Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

damage from attacks (types of) 2nd 3rd

data destruction attacks 2nd

Data Encryption Standard (DESX)

data flow diagrams (DFDs) 2nd 3rd

data modification attacks 2nd

data protection for small businesses 2nd

Data Source Name (DSN)

data-protection mechanisms 2nd

        ACLs (access control lists)

                best practices 2nd 3rd 4th

                layers 2nd

                security descriptors 2nd 3rd 4th 5th 6th 7th

       applications

                incorporating into 2nd

        rights managemet systems 2nd 3rd 4th

       security groups

                reviewing

databases

       security

                troubleshooting 2nd

        troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

DC (domain controller)

DDoS (distributed denial-of-service) attacks

debugging

        LSA

defens ein depth models

        security tweaks 2nd

defense- in-depth model 2nd 3rd

demilitarized zone (DMZ)

denial of service [See attacks;DoS]

denial-of-service (DoS) attacks

       availability

                protecting

dependencies

        administrative security 2nd 3rd 4th 5th

                mitigating services 2nd 3rd 4th 5th 6th 7th

        overview of 2nd 3rd

        service accounts 2nd

        types of 2nd 3rd 4th

        UNIX 2nd

deperimeterization 2nd 3rd

descriptors

       security

                ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th

design

        defense-depth model 2nd 3rd

        network threat modeling processes 2nd

                access restriction 2nd 3rd 4th 5th

                documentation 2nd 3rd 4th 5th 6th 7th

                segmentation 2nd 3rd

       tradeoffs

                vendors 2nd 3rd 4th 5th 6th

desktops

        family (physical security)

        protecting (physical security) 2nd 3rd 4th

       small businesses

                applying anti-spyware/antivirus software 2nd

                configuring firewalls 2nd

                controlling automatic updating

                protecting 2nd 3rd 4th

                updating software 2nd

DESX (Data Encryption Standard)

detecting

        attacks

deterministic passwords

development

        security policies

                analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th

                creating awareness of 2nd

                enforcing 2nd

                failure of

                identifying threats

                modifying

                necessity of

                structure of 2nd

DFDs (data flow diagrams) 2nd 3rd

dialog boxes

        Manage Add-ons

digital certificates

        IPsec

digrams (DFDs (data flow diagrams) 2nd 3rd

direct tap policy (DTP)

disabling

        cached credentials

        LM hash value storage 2nd

        LM hashes 2nd

        unnecessay features

        USB drives

DiscoverHosts

        executing

distributed denial-of-service (DDoS) attack

Distributed Management Objects (DMO)

distribution

        password length

DMO (Distributed Management Objects)

DMZ (demilitarized zone)

DNS (Domain Name Server)

        lookup requests

Do Not Duplicate markings

doamins

        Microsoft

Document Tracking and Administration (DTA)

documentaiton

        passwords

documentation

        network threat modeling processes 2nd 3rd 4th 5th 6th 7th

documents

       security policies

                analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th

                creating awareness of 2nd

                developing

                enforcing 2nd

                failure of

                identifying threats

                modifying

                necessity of

                structure of 2nd

domain controller (DC)

domain controllers

        operations of

domain local groups

Domain Name Server (DNS)

        lookup requests

domains

        cached credentials 2nd

                attacks

                protecting 2nd

       isolation

                applying IPsec 2nd

        LM hash value storage 2nd

        taking over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

doors

        locking

DoS (denial of service) attacks 2nd

DoS (denial-of-service) attacks

       availability

                protecting

downtime

        preventing

DPAPI (Windows Data Protection API)

drives

       USB (universal serial bus)

                disabling

dropping stored procedures 2nd 3rd

DSN (Data Source Name)

DTA (Document Tracking and Administration)

DTP (direct tap policy)

dumpinfo

Категории