Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

# command (Telnet)/etc/inetd.conf files (Unix)     editing

/etc/xinetd.conf files (Unix)

     editing 802.11 networks

     AP         FakeAP         hardening, disabling bridges         hardening, disabling SSID broadcasts 2nd 3rd 4th

         hardening, disabling Web management         hardening, locking MAC addresses 2nd 3rd         hardening, locking wired management 2nd

         hardening, passwords

         hardening, updating firmware

         segmenting

         VLAN 2nd         warchalking

         wardriving

    defense in depth strategies         host defenses

         VPN/IPSec     designing

         auditing network controls         auditing signal leakage 2nd

         case studies 2nd 3rd 4th 5th

         network separation

         network separation, AP segmentation

         network separation, Layer 3 access controls 2nd 3rd

         network separation, VLAN 2nd

         network separation, wireless DMZ 2nd

         signal leakage

         WDoS defense 2nd

     infrstructure mode

    types of

         802.11a

         802.11b

         802.11g

     wireless encryption         auditing 2nd 3rd

         EAP-TLS 2nd 3rd         implementing 2nd         LEAP 2nd 3rd 4th

         PEAP 2nd 3rd

         TinyPEAP

         WEP 2nd

         WPA protocol 2nd

         WPA protocol, dictionary attacks 2nd 802.11a networks 802.11b networks 802.11g networks

Категории