Windows Vista Security. Securing Vista Against Malicious Attacks

EAP. See Extensible Authentication Protocol

eavesdropping, 57. See also man-in-the-middle attacks

wireless networks and, 472-474

ECC. See Elliptical Curve Cryptography

edit.exe, 216

edlin.exe, 216

Effective Permissions tab, 172

EFI (Extended Firmware Interface), 9, 10, 74

Boot Manager, 74, 75

firmware, 74, 75

64-bit platform and, 74

EFS. See Encryption File System

802.11 Legacy wireless security recommendations, 477-480

changing AP's default Administrator Password, 480

changing AP's default SSID, 478

disabling DHCP on AP, 478-479

disabling SSID broadcasting, 479-480

enabling MAC filtering, 478

requiring user authentication passwords, 479

802.11 Wi-Fi standards, 463-464

802.11 wireless networks, 461. See also wireless networks

elevate tool, 166

elevated processes, 134

elevate.exe application, 166, 167

elevation, 130-140

auditing, 162-164

command prompt, 166-167

installers and, 166

non-admin, 137-139

prompts, 133

scripts and, 166

special topics, 139-140

of standard users, 150-151, 168

of unsigned executables, 151

Windows Explorer and attempted, 154-156

Elliptical Curve Cryptography (ECC), 26

e-mail. See also Windows Mail

defenses, 390-398

anti-malware software, 398

disable automatic download of HTML content, 394-395

file attachment blocking, 395-398

HTML content in Restricted zone, 393-394

plain-text conversion, 391-393, 535

plain-text passwords disabled, 398

protection, 351-399

best practices, 399

as spam, 226

threats, 351-384

buffer overflow, 384

embedded content, 381-382

embedded links, 382

file attachments, 58, 351-381

leaked passwords, 383

miscellaneous, 383-384

embedded content, 381-382. See also malicious file attachments

embedded links, 382

empty DACLs. See discretionary access control lists

Enable .NET Framework setup (setting), 270, 279

encryption

digital certificates and, 257-258

enhancements/support, 26-27, 257-258

hard disk, 534-535

Encryption File System (EFS), 27, 77. See also BitLocker Drive Encryption

enhancements, 27

escalation, of privileges, 54-55

Ettercap, 57

event forwarding, 29, 30

Event Log interface, 29, 30

Event Log Readers, 24

event logs, 28

Group Policy and, 497-498

improvements, 28-29

as securable objects, 173

subscriptions, 30

event numbers, 162

new, 162

event triggers, 29

events, as securable processes, 173

exploitation techniques, malicious, 43-60

Extended Firmware Interface. See EFI

Extensible Application Markup Language. See XAML

Extensible Authentication Protocol (EAP), 468

versions, 468

Категории