Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

day zero attacks

default allow organizations

default deny organizations

defense-in-depth

     corporate security policy

     examples of

defining goals of IPS deployment

delivery mechanism of attacks

deny response

deploying IPSs

     at branch offices

         HIPS implementation

         limiting factors

         NIPS implementation

         security policy goals

     at home office

         HIPS implementation

         limiting factors

         NIPS implementation

         security policy goals

     at medium educational institutions

         HIPS implementation

         limiting factors

         NIPS implementation

         security policy goals

     at medium financial enterprises

         HIPS implementation

         limiting factors

         NIPS implementation

         security goals

     at small offices

         HIPS implementation

         limiting factors

         NIPS implementation

         security policy goals

     host IPS

         determining factors

     network IPS

         determining factors

     on large enterprise

         HIPS implementation

         limiting factors

         NIPS implementation 2nd

         security policy goals

    sensors

         large deployments

         small deployments

deployment phases

     of CSA

         conducting pilot tests

         finalizing the project

         full deployment

         implementing management

         predeployment planning

         selection and classification of target hosts

         tuning

         understanding the product

     of IPS

         finalizing the project

         predeployment planning

         sensor deployment

         tuning

         understanding the product

device-to-device communication, securing

devices

    failure

         inline sensor failure

         management console failure

     intrinsic IPS

directory traversal attacks

DMZ firewall, role in layered defense

drive-by spamming

drop signature action

dropping

     all packets from source IP address

     all packets on connection

Категории