Protect Your Windows Network: From Perimeter to Data
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
damage from attacks (types of) 2nd 3rd data destruction attacks 2nd Data Encryption Standard (DESX) data flow diagrams (DFDs) 2nd 3rd data modification attacks 2nd data protection for small businesses 2nd Data Source Name (DSN) data-protection mechanisms 2nd ACLs (access control lists) best practices 2nd 3rd 4th layers 2nd security descriptors 2nd 3rd 4th 5th 6th 7th applications incorporating into 2nd rights managemet systems 2nd 3rd 4th security groups reviewing databases security troubleshooting 2nd troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th DC (domain controller) DDoS (distributed denial-of-service) attacks debugging LSA defens ein depth models security tweaks 2nd defense- in-depth model 2nd 3rd demilitarized zone (DMZ) denial of service [See attacks;DoS] denial-of-service (DoS) attacks availability protecting dependencies administrative security 2nd 3rd 4th 5th mitigating services 2nd 3rd 4th 5th 6th 7th overview of 2nd 3rd service accounts 2nd types of 2nd 3rd 4th UNIX 2nd deperimeterization 2nd 3rd descriptors security ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th design defense-depth model 2nd 3rd network threat modeling processes 2nd access restriction 2nd 3rd 4th 5th documentation 2nd 3rd 4th 5th 6th 7th segmentation 2nd 3rd tradeoffs vendors 2nd 3rd 4th 5th 6th desktops family (physical security) protecting (physical security) 2nd 3rd 4th small businesses applying anti-spyware/antivirus software 2nd configuring firewalls 2nd controlling automatic updating protecting 2nd 3rd 4th updating software 2nd DESX (Data Encryption Standard) detecting attacks deterministic passwords development security policies analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th creating awareness of 2nd enforcing 2nd failure of identifying threats modifying necessity of structure of 2nd DFDs (data flow diagrams) 2nd 3rd dialog boxes Manage Add-ons digital certificates IPsec digrams (DFDs (data flow diagrams) 2nd 3rd direct tap policy (DTP) disabling cached credentials LM hash value storage 2nd LM hashes 2nd unnecessay features USB drives DiscoverHosts executing distributed denial-of-service (DDoS) attack Distributed Management Objects (DMO) distribution password length DMO (Distributed Management Objects) DMZ (demilitarized zone) DNS (Domain Name Server) lookup requests Do Not Duplicate markings doamins Microsoft Document Tracking and Administration (DTA) documentaiton passwords documentation network threat modeling processes 2nd 3rd 4th 5th 6th 7th documents security policies analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th creating awareness of 2nd developing enforcing 2nd failure of identifying threats modifying necessity of structure of 2nd domain controller (DC) domain controllers operations of domain local groups Domain Name Server (DNS) lookup requests domains cached credentials 2nd attacks protecting 2nd isolation applying IPsec 2nd LM hash value storage 2nd taking over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th doors locking DoS (denial of service) attacks 2nd DoS (denial-of-service) attacks availability protecting downtime preventing DPAPI (Windows Data Protection API) drives USB (universal serial bus) disabling dropping stored procedures 2nd 3rd DSN (Data Source Name) DTA (Document Tracking and Administration) DTP (direct tap policy) dumpinfo
|