Review All Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 12-2 lists these key topics and the page numbers on which each is found.
Table 12-2 Key Topics for Chapter 12
Key Topic Element |
Description |
Page |
---|---|---|
Paragraph |
Understanding the challenges that encryption introduces to security monitoring |
500 |
Paragraph |
Understanding the challenges that NAT introduces to security monitoring |
501 |
Section |
Security Monitoring and Tor |
504 |
Summary |
Understanding the challenges that peer-to-peer communication introduces to security monitoring |
505 |
List |
Key encryption and tunneling concepts |
508 |
List |
Key resource exhaustion concepts |
509 |
List |
Key traffic fragmentation concepts |
510 |
List |
Key protocol misinterpretation concepts |
511 |
List |
Understanding traffic substitution and insertion concepts |
512 |
List |
Understanding pivoting (lateral movement) |
516 |