Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

cabling, sensors

capabilities

     of Cisco IPS network components

    of IPSs

         attack prevention

         regulatory compliance

capturing network traffic

     devices for

     with IPSs

         for Inline mode

         for promiscuous mode

     with RSPAN

     with SPAN

     with VACLs

characteristics

    of attacks

         CIH virus

         Loveletter virus

         Morris worm

         Nimda worm

         replacement login attack

         SQL Slammer worm

     of signatures

Chernobyl

child processes

CIH virus

Cisco Catalyst 6500 series IDSM-2

Cisco IDS Network Module

Cisco IOS IPS sensors

Cisco IPS 4200 series appliance sensors

classifying IPS hosts

client-server architecture

client-server computing

clipboard

collaboration between layers

COM (Component Object Model)

communications, securing management communication

comparing IPS and IDS functionality

complexity of attacks

conducting pilot tests

configuration updates

configuring

     policy groups

     secondary policy groups

     sensors

corporate security policies

     default policy configuration, customizing

     reviewing

correlation tools

criteria for sensor selection

     form factor

     interfaces

     processing capacity

CS-MARs (Cisco Security Monitoring, Analysis and Response System)

CSA (Cisco Security Agent)

     phases of deployment

         conducting pilot tests

         finalizing the project

         full deployment

         implementing management

         predeployment planning

         selection and classification of target hosts

         tuning

         understanding the product

CSA MC (CSA Management Center), organizational units

customizing default corporate security policy configuration

Категории