Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

parent processes

passwords, OTPs

pattern detection

pattern matching, regular expressions

pattern-based security policies

PCs, zombies

peer-to-peer networks

permissive systems

persistence process

     application execution

     file modification

     system configuration

personal firewalls

phases of deployment

    for CSA

         conducting pilot tests

         finalizing the project

         full deployment

         implementing management

         predeployment planning

         selection and classification of target hosts

         tuning

         understanding the product

     for IPS

         finalizing the project

         predeployment planning 2nd

         sensor deployment

         tuning

         understanding the product

pilot test, conducting 2nd

placing IPS sensors in network

policy groups

     configuring

     secondary groups

port security

PortMapper

predeployment planning phase of IPS deployment

processing capacity as sensor selection criteria

promiscuous mode sensor operation 2nd

     capturing network traffic

protocol decodes 2nd

Pull model (management console)

Push model (management console)

Категории