

SSO. See single sign-on

SSTP. See Secure Socket Tunneling Protocol

stability of VPNs

state management

stateful inspection

stateful inspection filtering

stateful inspection firewalls

static addressing

static electricity

static electricity discharge (SED)

static filtering firewalls

static IP

static NAT

static packet filtering

steganography

STIGs. See Security Technical Implementation Guides

storage covert channel

strong authentication

strong encryption

subnet architecture

subnetting

sub-protocols

SubSeven

suite-member firewalls

sunk cost

switches

symmetric cryptography

symptoms

synchronous dynamic random access memory (SDRAM)

syslog

System Network Architecture (SNA)

System/Application Domain

system-by-system–based security

Systems/Applications Domain

T

TACACS+. See Terminal Access Controller Access-Control System Plus

tangible costs and value

targets of hackers

TCP. See Transmission Control Protocol

tcpdump command

TCP/IP. See Transmission Control Protocol/Internet Protocol

TCPView

telcos. See telecommunication service providers

telecommunication service providers (telcos)

telecommuting

telnet

Terminal Access Controller Access-Control System Plus (TACACS+)

terminal services

testing

testing firewall

theft

thin client computing

third-party software firewalls

third-party trust system

threats

time stamps

timing covert channel

TLS. See Transport Layer Security

tools

topology

Tor application

TPM chip. See Trusted Platform Module chip

traceroute command

traceroute tools

traffic and trend analysis

traffic congestion

traffic generation

traffic inventory

traffic loads

training

transaction security

translation migration strategy

Transmission Control Protocol (TCP)

Transmission Control Protocol/Internet Protocol (TCP/IP)

transparent network security

Transport Layer (Layer 4)

Transport Layer Protocol

Transport Layer Security (TLS)

transport mode encryption

transport mode (host-to-host) of IPSec

trapdoor

trapping intruders and violators

triple-homed firewall

Trojan horse

troubleshooting

trust

Trusted Platform Module (TPM) chip

trusted third party

trusted VPN

trustworthy

TS RemoteApp

TS Web Access

tunnel mode encryption

tunnel mode of IPSec

tunneling

tunneling migration strategy

tunneling protocols

two-factor authentication

U

UAG. See Forefront Unified Access Gateway

ubiquitous firewall

UDP. See User Datagram Protocol

unauthorized software

unauthorized tunnels

unfiltered IDS/IPS installation

unicast address

unified threat management (UTM)

Uninterruptible Power Supply (UPS)

universal denial rule

universal participation

unknown zero-day attacks

unpartitioned space

updates

UPS. See Uninterruptible Power Supply

upstream filtering

URL injectors

usability

USENET newsgroups

User Authentication Protocol

user awareness

User Datagram Protocol (UDP)

User Domain

user training

userland-only install

UTM. See unified threat management

V

Van Eck phreaking

vaporware. See slideware

vendors

Verizon Data Breach Investigations Report

violations of security

violators

virtual firewall test

virtual firewalls

Virtual Local Area Network (VLAN)

virtual private network (VPN)

virtual reassembly

Virtual Router Redundancy Protocol (VRRP)

virtualization

virtualization security

virtualized firewall

virtualized network environment

virtualized networks

virtualized SSL VPN

virus

VLAN. See Virtual Local Area Network

VMware

voluntary compliance

VPN. See virtual private network

VPN appliances

VPN authorization

VPN link

VRRP. See Virtual Router Redundancy Protocol

vulnerabilities

vulnerability assessments

vulnerability management

vulnerability research

vulnerability scanning

W

wake-on-LAN

WAN. See distributed LAN; wide area network

WAN Domain

WAN VPN connections

wardialing

wardriving

weakest link security stance

Web browsers

Web server

Web-based GUI

Web-based policy training

well-known port numbers

white-list controls

whitelists

whois

whole hard drive encryption

wide area network (WAN)

Windows Firewall

Windows Server 2008 Network Access

WinZapper tool

wired networks

wireless access points

wireless connectivity

wireless local area network (LAN)

wireless networking

wireless technologies

Wireshark

wirespeed functions

workgroup

Workstation Domain

WORM storage device. See write-once read-many storage device

worms

wrappers

write-once read-many (WORM) storage device

written firewall policy

written security policy

X

XSS. See cross-site scripting

Z

zero-day attacks

zero-day exploits

zeroization

zombie army

zombies

zone file

zone of risk

zones of trust