Index
12Ghosts Popup-Killer, 198–199
3DES algorithm. See Triple DES algorithm
802.1x authentication methods, 322–323, 406–409
dynamic key derivation, 409
user identification and strong authentication, 408–409
A
AAA. See Access control, authentication, and auditing
Acceptable use policies, 605–607
enforcing, 606–607
Access control, 294
DAC, 45–46
MAC, 45
network. See Network access control
RBAC, 46–47
Access control, authentication, and auditing (AAA), 381–382
Access control lists (ACLs), 349, 353, 354, 360
Access control objects, 340, 360
Access control subjects, 340, 360, 361
Access lists, 366
ACLs. See Access control lists
Active/active cluster, 549
Active directory, 134, 150, 163
Active/passive cluster, 549
Active ...
Get CompTIA Security+ Certification Study Guide, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.