Critical Incident Management

 < Day Day Up > 


B

Back doors, 24

Back Orifice, 251

Backup(s), 242

definition of, 5

e-mail, 53, 54

procedures, 158

security, 477

Bank examiners, risk assessment reviews by, 38

Banner(s), 68, 69

definition of, 5

opening, 474

Banyan VINES, 169

Basic input/output system (BIOS), 5, 101

access information, 273

activation, 271

passwords, 101, 151, 274

Beltway Snipers, 341

Berkley Internet Domain (BIND), 138

BIND, see Berkley Internet Domain

BIOS, see Basic input/output system

Bivens v. Six Unknown Federal Narcotics Agents, 342-343

Black-hat system attacking, 172

BlackWidow, 503

Blakey v. Continental Airlines, Inc., 394

Boot

disk, 282, 283

utilities, 283

Bourke v. Nissan Motor Corp., 394

Broadcast domains, 250

Browsing, suspicious, 487

Brutus, 200

Buffer overflows, 137

Business

plan, 37

recovery, 35, 37

Busting root, 212

BWINET, 211


 < Day Day Up > 

Категории