Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

CA Unicenter

cached credentials 2nd

        attacks

        protecting 2nd

cached credentials, disabling

caches

        TIF (temporay Internet files)

California law SB 1386 (public disclosure)

call detail record (CDR)

cardinal points

casual attackers

CDR (call detail record)

CERNIC (China Education and Research Network Information Center)

certificates

        IPsec

        physical security

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP) exam

challenge-response transactions 2nd 3rd 4th

Character Map tool

characters

        passwords 2nd 3rd 4th 5th 6th 7th 8th

China Education and Research Network Information Center (CERNIC)

circuits

        proxies

circumvention vulnerabilities

CISSP (Certified Information Systems Security Professional)

CISSP (Certified Information Systems Security Professional) exam

classification systems (security policies)

cleaning attackers 2nd

clearing

        virtual memory

cleartext data

        troubleshooting

client information, storing on servers 2nd 3rd

client PCs, protecting 2nd 3rd 4th

clients

        password policies

        quarantine

       security tweaks

                anonymous restrictions

                blank passwords

                enabling auditing 2nd

                LAN Manager authntication

                limiting malisous code 2nd

                removable media

                SafeDllSearchMode 2nd 3rd 4th

                SMB message signing

       VPN

                securing

Clustering Service

clusters

        segementation

CMAK (Connection Manager Administration Kit)

code

       malicious

                limiting 2nd

       worms

                comparing to viruses 2nd

Cold Fusion Expression Evaluator

components

        quarantine systems 2nd 3rd

        RMS (Rights Management Services) 2nd

        uninstalling 2nd 3rd

        unused (turning off funcitonality)

compromising

       networks

                cleaning attackers 2nd

computaiton

        LM hash

computers

        dealing with stolen 2nd 3rd 4th 5th

        family (physical security)

        protecting (physical security) 2nd 3rd 4th

       small businesses

                applying anti-spyware/antivirus software 2nd

                configuring firewalls 2nd

                controlling automatic updating

                protecting 2nd 3rd 4th

                updating software 2nd

conclusions of penetration testing

confidentiality

        protecting 2nd

configuration

        audit settings 2nd

       firewalls

                for small business 2nd

        passwords (administrators) 2nd 3rd 4th 5th 6th

        replicating

       security

                false information about guides 2nd 3rd 4th 5th 6th 7th

                tools 2nd 3rd 4th

                troubleshooting

       SQL Server

                customizing authentication 2nd

                dropping stored procedures 2nd 3rd

                hardening 2nd

                securing service accounts 2nd 3rd 4th 5th

        supportability

connections

        anonymous (null sessions)

        border routers 2nd

       outbound

                preventing 2nd

control

       remote

                protecting perimeters 2nd

controls

        access (physical security) 2nd 3rd 4th 5th

cracking

cracking (passwords) 2nd 3rd

CrashOnAuditFail

credentials

        cached 2nd

                attacks

                protecting 2nd

       caches

                disabling

critical updates

cross-site scripting 2nd

cross-site scripting (XSS)

crypto algorithms

        troubleshooting 2nd

customization

       authentication

                SQL Servers 2nd

Категории