■ CONTENTS
xvi
Mobile Device Management ......................................................................................... 157
Summary ...................................................................................................................... 157
Do-It-Yourself (DIY) Exercises....................................................................................... 158
Test Your Knowledge: Sample Questions ..................................................................... 158
■Chapter 13: IDSes, Firewalls, and Honeypots .................................................... 161
What an IDS Is and How It Works ................................................................................. 161
Types of IDS ........................................................................................................................................161
Evading an IDS ....................................................................................................................................162
Common Symptoms of an Intrusion ...................................................................................................163
Firewalls ....................................................................................................................... 163
DMZ ....................................................................................................................................................164
Firewall Architecture...........................................................................................................................164
Types of Firewall .................................................................................................................................164
Firewall Identifi cation Techniques ......................................................................................................165
Evading Firewalls................................................................................................................................165
Honeypots ................................................................................................................... 166
Types of Honeypots.............................................................................................................................167
Detecting Honeypots .........................................................................................................................167
Summary ...................................................................................................................... 167
Do-It-Yourself Exercises ............................................................................................... 168
Sample Questions: Test Your Knowledge ..................................................................... 168
■Chapter 14: Cryptography ................................................................................. 171
Cryptography and Its Objectives .................................................................................. 171
Types of Cryptography .................................................................................................. 171
Symmetric Encryption ........................................................................................................................172
Asymmetric Encryption ......................................................................................................................172
Key Escrow .........................................................................................................................................172
Types of Ciphers ................................................................................................................................172