Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

UDP (     reflexive ACLUDP (Transmission Control Protocol)

    ports

         filteringUDP (User Datagram Protocol)

     server-side ports    state         tracking 2nd UDP encapsulation

UDP packet scans     network security assessments 2ndunattended user accounts

     deleting versus deactivating

     managing 2nd

unenforceable security policies 2nd

     backdoors 2nd     email 2nd 3rd

     Outlook (MS) 2nd

     rule sets, writing     sneaker net

     TCP Port 80     VLVHLP

     writing 2ndUnicast Reverse Path Forwarding (RFP)

     router hardening

unified perimeter security architectures, developing

    design elements

         firewalls 2nd

         firewalls, access control 2nd

         firewalls, bsaic filtering 2nd

         firewalls, inline 2nd

         firewalls, ISP controlled routers 2nd

         firewalls, parallel 2nd 3rd

         firewalls, VPN interaction 2nd 3rd 4th 5th 6th

         routers 2nd 3rd 4th

         routers, access control 2nd

         routers, basic filtering 2nd

         routers, ISP controlled 2nd         VPN, firewall interaction 2nd 3rd 4th 5th 6th

     determining attacker type, determined insiders 2nd     determining attacker type, determined outsiders 2nd 3rd     determining attacker type, script kiddies 2nd

     determining attacker type, worms 2nd 3rd

     determining business requirements, business-related services 2nd

     determining business requirements, cost 2nd 3rd

     determining business requirements, fault tolerance 2nd 3rd 4th 5th 6th 7th 8th 9th

     determining business requirements, performance 2nd 3rd 4th 5th 6th 7th    resource protection         bridges 2nd 3rd         copiers

         IP-based telephony systems

         modems 2nd         PBX systems

         printers         routers 2nd 3rd         servers 2nd         switches 2nd 3rd

         voice mail systems         workstations 2nd UnityOne IPS (TippingPoint) 2nd

Unix

    /etc/inetd.conf files

         editing

    /etc/xinetd.conf files         editing

UNIX

    btmp files         auditing security logs

     Crack password-cracking software 2nd     file permissions, restricting 2nd

     fping network scanner     group account memberships, controlling

     Lion worm

     network log analysis

Unix

    NFS (Network File System) services

         deactivating daemons 2nd

         RPC services

UNIX

     NSS

     pinger network scanner

    r-commands

         deactivating

         SSH

         Telnet

    root accounts         host hardening 2nd

    Root accounts         renaming    route command

         displaying host routing tables

    security logs

         auditing 2nd 3rd

     software, removing

         pkg program         rpm utility    Syslog facility         auditing security logs

     TCP Wrappers 2nd

    Traceroute         network security assessments 2nd

    troubleshooting tools         Dig         hping utility 2nd 3rd 4th         ifconfig utility 2nd

         ldd utility         strings utility         versus Windows tools

     trust relationships

    user accounts

         deactivating 2nd

    utmp files         auditing security logs

    wtmp files

         auditing security logs unknown vulnerabilities, defining 2nd

unsecurable applications, handling 2nd unwritten policies (corporate culture)

updates     AP firmware

     IOS

updating

     host defense components

     security policies

    signatures

         antivirus software

URL

     proxy firewalls

user accounts

    deactivating

         UNIX 2nd

     deleting versus deactivating

    group accounts

         controlling memberships 2nd     passwords 2nd 3rd 4th

    unattended accounts         managing 2nduser awareness

     defense in depth architecture, role in

user command (SSH)

     router hardening

user interface components (multitier applications) 2nd

users    remote         null sessions 2nd    remote users

         deactivating r-commands (UNIX)

         deactivating Remote Desktop service (Windows)         deactivating Remote Registry Service (Windows)

         deactivating Server service (Windows)         deactivating Terminal Services (Windows)utmp files (UNIX)     security logs, auditing

Категории