Appendix D. Memory Tables
Chapter 1
Table 1-2. Government and Military Data Classification Example
Data Category | Description |
---|---|
Unclassified | |
Sensitive but unclassified (SBU) | |
Confidential | |
Secret | |
Top-secret | |
Table 1-4. Data Classification Characteristics
Characteristic | Description |
---|---|
Value | |
Age | |
Useful life | |
Personal association |
Table 1-5. Types of Hackers
Type of “Hacker” | Description |
---|---|
White hat hacker | |
Black hat hacker | |
Gray hat hacker | |
Phreaker | |
Script kiddy | |
Hacktivist | |
Computer security hacker | |
Academic hacker | |
Hobby hacker | |
Table 1-6. Defending Against Different Classes of Attacks
Attack Class | Primary Layer of Defense | Secondary Layer of Defense |
---|---|---|
Encryption | Applications with integrated security | |
Firewall at the network edge | HIPS | |
Protecting against ... |
Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.