IP protocols – labeling 471
Kerberos, 124, 202, 300, 358, 359, 365, 368
AES, 360
authentication process, 105, 110
logon process, 107–108
passwords, 107–108
realms, 359
service ticket, 451
ST (service ticket), 301
TGS, 117
TGTs, 124
usernames, 107–108
weaknesses, 104
Windows and, 369
Kerckhoff’s principle, 340
Kernel mode, 342
kernels, 63, 342, 435, 449, 453
key risk indicators, 373, 421
uses, 238
keycards, 116
keyloggers, 13, 24, 323
keys, 58
encryption, 207
private storage, 76
referential integrity relationships, 180
retrieval, 53
strength, 70
TLS and, 72
WEP and, 85
key-value stores, 400
KKRIs, 421
knowledge-based authentication, 365, 408
KPI (key performance indicator), 326, 431
KRIs (key risk indicators), 432
KryptoKnight, 124, 368
L
L 2T P, 357
versus PP T P, 10 0
labeling, 423
classification and, 41
DLP systems, 30
media, 28, 327
A PI PA , 427
loopback, 427
nslookup command, 84
private, 427
public, 427
servers, 94
IP protocols, non-IP protocols, 100
IP spoofing attacks, 185
ipconfig command, 93
IPS (intrusion prevention systems), 366, 370
IPsec, 296
ESP component, 260
packet content, 57
VPNs, 33, 330
IPv4, 312, 457
IPv6, 312, 457
iris scans, 281, 442
(ISC2) International Information Systems
Security Certification Consortium, 6,
25, 185, 326, 385, 454
classification, 432
code of ethics, 160, 162, 206, 248, 274,
386, 427, 439
penalties, 308
iSCSI, 350
ISDN, 95, 213, 354
speed, 90
isolation, 397, 403, 406, 411
ITIL (Information Technology Infrastructure
Library), 323, 376, 385
ITU-T standard, 255
J
JavaScript, 410
Jitter, 415
job rotation, 383
K
KDC (key distribution center), 300, 360,
361, 365, 451