Index

Symbols & Numbers

$ (dollar sign), for hidden administrative shares

3DES

32-bit addresses

128-bit addresses

802.1X standard

A

AAA (Authentication, Authorization, and Accounting)

acceptable use policy (AUP)

access attack

types

access control. See also authentication

administration

basics

best practices

cryptography and

dealing with different needs

implementing

physical barriers

operational security

tokens

access control list (ACL)

for spam control

access creep

Access log (Windows)

access point (AP)

account management

policy enforcement. See also passwords

security controls for. See also auditing

user and group role management,

users with multiple accounts/roles,

accountability

as design goal

real world scenario

accountability statement ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.