Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

large enterprise IPS deployment

     HIPS implementation

     limiting factors

     NIPS implementation 2nd

     security policy goals

     sensor deployment

layered defense [See also defense-in-depth.]

     against corporate database attacks

     against management server attacks

least privilege

lifecycle of attacks

     application execution

     file resources

     memory resources 2nd

     network resources

     persistence process 2nd

limitations

     of HIPS, acceptable use policy enforcement

     of IPS 2nd

line cards

location state conditions

log response

log signature action

logging

     attacker traffic

     traffic between attacker and victim

     victim traffic

Loveletter virus

Категории