Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

failures

        CrashOnAuditFail

family PCs (physical security)

fault trees

features

        disabling

feedback

        receiving 2nd 3rd 4th 5th

file encryption key (FEK)

files

        encrypting 2nd

                recovering 2nd

        generic rights on

        HOSTS

                blocking spyware

        SRPs (software restriction policies) 2nd

        TIF (temporary Internet files)

filtering

        IPsec

       traffic

                resticting access 2nd 3rd

filters

        IPsec

                limiting malicious code

firewalls

        applying 2nd 3rd 4th 5th 6th

       for small business

                configuring 2nd

        malicious code (limiting)

        types of

        Windows XP Service Pack 2

first-level zombies

fixes

folders

        redirecting

footprinting networks

        address ranges 2nd

        application/OS version information 2nd

        expected hosts 2nd

        exposed applications

        host names 2nd

        patch states (of applications and hosts)

        public information 2nd

        structure (of applications and back-end servers)

forewarning

formatting

        removable media

FRK (file encryption key)

full IP VPNs 2nd 3rd 4th 5th 6th 7th

full privilege auditing

functionality

        restricting browser 2nd 3rd 4th

        turning off 2nd 3rd

functions

        LSALogonUser

Категории