Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

RADIUS

ranges

        addresses 2nd

RAP (remote access policy)

rating

        risk

Real Time Communication Server (RTC)

reality check

reboots

        minimizing 2nd

records

        CDR (call detail record)

        Microsoft domain

recovering

        encypted files 2nd

redirecting

        folders

reflection attacks

regeneration (of keys)

registration

        for security bulletins

        Trojans

Reinhold, Arnold

relative identifier (RID)

Release To Manufacturing [See RTM]

remote access

        perimeters

                protecting 2nd 3rd

remote access policy (RAP)

remote control

       perimeters

                protecting 2nd

Remote Installation Services [See RIS]

removable media

removing

        service privileges 2nd 3rd

replacing

        encrypted files

replicas

        configuration

replication

        supportability

replies

        gratuitous ARP

reports

       penetration testing [See penetration testing]

repudiation

requests

        unsolicited ARP

resetting

        administrator passwords

resistence training

restriction

       access

                network threat modeling processes 2nd 3rd 4th 5th

       software policies

                limiting malicious code

        SRPs (software restriction policies) 2nd

restrictions

        anonymous 2nd 3rd 4th 5th

        browser functionality 2nd 3rd 4th

        groups 2nd

return on investment (ROI)

reviewing

        applications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

        security groups

revoking

        PUBLIC permissions 2nd

RFC 1928

RID (relative identifier)

rights

        management systems 2nd 3rd 4th

rights (on files)

RIS (Remote Installation Services)

risk management 2nd

risk management strategies

       security policies [See risk management strategies;security policies]

risk management, patch management as 2nd

RMS (Windows Rights Management Services) 2nd

        components 2nd

        workflow 2nd

roaming

        profiles

rogue access

        applying 802.1X 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

        enabling IPsec 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

        layer 2/3 protection 2nd 3rd 4th

        network quarantine systems 2nd 3rd 4th 5th

        preventing 2nd

        sniffing 2nd

ROI (return on investment)

role of networks

       perimeters

                protecting 2nd

rollup (updates)

routers

       border

                connecting 2nd

        DMZ DCs

RRAS

        stacks

RRAS (Windows Routing and Remote Access Services)

RSA SecureID tokens

RSA SecurID

RTC (Real Time Communication Server)

RTM (Release To Manufacturing)

Категории