Index

12Ghosts Popup-Killer, 198–199

3DES algorithm. See Triple DES algorithm

802.1x authentication methods, 322–323, 406–409

dynamic key derivation, 409

user identification and strong authentication, 408–409

A

AAA. See Access control, authentication, and auditing

Acceptable use policies, 605–607

enforcing, 606–607

Access control, 294

DAC, 45–46

MAC, 45

network. See Network access control

RBAC, 46–47

Access control, authentication, and auditing (AAA), 381–382

Access control lists (ACLs), 349, 353, 354, 360

Access control objects, 340, 360

Access control subjects, 340, 360, 361

Access lists, 366

Access logs, 366, 450–451

ACLs. See Access control lists

Active/active cluster, 549

Active directory, 134, 150, 163

Active/passive cluster, 549

Active ...

Get CompTIA Security+ Certification Study Guide, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.