Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

encoding mechanisms

encryption, role in layered defense

endpoint agents, access control process

     access resource, identifying

     consulting the security policy

     determining system state 2nd

     gathering operation data

     taking action

enforcing security policies

EtherChannel

event correlation

event horizon

events

evolution of security threats

     client-server computing

     Internet

     mobile computing

     wireless connnectivity

examples

    of attacks

         CIH virus

         Loveletter virus

         Morris worm

         Nimda worm

         replacement login

         SQL Slammer worm

     of effective defense-in-depth

         external attack against corporate database

         internal attacks against management servers

exploits

Категории