Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

objectives

        of information security

                protecting availability 2nd 3rd

                protecting confidentiality 2nd

                protecting integrity 2nd

        security

offline storage [See also storage]

one-time passwords

one-way function (OWF)

Open Systems Interconnect

OpenHack

operating systems

        Windows [See also Microsoft; Windows operating system]

optimization

        passwords

                accoutn lockout

                disabling LM hashes 2nd

                policies

                protecting cached credentials 2nd

                selection 2nd 3rd 4th 5th 6th 7th

options

       authentication

                SQL Servers 2nd

OS

        version information 2nd

OSI (Open Systems Interconnect) model

outbound connections, preventing 2nd

Outlook Web Access (OWA)

overflows

       buffers

                troubleshooting 2nd

OWA (Outlook Web Access)

OWASP project (http://www.owasp.org)

OWF (one-way function)

Категории