Index

Note: Page numbers followed by “f”, “t” and “b” refers to figures, tables and boxes, respectively.

A

Abstract model
network interactions and, 329–330
cross-infrastructure cyber cascading attacks, 331–335
sample cascading attack, 330–331
vulnerabilities, isolating, 332–335
Access
control, 48, 67
mesh routers, 297
Access control entries (ACE), 48, 170
Access control list (ACL), 48, 78, 132, 170, 277, 279
Access point (AP) mode, 293
Access-list, 192, 277–278
Accounting, user access control, 51–52
Ad hoc networks, wireless
bootstrapping in, 306–308
characteristics, 294–297
internet of things (IoT), ...

Get Network and System Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.