Back in the days when we, the authors, learned about system security, there
was almost no written material. As technology has produced point solutions,
more and more material is being written regarding the specific solution and
security or the specific software and its security. Even today, there is not a
wealth of knowledge documented and available for the person who wants to
pursue systems security. Instead of purchasing hundreds of books, journals,
and so on, this book provides that “one-stop-shop.” To have this type of envi-ronment available for system security, written by two professionals with more
than 40 years of combined experience in this field, is to have access to a wealth
of knowledge
531 trang |
Chia sẻ: banmai | Lượt xem: 2465 | Lượt tải: 0
Bạn đang xem trước 20 trang tài liệu The SSCP prep guide: Mastering the seven key areas of system security, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
91–93
firewall functions, 91
firewall platform access,
88–89
firewall platform builds,
89–99
firewall policy, 93–97
guidelines, 68
information classifica-
tion, 69–71
logging functionality, 90
mechanism implementa-
tion, 80–88
multilevel mode, 72
OSI layer model, 74–75
494 Index
administration (continued)
partitioned security
mode, 72
plan of action and mile-
stones (POA&M)
document, 80
policy input resources,
78–79
procedures, 68–69
process isolation, 74
production/mainte-
nance phase, 58–59
programming (building)
phase, 57–58
reference monitor, 74
requirement statement,
80, 82–83
risk management, 54
roadmap building, 77–88
security development
life cycle, 56–59
security equation, 54
security kernel, 73
security operation
modes, 72–73
security policies, 65–67
standards, 67
system design phase, 57
system high mode, 72
system life cycle, 54–59
system-level policy, 66
task types, 88
test phase, 58
traffic analysis, 74
TRIAD objectives, 53
trusted computing base
(TCB), 73–74
administrative security, 15
administrators, Web sites,
416
Advanced Encryption
Standard (AES), 217,
238, 245
AH (authentication
header), IPSec, 246
Alberti wheel cipher,
223–224
ALE (annual loss
expectancy), 160
The American Black Cham-
ber (Herbert O.
Yardley), 228
American National Stan-
dards Institute (ANSI),
282, 284
analog signals, 263–264
analysis, 157, 159
analysis tools, security
review, 130
annual loss expectancy
(ALE), 160
annual rate of occurrence
(ARO), 160
ANSI (American National
Standards Institute)
282, 284
anti-virus software,
updating, 357–358
application gateway, fire-
wall technique, 81
Application Layer (Layer
7), 75, 289
application-level access
control, 351
applications, stripping
from firewall, 98
ARO (annual rate of
occurrence), 160
ARPANET, Internet devel-
opment, 273
assessment, versus analy-
sis, 159
asset protection, 22–23
assets, 153–155
asymmetric (key pairs)
cryptography, 239, 241
attachments, 28, 94, 341
attack scripts, 340
audio/data communica-
tions, 207
audit logs, 40
audit reduction tools,
security reviews, 130
audit reports, vulnerabil-
ity source, 175
auditing, 11, 13, 110–132
capturing current activ-
ity, 110
characteristics, 111–112
data types, 126
data/information man-
agement, 127–128
defined, 110
external/internal net-
work boundary,
112–118
firewalls, 112–118
information security sys-
tem meanings, 111
internal/subnet bound-
ary, 118–119
layered security protec-
tion element, 11–13
methods, 111
Network Time Protocol
(NTP), 113
reasons for, 111
rule set for a boundary
router, 117–118
security reviews,
128–132
servers, 119–120
standard metrics, 111
system security policy
implementation,
114–115
UNIX syslog, 112–113
user workstations,
120–125
authentication
data origin, 275
firewall management
methods, 89
OSI model, 290
peer, 276–277
authentication systems,
Kerberos, 245
authentication header
(AH), IPSec, 246
authenticity, security
objective, 5
automated risk assess-
ment, 161–162
automated tools, 129, 162,
168, 175–176
auxiliary storage. See mass
storage
avoiding, risk handling
method, 162
Index 495
B
B2B (business-to-business)
extranets, 274
B2E (business-to-
employee) extranets,
274
back doors, brute force
attack target, 27
backups, 69, 201–202,
356–357
bandwidth, 270–271
banner grabbing, 298, 304
Barr, Thomas (Invitation to
Cryptography), 252
Basic Input Output Sys-
tem (BIOS), 343–344
Basic Security Module
(BSM), 90
bastion hosts, DMZ
uses, 85
BCPs (business continuity
plans), 198
BIA (Business Impact
Analysis), 71, 181
biometrics, 32–36
block ciphers, 217, 220,
237–238
blue teaming, penetration
testing, 302–303
books, references, 413–415
boundary router, 86,
117–118
broadband optical tele-
point networks, 269
broadband, versus nar-
rowband, 270–271
broadcast transmissions,
270
brute force attack, 27, 236,
309
BSM (Basic Security
Module), 90
buffer overflows, penetra-
tion testing, 305
building (programming)
phase, 57–58
bus topology, 280, 281
business continuity plans
(BCPs), 198
business function loss, 207
Business Impact Analysis
(BIA), 71, 181
business-to-business
(B2B), extranets, 274
business-to-employee
(B2E), extranets, 274
C
C&A (certification and
accreditation), 292
CA (certificate authority),
PKI, 249
cable modems, 276
cable/DSL routers, 276
cabling, 67, 265–266
Caesar shift cipher,
222–223, 236
Carrier Sense Multiple
Access (CSMA), 280
CAST-128 algorithm, 217
CAUCE (Coalition
Against Unsolicited
Commercial Email), 27
CBC (cipher block chain-
ing), 244
CBK (common body of
knowledge), 151
CCB (Configuration Con-
trol Board), 76
CCITT V.35 standard, 67
CCR (configuration
change request), 76–77
CD R/W (Compact Disk
R/W), 69
cell phones, during disas-
ter, 207
central processing unit
(CPU), 60, 262
CERC/CERT
development history, 188
security administrator
strategies, 25–26
certificate authority (CA),
249
certification and accredita-
tion (C&A), 292
CFM (cipher feedback
mode), 244
change process, 76–77
checklist test, contingency
plan (CP), 205
chief information officer
(CIO), 294
CIA (confidentiality/
integrity/availability),
3, 5
cipher block chaining
(CBC), 244
cipher feedback mode
(CFM), 244
ciphers. See individual
ciphers
ciphertext, 217
circuit-level gateway, 81
classifications, informa-
tion, 69–71
clipper chip, 232–233
closeout, contingency plan
(CP), 205
CM (configuration man-
agement), 76–77
Coalition Against Unso-
licited Commercial
Email (CAUCE), 27
coaxial cable, conducted
media, 266
code talkers, described
232
cold site, recovery loca-
tion, 204
common body of knowl-
edge (CBK), 151
Common Criteria’s pro-
tection profiles, 14
communications security,
14–15
communications site
(data), 207
communications. See data
communications
Compact Disk (CD)
R/W, 69
compartmented mode, 73
computer forensics,
140–143
computer security, 14
Computer-Related Risks
(Peter G. Neuman), 152
conceptual analysis phase,
56–57
conducted media, 265–266
496 Index
confidentiality
access control sup-
port, 22
cryptology objectives,
234
information security ele-
ment, 3, 5
loss consequences, 158,
181–182
OSI model security ser-
vice, 290
VPN protection, 275
configuration change
request (CCR), 76–77
Configuration Control
Board (CCB), 76
configuration manage-
ment (CM), 76–77
confusion, block cipher
property, 237–238
connection sniffing,
348, 352
connectionless integrity,
275
contingency plans (CPs),
198, 204–207
continuity of operations
plans (COOPs), 198
controls, 156
copper wire, conducted
media, 265–266
corrective controls, 156
countermeasures, 156–157
CPU (central processing
unit), 60, 262
crackers, 334–336
CRC (Cyclic Redundancy
Check), file integrity
checking, 311
cryptanalysis, 215, 217,
251–253
cryptography. See also
encryption
Alberti wheel cipher,
223–223
algorithms, 217
asymmetric (key pairs),
239, 241
Caesar shift cipher
(mono-alphabetic
substitution),
222–223
ciphers, 217
ciphertext, 217
code talkers, 232
deciphering, 219
defined, 215, 217
digital certificates, 219
Digital Encryption Stan-
dard (DES), 232
digital signatures, 219
e-commerce, 247–248
e-mail, 247
enciphering, 219
Enigma machine cipher,
230–231
Internet Protocol Secu-
rity (IPSec), 246
Jefferson’s wheel cipher,
226–227
Kerberos, 36, 245
keys, 219
one-time pad, 219
plaintext, 219
Public Key Infrastruc-
ture (PKI), 248–250
public-key, 232, 239,
241–242
Purple machine cipher,
231
rotor machines, 229–231
secure hash function, 220
Secure HyperText Trans-
port Protocol
(S-HTTP), 246–247
Secure Socket Layer
(SSL), 246
steganography, 220
symmetric (same-key),
239–240
trap door, 220
U.S. federal government
encryption, 253
Vernam cipher, 226–228
Vigenere square, 224–226
watermark, 220–221
Cryptography and Network
Security (William
Stallings), 235
cryptology, 218, 221–232,
234–242. See also cryp-
tography and encryp-
tion
cryptosecurity, 14
Crystal Reports, security
review, 129
CSMA (Carrier Sense
Multiple Access), 280
Cyber Cop, 130, 134
Cyclic Redundancy Check
(CRC), 311
D
DAC (Discretionary
Access Control), 33–34
data communications
analog signals, 263–264
ANSI standards, 284
asset types, 155
bandwidth, 270–271
broadband bandwidth,
270–271
broadcast transmissions,
270
bus topology, 280, 281
central processing unit
(CPU), 262
coaxial cable, 266
conducted media types,
265–266
copper wire, 265–266
defined, 262
digital signals, 264
802.X standards, 282
Ethernet standards, 282
extranets, 274
gigabit Ethernet stan-
dard, 283
Internet, 273–274
intranets, 273
ISO standards, 283
ITU standards, 284
local area networks
(LANs), 272
logical topologies,
281–282
man-in-the-middle
attack target, 28
metropolitan area net-
works (MANs), 272
minimum versus com-
prehensive, 317
multicast transmissions,
270
Index 497
narrowband bandwidth,
270–271
network models,
288–291
network security testing,
292–294
network testing reasons,
291–292
OSI model, 288–291
physical topologies, 279
protocols, 284–288
radiated media types,
267–269
remote access protocols,
286
ring topology, 280–282
security prioritization
process, 321–323
standards, 282–284
star topology, 279
system development life
cycle, 292–294
TCP/IP network model,
291
transmission methods,
270
unicast transmissions,
270
virtual private networks
(VPNs), 275–279
wide area networks
(WANs), 272
World Wide Web
(WWW), 274
data confidentiality, 290
Data Encryption Standard
(DES, 238, 243
data integrity, 5, 290
Data Link Layer (Layer 2),
74–75, 289
data origin authentication,
275
data requirements, 9–10
data security, navigational
tools, 14
data sensitivity, impact
analysis, 181–182
data separation, 351
data types, auditing, 126
database administra-
tion, 35
database management
systems (DBMS), 40
data/information man-
agement, 127–128
data/information storage,
59–63
data-level access controls,
40–44
DDoS (distributed denial
of service), 24–26
deciphering, 219
dedicated security
mode, 72
degaussers, magnetic
media, 42, 44
demilitarized zone
(DMZ), 31, 85–88
denial of service (DoS), 5,
24–28, 87, 300
DES (Data Encryption
Standard), 238, 243
detection, malicious code,
353–355
detective controls, 56, 179
dictionary attack, pass-
word cracking, 309
diffusion, block cipher
property, 238
digital certificates, 219
Digital Encryption Stan-
dard (DES), 232
digital services, CCITT
V.35 standard, 67
digital signals, 264
Digital Signature Stan-
dard (DSS), 247
digital signatures, 11, 13,
219, 290
Digital Video Disk (DVD),
69
direct sequence imple-
mentation, 271
disaster recover plans
(DRPs), 198
discovery (network map-
ping), 297–299
discovery tools, security
reviews, 129–130
Discretionary Access Con-
trol (DAC), 33–34
distributed denial of ser-
vice (DDoS), 24–26
Distributed Reflection
Denial of Service
(DRDoS) attack, 24
DMZ (demilitarized
zone), 31, 85–88
document reviews, 168
documentation, 154,
186–187, 294
documentation tools,
security reviews, 130
documents, 41, 80
domain name service
(DNS), 11, 13
Domain Name System
(DNS), 304
door keycards, 32
DoS (denial of service), 5,
24–28, 87, 300
DRDoS (Distributed
Reflection Denial of
Service), 24
DRPs (disaster recovery
plans), 198
DSS (Digital Signature
Standard), 247
DVD (Digital Video Disk),
69
E
ECB (electronic code-
book), 244
ECC (elliptic curve cryp-
tography), 245
e-commerce, 248
EDP (electronic data pro-
cessing), 1
EES (Escrowed Encryp-
tion Standard), 232–233
EF (exposure factor), 161
EFF (Electronic Frontier
Foundation), 232
EIA RS-232-C standard, 67
802.X standards, 282
electrically erasable
programmable
read-only memory
(EEPROM), 61
498 Index
electronic codebook
(ECB), DES/Triple DES
mode, 244
electronic data processing
(EDP), 1
Electronic Frontier Foun-
dation (EFF), 232
electronic security, 351
elevator keys, 32
elliptic curve cryptogra-
phy (ECC), 245
e-mail, 27–28, 94, 247, 332,
340–341, 352
emergency response,
199–202
emission security, 14
employment policies,
63–64
encapsulating security
payload (ESP), 246
enciphering, 219
encipherment, 290
encryption. See also cryp-
tography
Advanced Encryption
Standard (AES), 217,
245
algorithms, 217
Caesar shift cipher, 236
ciphers, 217
ciphertext, 217
clipper chip, 232–233
code talkers, 232
cryptographic system
divisions, 235–242
Data Encryption Stan-
dard (DES) algo-
rithm, 243
data-level access control,
40–41
deciphering, 219
digital certificates, 219
Digital Encryption Stan-
dard (DES), 232
digital signatures, 219
elliptic curve cryptogra-
phy (ECC), 245
enciphering, 219
IDEA algorithm, 245
Kerberos protocol, 36
key concepts, 239–242
keys, 219
layered security protec-
tion, 11, 13
malicious code counter-
measures, 352
man-in-the-middle
attack prevention, 28
mono-alphabetic substi-
tution, 222–223
one-time pad, 219
plaintext, 219, 237–238
public-key cryptography,
239, 241–242
RSA algorithm, 244
secure hash function, 220
Secure Sockets Layer
(SSL), 89
steganography, 220
substitution ciphers, 236
transposition ciphers,
236–237
trap door, 220
Triple DES algorithm,
243–244
U.S. federal government
types, 253
use methods, 236–237
Vigenere Square cipher,
236
watermark, 220–221
encryption algorithms,
278
end-to-end layers, 76
Enigma machine cipher,
230–231
environment, firewall,
91–93
environmental systems,
asset types, 154
environmental threats,
types, 170
erasable programmable
read-only memory
(EPROM), 61
errors, threat type, 155
Escrowed Encryption
Standard (EES),
232–233
escrowed keys, 233
ESP (encapsulating secu-
rity payload), 246
espionage, threat type, 155
Ethernet standards, 282
evaluation reports, 175
Event Viewer, 122
events, auditing data
types, 126
evidence protection,
140–141
Exclude All-Include by
Exception principle,
access controls, 29
executable file attach-
ments, e-mail, 94
executives, security
awareness, 101
exposure factor (EF), 161
exposure, 157
external network bound-
ary, 112–118
external penetration test-
ing, networks, 303
extranets, 85, 274
F
facial recognition, 32
Fast Ethernet standards,
283
FedCIRC (Federal Com-
puter Incident
Response Center), 173
FEMA (Federal Emer-
gency Management
Agency), 173
fence post, transposition
cipher, 236–237
fiber distributed data
interface (FDDI), 74–75
fiber optics, conducted
media, 266
file descriptor attacks, 305
file integrity checkers,
387–388, 399–406
File Transfer Protocol
(FTP), 332
file/directory permis-
sions, 306
filters, packet, 81
Finger Image Identifier
Record, 32
Index 499
finger imaging system, 32
fingerprint imaging, 32
firewalls
application gateway, 81
auditing, 112–118
authentication methods,
89
blockable ports, 95–97
blockable protocols,
95–97
boundary router, 86
circuit-level gateway, 81
demilitarized zone
(DMZ), 85–88
described, 81
environmental consider-
ations, 91–93
external penetration test-
ing, 303
function types, 91
host-to-gateway VPN
operation, 276
hot fix application
importance, 90
layered security bound-
ary element, 11–13
logging functionality, 90
logical control, 31
Network Time Protocol
(NTP), 98
packet characteristics, 91
packet filters, 81
platform access adminis-
tration, 88–89
platform build adminis-
tration, 89–99
policy administration,
93–97
policy auditing timeline,
94
proxy operations, 91
proxy server, 81
removing unused
accounts, 90
removing unused net-
work protocols, 89
removing unused net-
work services, 90
service leg implementa-
tion, 87
stripping unnecessary
applications, 98
system patch application
importance, 90
system security policy,
114–115
transaction-level data
access control, 40
virtual private networks
(VPNs), 81, 84
VPN server placement,
98–99
flooding, DoS attack
method, 24
floppy disks, 32, 69
forensic analysis, 24
fortezza cards, 32
frequency analysis attack,
236
frequency-hopping imple-
mentation, 271
FTP (File Transfer Proto-
col), 332
full-interruption test, 207
functions, secure hash, 220
G
Gateways, 67, 81, 276–277,
332, 361–362
gateway-to-gateway, VPN
operation, 276
gigabit Ethernet stan-
dards, 283
government (industrial)
espionage, 155
group identification,
35–36
guidelines, security
administration, 68
guns, gates, and guards
concept, 30
H
hackers, 334–336
hand geometry, 32
hard disks, mass storage
device, 69
hardware, 129, 153
heuristic analysis, infec-
tion detection, 360
hoaxes, virus, 341–342
host scanners, vulnerabil-
ity scanning, 300
host-based IDS, 135
host-to-gateway, VPN
operation mode, 276
host-to-host, VPN opera-
tion mode, 276
hot fixes, firewall applica-
tion, 90
hot site, recovery location,
203
human threats, types,
170–172
hybrid attacks, password
cracking, 309
Hypertext Transport Pro-
tocol (HTTP), 90, 332
I
IAVA (Information Assur-
ance Vulnerability
Alerts), 175
Ice-Pick, security analysis
tool, 130
IDEA algorithm, 245
identification and autho-
rization (I&A) mecha-
nism, 27, 31, 35–36
identification, threat
source, 169–170
IDS sensors, reviewing
network logs, 310
IDSs (intrusion detection
systems), 31, 134–135,
310
IEC (International Elec-
trotechnical Commis-
sion), 283
IEEE (Institute of Electri-
cal and Electronics
Engineers), 67, 282–283
IETF (Internet Engineer-
ing Task Force), 247
incident response, 188,
190–198, 354
individuals, access con-
trols, 35–36
industrial (government)
espionage, 155
infection prevention,
358–360
Information Assurance
Technology Frame-
work, 331
500 Index
Information Assurance
Vulnerability Alerts
(IAVA), 175
information classification,
69–71
information gathering,
167–168
information security, 1–18
information systems secu-
rity officers (ISSOs),
295
information systems secu-
rity policy, 157
information systems secu-
rity program managers
(ISSMs), 295
information technology
(IT), 5
information/data, asset
types, 154–155
infrared light, 269
insider attacks, malicious
code, 348
Institute of Electrical and
Electronics Engineers
(IEEE), 67, 282–283
integrity
access control sup-
port, 22
connectionless, 275
cryptology objectives,
234–235
information security ele-
ment, 3, 5
loss consequences, 157,
181
message authentication
code (MAC), 275
OSI model, 290
transaction-level data
access controls, 40
integrity checking, net-
work files, 311–312
internal boundary, audit-
ing, 118–119
internal network bound-
ary, 112–118
internal penetration test-
ing, networks, 303
International Electrotech-
nical Commission
(IEC), 283
International Standards
Organization (ISO),
282, 283
International Telecommu-
nication Union (ITU),
284
Internet, 273–274
Internet Engineering Task
Force (IETF), 247
Internet Protocol (IP)
addresses, 74–75, 289
Internet Protocol Security
(IPSec), 84, 246,
286–287
Internet Scanner, security
analysis tool, 130
InterNIC (whois) queries,
304
interviews, 15, 167–168
intranets, 85, 273
intrusion detection sys-
tems (IDSs), 31,
134–135, 310
investigations, personnel
security, 15
Invitation to Cryptography
(Thomas Barr), 252
IP (Internet Protocol
addresses), 74–75, 289
IPSec (Internet Protocol
Security), 84, 246,
286–287
iris scanning access
control, 32
ISO (International Stan-
dards Organization),
282, 283
ISS Internet Scanner, 129
ISSMs (information sys-
tems program man-
agers), 295
ISSOs (information sys-
tems security officers),
295
IT (information technol-
ogy), 5
ITU (International
Telecommunication
Union), 284
J
Jefferson’s wheel cipher,
226–227
K
Kerberos, 36, 245
kernel flaws, penetration
testing, 305
key management, 35, 249
keys
Alberti wheel cipher,
223–224
asymmetric (key pairs)
cryptography, 239,
241
cryptology concepts,
239–242
defined, 219
symmetric (same-key)
cryptography,
239–240
Vernam cipher, 226–228
Vigenere square cipher,
224–226
keystroke monitoring, 134
Knapsack algorithm, 232
L
L2TP (Layer 2 Tunneling
Protocol), 84, 287
languages, code talkers,
232
LANguard file integrity
checker, 399–400
LANs (local area net-
works), 272
laptops, security review
requirements, 129
law enforcement access
field (LEAF), 233
law enforcement responsi-
bility, 27
Layer 1 (Link), TCP/IP
network, 291
Layer 2 (Network),
TCP/IP network, 291
TE
AM
FL
Y
Team-Fly®
Index 501
Layer 2 Tunneling Proto-
col (L2TP), 84, 287
Layer 3 (Transport),
TCP/IP network, 291
Layer 4 (Application),
TCP/IP network, 291
layered protection, 11–13
layers, 74–77
LEAF (law enforcement
access field), 233
least privilege concept, 64,
156
Lightweight Directory
Access Protocol
(LDAP), penetration
testing, 304
likelihood determinations,
180
line of sight, infrared com-
munications, 269
Linux systems, 36
LLC (Logical Link
Control), 289
local area networks
(LANs), 272
local disk storage infec-
tion, 355
local memory infection,
355
Local Security Policy,
122–124
log reviews, network test-
ing, 310–311
logging functionality, 90,
112–113
logging, OSI model secu-
rity service, 290
logic bombs, 343–344
logical access controls, 156
logical controls, 30–3
Logical Link Control
(LLC), 289
logical topologies, 281–282
logon notification, 39–40
logons, multiple, 39
LOpht Crack, password
cracker, 398–399
Lucifer algorithm, 243
M
MAC (Mandatory Access
Control), 33–34
MAC (Media Access Con-
trol), 289
MAC (message authenti-
cation code), 275, 278
MAC protocols, 40
macro viruses, 338–339,
363–365
magnetic media, 42, 44
magnetic tapes, mass stor-
age device, 69
mail filters, 27
mainframes, 11, 13
malicious code
administrative counter-
measures, 356–357
attack mechanisms,
347–350
configuration manage-
ment requirements,
346–347
connection sniffing
countermeasures,
352
connection/password
sniffing, 348
countermeasures,
351–355
crackers, 334–336
defined, 333
detection mechanisms,
353–355
detection system
requirements,
345–346
ever-increasing threat,
331
example cases, 363–369
gateway protection,
361–362
hackers, 334–336
heuristic analysis, 360
importance of staying
current, 331–332
Information Assurance
Technology Frame-
work, 331
insider attacks, 348
interoperability con-
cerns, 360–361
logic bombs, 343–344
macro virus attack exam-
ple, 363–365
mobile code, 348–350
network attacks, 347
Online Hacker Jargon
File, The, 334–336
password sniffing coun-
termeasures, 352
phreaks, 334–336
physical security, 353
polymorphic virus
attack, 365–367
pre-infection/preven-
tion, 358–361
protection points, 332
scanners, 351
snapshot techniques, 359
spectral analysis,
359–360
system backups, 356–357
system statistics, 334
trapdoors, 347
Trojan Horse attack
example, 368–369
Trojan horses, 342–343
updating anti-virus soft-
ware, 357–358
vaccination programs,
359
viruses, 336–342
workstation protection,
361
worms, 342
malware. See malicious
code
management, 100–101
management security, 15
management support/
commitment, 157
managers, 296
Mandatory Access Con-
trol (MAC), 33–34
man-in-the-middle attack,
28
MANs (metropolitan area
networks), 272
masquerade attack, 27–28
mass storage, 50, 59
502 Index
MD4 (Message Digest 4),
220
MD5 (Message Digest 5),
220
Media Access Control
(MAC), 289
media, 41–44, 265–266
memory, 59–62
Merkle-Hellman algo-
rithm, 232
message authentication
code (MAC), 275, 278
Message Digest 4 (MD4),
220
Message Digest 5 (MD5),
220
metro passes access con-
trols, 32
metropolitan area net-
works (MANs), 272
Microsoft Excel, macro
viruses, 338–339
Microsoft, password con-
ventions, 37
Microsoft Windows 2000,
122–124, 136–139
Microsoft Word, 129,
338–339
microwaves, 267
mission statement, 157
mobile code, malicious
code, 348–350
modem usage, logical con-
trol, 31
modems, war dialing,
313–314
monitoring, 110, 133–135,
290
monoalphabetic substitu-
tion cipher, 236
mono-alphabetic substitu-
tion, 222–223
motivation, threat identifi-
cation, 170–173
Mstream, DoS tool, 24
multicast transmissions,
270
multilevel mode, 72
multipartite viruses, 340
multiple logons, access
control, 39
N
narrowband, versus
broadband, 270–271
NAT (Network Address
Translation), 74–75
National Institute of Stan-
dards and Technology
(NIST), 36, 54, 163–164
National Security Agency,
331
natural threats, types, 170
navigational tools, secu-
rity, 13–16
Nessus, security analysis
tool, 129–130
NetBEUI, 285
NetBIOS enumeration,
304
NetRanger. See Secure
Intrusion Detection
Network Address Transla-
tion (NAT), 74–75
network administration,
35
network administrators,
295–296
network attacks, mali-
cious code, 347
network backups, mali-
cious code, 357
Network Information Sys-
tem (NIS), 304
Network Layer (Layer 3),
74–75, 289
network mapping (discov-
ery), 297–299
network mapping utili-
ties, 129
network monitoring, 133
network protocols, 90
network scanners, 300
network security, 14–15,
352
network services, remov-
ing unused, 90
network sniffers, testing
tools, 388–389
Network Time Protocol
(NTP), 98, 113
network-based IDS
(NIDS), 134–135
networks
defined, 263
file integrity checking,
311–312
log reviews, 310–311
logical topologies,
281–282
minimum versus com-
prehensive testing,
317
network mapping (dis-
covery), 297–299
password cracking,
308–310
penetration testing, 293,
301–307
physical topologies,
279–281
reasons for testing,
291–292
security management
staff, 294–296
security prioritization
process, 321–323
Security Test and Evalu-
ation (ST&E),
307–308
security testing, 292–294
testing category evalua-
tions, 318–320
testing documentation,
294
testing technique com-
parisons, 314–317
virus detectors, 312–313
vulnerability scanning,
299–301
war dialing, 313–314
Neuman, Peter G.
(Computer-Related
Risks), 152
NFR HID, host-based IDS,
134–135
NIS (Network Informa-
tion System), 304
NIST (National Institute
of Standards and Tech-
nology), 36, 54, 163–164
Nmap port scanner, 129,
297, 392–398
Index 503
NOAA (National Oceano-
graphic and Atmos-
pheric Association), 173
non-repudiation, 5, 290
Norton Personal Firewall,
135
Notarization, security
mechanism, 291
NT servers, security pro-
tection, 11, 13
NTP (Network Time Pro-
tocol), 98, 113
O
occurrence, contingency
plan (CP), 204
OFM (output feedback
mode), 244
one-time pad, 219
One-Time Passwords
(OTPs), 36, 217
One-Time Passwords in
Everything (OPIE), 36
ongoing activities, 204
The Online Hacker Jargon
File, 334–336
on-site interviews,
167–168
Open System Interconnec-
tion (OSI) model,
74–75, 288–291
operating systems, 129
operations security
(OPSEC), 16
OPIE (One-Time
Passwords in Every-
thing), 36
optical disks, mass storage
device, 69
optical media, handling/
destroying, 43
organizational policy, 65
OTPs (One-Time Pass-
words), 36, 217
output feedback mode
(OFM), 244
output, handling/
destroying, 41–44
owners, security responsi-
bilities, 296
P
packet captures, penetra-
tion testing, 304
packet filters, 81, 86
padding, 237, 291
parallel test, contingency
plan (CP), 206
partitioned security
mode, 72
password checkers, test-
ing tools, 389
password cracking,
308–310, 398–399
password policy, 65
password sniffing, 348,
352
passwords, 11, 13, 27–28,
35–39, 89, 277, 308–310
patches, firewall applica-
tion, 90
PBX (Private Branch
Exchange), 313
peer authentication,
VPNs, 276–277
PEM (Privacy Enhanced
Mail), 247
penetration testing,
175–176, 293, 301–307
people, information secu-
rity resource, 16
personal identification
number (PIN), 277
personnel, asset types, 154
personnel security, navi-
gational tools, 15
PGP (Pretty Good Pri-
vacy), 41, 217, 247, 352
phreaks, 334–336
physical access controls,
157
physical controls, 29–31
physical facility loss, 207
Physical Layer (Layer 1),
74–75, 288–289
physical security, 14, 253
PIN (personal identifica-
tion number), 277
ping, security review soft-
ware, 129
PKI (public key infrastruc-
ture), 11, 13, 248–250
plain old telephone sys-
tem (POTS), 263–264
plaintext, 219, 237–238
plan of action and mile-
stones (POA&M), 80
point (technology) solu-
tions, 20
Point-to-Point Tunneling
Protocol (PPTP), 84, 288
policies, 17, 63–66, 78–83,
93–97, 129, 277–278
polyalphabetic ciphers,
223–224
polyalphabetic substitu-
tion cipher, 224–226,
236
polymorphic viruses,
339–340, 365–367
port scanners, 129,
297–299, 303, 392–398
ports, firewall blocking,
95–97
posing, masquerade
attacks, 27–28
position definition, 64
POTS (plain old telephone
system), 263–264
PPTP (Point-to-Point Tun-
neling Protocol), 84,
288
practitioners, Web sites,
415
preparedness, contin-
gency plan (CP), 204
Presentation Layer (Layer
6), 75, 289
Pretty Good Privacy
(PGP), 41, 217, 247, 352
preventive controls, 156,
179
primary storage, 60
Privacy Enhanced Mail
(PEM), 247
privacy, VPN protection,
275
Private Branch Exchange
(PBX), 313
privilege escalation/back
door tools, 389–390
privileged accounts, 35
504 Index
procedures, 15, 68–69
process for change, 76–77
process isolation, 74
processes, information
security, 17
production/maintenance
phase, 58–59
programmable read-only
memory (PROM), 61
programming (building)
phase, 57–58
protection rings, 11–13,
29–31
protocols, 90, 95–97,
284–288, 332
proxy, man-in-the-middle
attack target, 28
proxy servers, 81, 156
public key certificates,
VPN, 276–277
public key cryptography,
232, 239, 241–242
Public Key Infrastructure
(PKI), 11, 13, 248–250
Purple machine cipher,
231
Q
qualitative analysis, 159,
161–162, 182
quantitative analysis,
risks, 159–161, 182
questionnaires, informa-
tion gathering, 167
R
RA (registration author-
ity), 249
race conditions, penetra-
tion testing, 306
radiated media, 267–269
radio waves, 267
RADIUS (Remote Authen-
tication Dial-In User
Service), 89, 285
random access, informa-
tion storage, 63
random-access memory
(RAM), 60
RAS (Remote Access Ser-
vices), 286
RBACs (role-based access
controls), 39
RC (Rivest’s Cipher) algo-
rithm, 217, 219–220
RC2, stream cipher, 219
RC4 algorithm, 220, 237
RC5, block cipher, 220
read-only memory
(ROM), 61, 343–344
real (physical) memory, 60
Real Secure, NIDS, 134
record checks, personnel
security, 15
recovery
business continuity
plans (BCPs), 198
cold site, 204
contingency plans (CPs),
198–199, 204–207
continuity of operations
plans (COOPs), 198
disaster recovery plans
(DRPs), 198
emergency response,
199–202
hot site, 203
malicious code element,
354–355
restoration after catastro-
phy, 203–204
scenarios, 200–202
warm site, 204
red teaming, penetration
testing, 302–303
reference monitor, 34, 74
references, 413–416
reflective networks, 269
registration authority
(RA), 249
relationships,
objectives/services/
mechanisms, 6–7
Remote Access Services
(RAS), 286
Remote Authentication
Dial-In User Service
(RADIUS), 89, 285
replication, virus lifecycle
phase, 337
reporting software, 129
reports, security review,
130–131
requirement statement, 80,
82–83
resource protection, 22–23
response. See incident
response
restitution, contingency
plan (CP), 205
retinal scanning, 32
return on investment
(ROI), 160
Rijndael algorithm, 217
ring topology, 280–282
risk, 152–163, 181–182
risk assessment, 157,
164–187, 292
risk identification, 157
risk management, 54, 163
Risk Management Guide
for Information Tech-
nology Systems
(NIST), 54
risk scale, risk determina-
tion, 184–185
risk-level matrix, determi-
nation, 183–184
Rivest’s Cipher (RC) algo-
rithm, 217, 219–220
roadmap, 2–10, 77–88
ROI (return on invest-
ment), 160
role-based access controls
(RBACs), 39
ROM (read-only mem-
ory), 61, 343–344
rotor machines, 229–231
routers, 67, 86
routing control, 291
RSA algorithm, develop-
ment history, 244
rsh, security review soft-
ware, 129
rules of engagement, 302
S
S/MIME (Secure Multi-
purpose Internet Mail
Extensions), 247, 352
sabotage, threat type, 155
Index 505
safeguards, 156
SATAN, security analysis
tool, 130
satellites, 267
scanners, 32–33, 129,
297–301, 351
scanning and enumera-
tion tools, 390–391
scanning tools, 168, 176
scatter networks, 269
scripts, attack, 340
SDLC (software develop-
ment life cycle), 164
secondary storage, 60
secrecy objective, confi-
dentiality, 5
Secure Electronic Transac-
tion (SET), 248
Secure Hash Algorithm 1
(SHA-1), 220
secure hash function, 220
Secure HyperText Trans-
port Protocol (S-HTTP),
246–247
Secure Intrusion Detec-
tion, NIDS, 134
Secure Multipurpose
Internet Mail Exten-
sions (S/MIME), 247,
352
secure shell (ssh), tunnel-
ing uses, 89
Secure Socket Layer (SSL)
data communications,
287
firewall management, 89
handshake transmission,
246
malicious code counter-
measure, 352
RC4 algorithm, 237
stream cipher, 237
security administrators,
25–26, 416
security advisories, 175
security architecture,
10–13
security awareness train-
ing, 99–101
security development life
cycle, 56–59
security education and
training, 157
security equation, risk
management, 54
security kernel, 34, 73
security management
staff, 294–296
security mechanisms, 6–8
security monitoring, 133
security objectives, 3–7
security operation modes,
72–73
security policies, adminis-
tration, 65–67
security practitioners, 415
security requirements
checklist, 176–178
security review reports,
175
security reviews, 129–132
security services, 6–10
Security Test and Evalua-
tion (ST&E)
network testing, 293,
307–308
password violations, 35
vulnerability identifica-
tion, 175–176
security testing, networks,
292–294
security TRIAD, 3, 5,
52–53
selective protection, VPN
policy, 278
self-inflicted DoS
attack, 28
senior IT management,
294
sensitive information,
access controls, 33
separation of duties, 64
sequential access,
data/information,
62–63
serial cabling, EIA RS-232-
C standard, 67
servers
auditing, 119–120
authentication, 89
backup procedures, 69
layered security protec-
tion, 11–13
proxy, 81
RADIUS, 89
TACACS/TACACS+, 89
VPN/firewall place-
ment, 98–99
service leg, demilitarized
zone (DMZ), 87
services, removing
unused, 90
Session Layer (Layer 5),
75, 289
session-level access con-
trols, 39–40
SET (Secure Electronic
Transaction), 248
SHA-1 (Secure Hash Algo-
rithm 1), 220
shadow files, UNIX sys-
tem, 27
shared file system infec-
tion, 355
shielded twisted pair
(STP), 265–266
shredders, types/security
levels, 41
S-HTTP (Secure Hyper-
Text Transport Proto-
col), 246–247
Simple Mail Transfer Pro-
tocol (SMTP), 332
simulation test, contin-
gency plan (CP), 206
single loss expectancy
(SLE), 160
Single Sign-On (SSO), 36
SkipJack algorithm, 217,
233
smart cards, 32, 35–36
SMTP (Simple Mail Trans-
fer Protocol), 332
snapshot programs, 359
sniffers, security review
requirement, 129
Snort, 134, 136–139, 310,
406–412
social engineering, pene-
tration testing, 306
506 Index
software, 129, 253
software development life
cycle (SDLC), 164
Solaris, Basic Security
Module (BSM), 90
SOPs (standard operating
procedures), 193
spamming attack, 26–27
spectral analysis, 359–360
speech patterns, 33
spoofing, 27–28
spread spectrum, 271
SSCP, security responsibil-
ities, 18
ssh (secure shell), 89
SSL (Secure Socket Layer)
data communications,
287
firewall management, 89
handshake transmission,
246
malicious code counter-
measure, 352
RC4 algorithm, 237
stream cipher, 237
SSO (Single Sign-On), 36
ST&E (Security Test and
Evaluation)
network testing, 293,
307–308
password violations, 35
vulnerability identifica-
tion, 175–176
Stallings, William (Cryp-
tography and Network
Security), 235
standard operating proce-
dures (SOPs), 193
standards
auditing metrics, 111
data communications,
282–284
security administration
element, 67
star topology, 279
stealth viruses, 340
steganography
defined, 220, 250
watermarks, 251
storage, 59
storage media, handling/
destroying, 41–44
STP (shielded twisted
pair), 265–266
stream ciphers
defined, 217
plaintext processing
method, 237–238
RC2, 219
RC4, 220
Secure Socket Layer
(SSL), 237
structured walkthrough
(table top) test, contin-
gency plan (CP),
205–206
subnet boundary, audit-
ing, 118–119
substitution ciphers, 236
supervisory controls, 15
supplies, asset type, 154
switches, demilitarized
zone (DMZ), 87
symbolic links, penetra-
tion testing, 305
symmetric (same-key)
cryptography, 239–240
system administration, 16
system administrators, 28,
35, 38–39, 295–296
system anomaly reports,
175
system audits, 292
system backups, 356–357
system characterization,
164–168
system components, 43
system design phase, 57
system development life
cycle, 292–294
system high mode, 72
system level access con-
trols, 33–34
system level, 11, 13
system life cycle, 54–59
system patches, 90
system security auditing,
111
system security staff, 157
system security testing,
175–176
system sensitivity, 181–182
system software security
analyses, 175
system test reports, 175
system-level policy, 66
system-related informa-
tion, 166–167
system-wide removable
media infection, 355
T
table top (structured
walkthrough) test, con-
tingency plan (CP),
205–206
TACACS/TACACS+,
authentication servers,
89
tape, destroying, 42, 44
TCB (trusted computing
base), 34, 73–74
TCP (Transmission Con-
trol Protocol), 289
TCP/IP (Transmission
Control Protocol/Inter-
net Protocol), 285
TCP/IP network model,
291
TCPWrappers, host-based
IDS, 135
TCSEC’s orange book, 14
technology (point) solu-
tions, 20
telecommuters, 276–277
Telnet, security review
requirement, 129
test phase, 58
testing tools, 387–412
theft, threat type, 155
threat identification,
168–173
threat source identifica-
tion, 169–170
threats, 155, 158–159,
169–172, 174
thumbprint imaging, 32
time, information security
element, 18
timelines, 38–39, 54–59,
94, 337–338
TLS (Transaction Layer
Security), 248
TLS (Transport Layer
Security), 287
Index 507
token-based access con-
trols, types, 32
tokens, logical control, 31
topologies, 279–282
total protection, VPN pol-
icy configuration, 278
traceroute, security review
software, 129
traffic analysis, 74, 275
traffic padding, OSI
model security mecha-
nism, 291
training, security aware-
ness, 99–101
Transaction Layer Security
(TLS), 248
transaction logs, transac-
tion-level data access
control, 40
transaction processing,
operations security
(OPSEC) element, 16
transaction-level access
controls, 40
transference, risk han-
dling method, 162
Transmission Control Pro-
tocol (TCP), 289
Transmission Control Pro-
tocol/Internet Protocol
(TCP/IP), 285
transmission security, 14
transmissions, data types,
270–271
Transport Layer (Layer 4),
OSI model, 75, 289
Transport Layer Security
(TLS), 287
transposition ciphers,
encryption, 236–237
trap door, 220, 347
trapdoor access, malicious
code, 351
Triple DES, 238, 243–244
Tripwire, Unix file
integrity checker,
400–406
Trojan horse, 306, 342–343,
368–369
trusted computing base
(TCB), 34, 73–74
U
U.S. federal government,
encryption, 253
UDP (User Datagram Pro-
tocol), 285, 289
unauthorized access,
23–28
unicast transmissions, 270
Uniform Resource Loca-
tors (URLs), 91
UNIX servers, 11, 13
UNIX syslog, 90, 112–113
UNIX systems, 27, 36
unshielded twisted pair
(UTP), 265–266
updates, anti-virus soft-
ware, 357–358
URLs (Uniform Resource
Locators), 91
User Datagram Protocol
(UDP), 285, 289
user IDs, 35–36, 89
user inactivity, 39
user training, 65
user workstations, audit-
ing, 120–125
users, 35, 39, 99–100
UTP (unshielded twisted
pair), 265–266
V
vaccination programs, 359
VBA (Visual BASIC for
Applications), 338–339
vendor advisories, 175
vendor back doors, 27
Vernam cipher, 219,
226–228
Very Large-Scale Integra-
tion (VLSI), 233
video systems, facial
recognition, 32
Vigenere square cipher,
224–226, 236
virtual memory, 61–62
virtual private networks
(VPNs), 11, 13, 81, 84,
98–99, 273, 275–279
virus detectors, network
testing, 312–313
viruses, 336–342, 363–369
Visual BASIC for Applica-
tions (VBA), 338–339
VLSI (Very Large-Scale
Integration), 233
voice verification, 33
volatile memory, 60–61
VPNs (virtual private net-
works), 11, 13, 81, 84,
98–99, 273, 275–279
vulnerability
defined, 155, 173
threat associations, 156,
174
versus threats, 158–159
vulnerability identifica-
tion, 173–178
vulnerability scanner, 129,
299–303, 391–392
vulnerability sources,
identified, 175
W
WANs (wide area net-
works), 272
WAP (Wireless Access
Protocol), 285
war dialing, 313–314, 392
warm site, recovery loca-
tion, 204
watermark, 220–221, 251
Web administration, 35
Web servers, logical con-
trol, 31
Web sites
Axent, 130
Computer Security Act
of 1987, 178
Cyber Cop, 135
Dragon Sensor, 135
Dragon Squire, 135
Federal Computer Inci-
dent Response Cen-
ter (FedCIRC), 173
Federal Emergency Man-
agement Agency
(FEMA), 173
Glossary of Risk Analy-
sis Terms, 152
international incident
response organiza-
tions, 188–189
508 Index
Web sites (continued)
Internet Security
Systems, Inc., 130
National Infrastructure
Protection Center,
173
National Oceanographic
and Atmospheric
Association
(NOAA), 173
Nessus, 130
Network Associates, 130
NFR NID, 134
NIST I-CAT vulnerabil-
ity database, 175
Norton Personal Fire-
wall, 135
Real Secure, 134
RSAsecurity.com, 219
SAINT Corporation, 130
SANS.org, 173
Secure Intrusion Detec-
tion System, 134
security administrators,
416
security practitioner, 415
SecurityFocus.com, 173
SecurityPatrol.com, 173
SecurityWatch.com, 173
Snort, 134
TCPWrappers, 135
United States incident
response organiza-
tions, 189
WhatsUp, security review
software, 129
wide area networks
(WANs), 272
wired LANs, 272
Wireless Access Protocol
(WAP), 285
wireless LANS, 272
wireless network scanner,
security, 129
Wireless Transport Layer
Security (WTLS) proto-
col, 285
workstation backups,
malicious code, 356
workstations
auditing, 120–125
layered security protec-
tion, 11–13
malicious code protec-
tion point, 332, 361
World Wide Web (WWW),
274
worms, 342
WTLS (Wireless Transport
Layer Security) proto-
col, 285
X
X.25 protocol, 285
X.400 protocol, 284
X.500 protocol, 285
X.509 protocol, 247, 285
Y
Yardley, Herbert O. (The
American Black
Chamber), 228
Wiley Publishing, Inc.
End-User License Agreement
READ THIS. You should carefully read these terms and conditions before opening the software
packet(s) included with this book “Book”. This is a license agreement “Agreement” between you
and Wiley Publishing, Inc. “WPI”. By opening the accompanying software packet(s), you
acknowledge that you have read and accept the following terms and conditions. If you do not
agree and do not want to be bound by such terms and conditions, promptly return the Book and
the unopened software packet(s) to the place you obtained them for a full refund.
1. License Grant. WPI grants to you (either an individual or entity) a nonexclusive license
to use one copy of the enclosed software program(s) (collectively, the “Software” solely
for your own personal or business purposes on a single computer (whether a standard
computer or a workstation component of a multi-user network). The Software is in use
on a computer when it is loaded into temporary memory (RAM) or installed into perma-
nent memory (hard disk, CD-ROM, or other storage device). WPI reserves all rights not
expressly granted herein.
2. Ownership. WPI is the owner of all right, title, and interest, including copyright, in and
to the compilation of the Software recorded on the disk(s) or CD-ROM “Software
Media”. Copyright to the individual programs recorded on the Software Media is owned
by the author or other authorized copyright owner of each program. Ownership of the
Software and all proprietary rights relating thereto remain with WPI and its licensers.
3. Restrictions On Use and Transfer.
(a) You may only (i) make one copy of the Software for backup or archival purposes, or
(ii) transfer the Software to a single hard disk, provided that you keep the original
for backup or archival purposes. You may not (i) rent or lease the Software, (ii) copy
or reproduce the Software through a LAN or other network system or through any
computer subscriber system or bulletin- board system, or (iii) modify, adapt, or cre-
ate derivative works based on the Software.
(b) You may not reverse engineer, decompile, or disassemble the Software. You may
transfer the Software and user documentation on a permanent basis, provided that
the transferee agrees to accept the terms and conditions of this Agreement and you
retain no copies. If the Software is an update or has been updated, any transfer must
include the most recent update and all prior versions.
4. Restrictions on Use of Individual Programs. You must follow the individual require-
ments and restrictions detailed for each individual program in the About the CD-ROM
appendix of this Book. These limitations are also contained in the individual license
agreements recorded on the Software Media. These limitations may include a require-
ment that after using the program for a specified period of time, the user must pay a reg-
istration fee or discontinue use. By opening the Software packet(s), you will be agreeing
to abide by the licenses and restrictions for these individual programs that are detailed
in the About the CD-ROM appendix and on the Software Media. None of the material on
this Software Media or listed in this Book may ever be redistributed, in original or modi-
fied form, for commercial purposes.
5. Limited Warranty.
(a) WPI warrants that the Software and Software Media are free from defects in materi-
als and workmanship under normal use for a period of sixty (60) days from the date
of purchase of this Book. If WPI receives notification within the warranty period of
defects in materials or workmanship, WPI will replace the defective Software Media.
(b) WPI AND THE AUTHOR OF THE BOOK DISCLAIM ALL OTHER WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PUR-
POSE, WITH RESPECT TO THE SOFTWARE, THE PROGRAMS, THE SOURCE
CODE CONTAINED THEREIN, AND/OR THE TECHNIQUES DESCRIBED IN
THIS BOOK. WPI DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED
IN THE SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT THE OPERA-
TION OF THE SOFTWARE WILL BE ERROR FREE.
(c) This limited warranty gives you specific legal rights, and you may have other rights
that vary from jurisdiction to jurisdiction.
6. Remedies.
(a) WPI’s entire liability and your exclusive remedy for defects in materials and work-
manship shall be limited to replacement of the Software Media, which may be
returned to WPI with a copy of your receipt at the following address: Software
Media Fulfillment Department, Attn.: The SSCP Prep Guide: Mastering the Seven
Key Areas of System Security, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indi-
anapolis, IN 46256, or call 1-800-762-2974. Please allow four to six weeks for deliv-
ery. This Limited Warranty is void if failure of the Software Media has resulted from
accident, abuse, or misapplication. Any replacement Software Media will be war-
ranted for the remainder of the original warranty period or thirty (30) days,
whichever is longer.
(b) In no event shall WPI or the author be liable for any damages whatsoever (including
without limitation damages for loss of business profits, business interruption, loss of
business information, or any other pecuniary loss) arising from the use of or inabil-
ity to use the Book or the Software, even if WPI has been advised of the possibility of
such damages.
(c) Because some jurisdictions do not allow the exclusion or limitation of liability for
consequential or incidental damages, the above limitation or exclusion may not
apply to you.
7. U.S. Government Restricted Rights. Use, duplication, or disclosure of the Software for
or on behalf of the United States of America, its agencies and/or instrumentalities “U.S.
Government” is subject to restrictions as stated in paragraph (c)(1)(ii) of the Rights in
Technical Data and Computer Software clause of DFARS 252.227-7013, or subparagraphs
(c) (1) and (2) of the Commercial Computer Software - Restricted Rights clause at FAR
52.227-19, and in similar clauses in the NASA FAR supplement, as applicable.
8. General. This Agreement constitutes the entire understanding of the parties and revokes
and supersedes all prior agreements, oral or written, between them and may not be
modified or amended except in a writing signed by both parties hereto that specifically
refers to this Agreement. This Agreement shall take precedence over any other docu-
ments that may be in conflict herewith. If any one or more provisions contained in this
Agreement are held by any court or tribunal to be invalid, illegal, or otherwise unen-
forceable, each and every other provision shall remain in full force and effect.
TE
AM
FL
Y
Team-Fly®
Các file đính kèm theo tài liệu này:
- 0471273511 Wiley.The.SSCP.Prep.Guide.Mastering.the.Seven.Key.Areas.of.System.Security fly.pdf