.NET Framework Security

for RuBoard
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SACL (System Access Control List)  

sandboxing a directory on the local hard drive   2nd  

SANS (Security Administration, Networking, and Security)  

Scheduled Task Wizard  

scheduled tasks  

scripts   2nd   3rd   4th  

       Caspol tool   2nd   3rd   4th   5th  

       security policy administration   2nd   3rd   4th  

secret key ciphers  

secret key derivation   2nd   3rd   4th   5th   6th   7th   8th  

sectionGroup element   2nd  

secure code

       definition  

       developer •s role   2nd   3rd   4th   5th   6th   7th   8th   9th  

       levels of trust   2nd   3rd   4th   5th   6th   7th   8th  

Secure Hash Algorithm (SHA-1)  

Secure Sockets Layer (SSL)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th  

       IIS  

secure Web sites

       attacks   2nd   3rd   4th   5th   6th   7th   8th   9th  

       authentication   2nd   3rd  

       authorization   2nd   3rd   4th   5th   6th  

       channels   2nd   3rd   4th  

       designing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       firewalls  

       implementing   2nd   3rd   4th   5th   6th   7th   8th   9th  

       log files   2nd   3rd   4th  

       NetBIOS ports  

       protected modules   2nd   3rd  

       SecureOffice example  

       SSL  

SecureOffice Web site

       goals  

       hardware  

        user base  

security

       application designs   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  

       ASP.NET

               authentication for Web services   2nd   3rd   4th  

               Code Access Security   2nd   3rd   4th   5th   6th  

               forms authentication   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

               impersonation   2nd   3rd   4th  

               overview   2nd   3rd  

               passport authentication   2nd   3rd   4th  

       considerations

               during deployment   2nd   3rd   4th   5th   6th   7th  

               during development   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

               during execution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th  

       databases   2nd  

       Internet Explorer   2nd  

       mobile code

               ActiveX controls   2nd   3rd   4th  

               downloaded executables   2nd   3rd  

               Java applets   2nd   3rd  

               scripts   2nd   3rd   4th  

               source code   2nd   3rd   4th  

       NET Framework

               calling the security system  

               class libraries   2nd  

               code identity-based security checking   2nd   3rd   4th   5th  

               extending the security system  

               limitations   2nd   3rd   4th   5th   6th   7th  

               PrincipalPermission  

               registry access   2nd  

               SecurityPermission.ControlEvidence  

               structure;PrincipalPermission  

       operating systems  

       software  

       software vulnerabilities

               buffer overflows   2nd   3rd   4th  

               canonicalization errors   2nd   3rd  

               denial-of-service attacks   2nd   3rd  

               information leaks   2nd   3rd  

                insecure default configurations   2nd  

       turning off   2nd  

security actions   2nd   3rd   4th   5th   6th   7th  

security administration

       breaches in security   2nd  

       Configuration tool

               creating a new policy level   2nd  

               exiting   2nd  

               installing  

               main security administrative options   2nd   3rd   4th   5th  

               MMC (Microsoft Management Console) requirements   2nd  

               obtaining  

               opening a policy level configuration file   2nd   3rd   4th  

               policy level features   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd   74th   75th   76th   77th   78th   79th   80th   81st   82nd  

               policy tree manipulation options   2nd   3rd  

               self protection mechanism   2nd   3rd   4th   5th   6th  

               starting   2nd   3rd   4th   5th  

               uses   2nd  

       crytography settings

               administering   2nd   3rd   4th   5th   6th  

               Caspol  

               machine.config file   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               mappings   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               modifying   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

               testing changes   2nd   3rd   4th  

               uses  

       disallowing all assemblies from an Internet site on a machine   2nd  

       disallowing an assembly to do anything but execute   2nd  

       giving all assemblies file-read rights to a directory   2nd  

       granting all assemblies full trust on a machine   2nd  

       granting enterprise-wide full trust to an assembly   2nd  

       granting full trust to all assemblies of a software publisher   2nd   3rd  

       Isolated Storage

               administering   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

               deleting all stores of a user   2nd   3rd  

               deleting content   2nd   3rd   4th   5th  

               permissions   2nd   3rd   4th  

               properties   2nd  

               state   2nd  

               Storeadm.exe tool   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

               uses  

               viewing all stores of a user   2nd   3rd   4th   5th  

               viewing content   2nd   3rd   4th  

       preventing all assemblies of a software publisher from running across an enterprise   2nd  

       preventing an assembly from running across an enterprise   2nd   3rd  

       reducing level of trust for all assemblies   2nd  

       sandboxing a directory on the local hard drive   2nd  

       strategies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  

       wizards

               Adjust Security Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  

               Create Deployment Package Wizard  

               Deployment Package Wizard   2nd   3rd  

               Evaluate Assembly Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               New Code Group Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

               Trust Assembly Wizard   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th  

security benefits of .NET Framework   2nd   3rd  

security checks

       IL Validation   2nd   3rd   4th   5th  

       IL Verification   2nd   3rd   4th   5th   6th   7th   8th   9th  

       metadata validation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

       PE File Format Validation   2nd   3rd   4th   5th   6th   7th  

       unverifiable code   2nd  

security choke points   2nd   3rd   4th   5th  

security custom attributes   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

security descriptors   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

security holes

       inlining   2nd   3rd   4th   5th  

security policy

        backups  

       changing   2nd   3rd   4th   5th   6th   7th   8th   9th  

       changing programmatically

               Caspol tool   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd   74th   75th   76th   77th   78th   79th   80th   81st   82nd   83rd   84th   85th  

               scenarios   2nd  

               security policy APIs   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th  

       code groups   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd  

       corruption  

       default   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       default security policy   2nd   3rd   4th  

       deploying   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       documenting changes to security policy   2nd  

       file locations   2nd   3rd  

       interaction with operation system settings   2nd  

       machine policies   2nd   3rd   4th  

       membership conditions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  

       mobile code   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

       permissions   2nd   3rd   4th  

       policy level features   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th   45th   46th   47th   48th   49th   50th   51st   52nd   53rd   54th   55th   56th   57th   58th   59th   60th   61st   62nd   63rd   64th   65th   66th   67th   68th   69th   70th   71st   72nd   73rd  

       policy levels   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th  

               code group hierarchy   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th  

               creating a new policy level   2nd  

               features   2nd   3rd   4th   5th   6th   7th   8th   9th  

               opening a policy level configuration file   2nd   3rd   4th  

               permission sets   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd  

               policy assemblies   2nd   3rd   4th   5th   6th   7th   8th  

               undoing changes   2nd  

       policy resolution  

       purpose   2nd   3rd   4th  

       resetting   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  

       setting  

       structure   2nd   3rd  

       testing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       Trustworthy Computing initiative  

       user policies   2nd   3rd   4th   5th   6th  

       worst case scenarios   2nd  

security policy APIs

       classes

               NamedPermissionSet class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th  

               PolicyLevel class  

               SecurityManager class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               UnionCodeGroup class  

       programming   2nd  

       security policy administration   2nd   3rd  

security policy model   2nd  

security syntax  

security vulnerabilities

       buffer overflows   2nd   3rd   4th  

       canonicalization errors   2nd   3rd  

       denial-of-service attacks   2nd   3rd  

       information leaks   2nd   3rd  

       insecure default configurations   2nd  

       resources

                CVE (Common Vulnerabilities and Exposures) Project  

               CERT (Computer Emergency Response Team)  

               SANS (System Administration, Networking, and Security)  

               SecurityFocus  

               SecurityFocus vulnerability database  

security zones

       evidence  

       mobile code   2nd  

SecurityExceptions

       semi-trusted applications  

SecurityFocus  

SecurityFocus vulnerability database  

SecurityManager class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

SecurityPermission class   2nd   3rd  

securityPolicy element   2nd   3rd   4th   5th   6th   7th   8th  

semantic metadata validation  

semi-trusted applications

       class libraries   2nd   3rd   4th   5th   6th   7th   8th  

       code execution   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th  

       definition  

       networks   2nd  

       permissions   2nd   3rd   4th   5th   6th   7th   8th  

       sensitive data   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th  

ServiceControllerPermission class  

services

       access control   2nd  

sessionState element   2nd   3rd   4th   5th   6th  

SHA-1 (Secure Hash Algorithm)  

shared assemblies   2nd   3rd   4th  

side-by-side support  

signatures

       XML digital signatures

               SignedXml class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th  

SignedXml class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th   41st   42nd   43rd   44th  

signing assemblies   2nd   3rd   4th   5th   6th   7th   8th   9th  

Simple Object Access Protocol (SOAP)

       XML  

sinks   2nd   3rd  

SiteIdentityPermission class  

SN utility   2nd   3rd  

snap-ins (MMC)

       Configuration tool   2nd  

SOAP

       Web Services   2nd   3rd   4th  

SOAP (Simple Object Access Protocol)

       XML  

SocketPermission class  

software

       security mechanisms  

       security problems

               buffer overflows   2nd   3rd   4th  

               canonicalization errors   2nd   3rd  

               denial-of-service attacks   2nd   3rd  

               information leaks   2nd   3rd  

               insecure default configurations   2nd  

Software Restriction Policies   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

source code   2nd   3rd   4th  

SQL server databases

       authentication   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

SqlClientPermission class  

SSL

       IIS  

SSL (Secure Sockets Layer)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th  

stack walks

       application performance  

       semi-trusted applications   2nd  

stacks

       data storage   2nd  

        frames   2nd  

       popping  

       process layouts   2nd  

       pushing  

       stack pointers   2nd  

       threads   2nd   3rd  

       uses   2nd   3rd  

       walking the stack   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st  

standard permissions  

starting

       Caspol tool   2nd   3rd  

       Configuration tool   2nd   3rd   4th   5th  

       Wizards launcher  

states (permission sets)   2nd   3rd  

states (permissions)   2nd   3rd   4th  

Storeadm tool   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

storing data

       stacks   2nd  

streams

       cryptography   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

strong names

       assemblies   2nd   3rd   4th   5th  

       building into assemblies   2nd   3rd   4th   5th   6th   7th   8th   9th  

       key pair generation   2nd   3rd   4th   5th   6th   7th   8th   9th  

       side-by-side support  

       signature invalidation   2nd   3rd   4th  

StrongNameIdentityPermission class  

structural metadata validation  

subtags  

Sun

       Web address  

switching off security   2nd  

symmetric algorithms   2nd   3rd   4th   5th   6th  

symmetric key encryption  

SymmetricAlgorithm class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd  

System Access Control List (SACL)  

System.AppDomain class   2nd  

System.Data.OleDb.OleDbPermission class  

System.Data.SqlClient.SqlClientPermission class  

System.Diagnostics.EventLogPermission class  

System.Diagnostics.PerformanceCounterPermission class  

System.Drawing.Printing.PrintingPermission class  

System.Messaging.MessageQueuePermission class  

System.Net.DnsPermission class  

System.Net.SocketPermission class  

System.Net.WebPermission class  

System.Security namespace  

System.Security.CodeAccessPermission class   2nd   3rd   4th  

System.Security.Cryptography.Xml namespace   2nd   3rd   4th   5th   6th   7th   8th  

System.Security.Crytography.Xml namespace   2nd   3rd   4th   5th   6th  

System.Security.NamedPermissionSet class  

System.Security.Permissions namespace   2nd   3rd   4th  

System.Security.Permissions.EnvironmentPermission class  

System.Security.Permissions.FileDialogPermission class  

System.Security.Permissions.FileIOPermission class  

System.Security.Permissions.IsolatedStorageFilePermission class  

System.Security.Permissions.PrincipalPermission class  

System.Security.Permissions.PublisherIdentityPermission class  

System.Security.Permissions.ReflectionPermission class  

System.Security.Permissions.RegistryPermission class  

System.Security.Permissions.SecurityPermission class  

System.Security.Permissions.SiteIdentityPermission class  

System.Security.Permissions.StrongNameIdentityPermission class  

System.Security.Permissions.UIPermission class  

System.Security.Permissions.UrlIdentityPermission class  

System.Security.Permissions.ZoneIdentityPermission class  

System.Security.PermissionSet class  

System.Security.Policy namespace  

System.Security.Policy.CodeGroup class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

System.Security.Policy.Evidence class   2nd   3rd   4th   5th   6th  

System.Security.Policy.MembershipCondition class   2nd   3rd   4th  

System.Security.Policy.PolicyException class  

System.Security.Policy.PolicyLevel class   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th  

System.Security.SecurityElement class  

System.ServiceProcess.ServiceControllerPermission class  

system.web element   2nd   3rd   4th   5th   6th   7th  

for RuBoard

Категории