Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

WAN     network performance 2ndWAP (wireless access points)

     data diffusion

warchalking     FakeAP

wardialing     Hackers Choice THC-Scan     ModemScan     network security assessments 2nd 3rd 4th

     SandStorm Enterprises PhoneSweep 2nd wardriving     FakeAP

     Kismet

     Netstumbler

     network security assessments 2nd 3rd

Washington University [See Linux;WU-FTPD] WDoS (Wireless Denial of Service) 2nd

weakness identification (IDS)

     security auditing     security policy violations 2nd

Weaknesses in the Key Scheduling Algorithm of RC4 [ITAL] 2ndWeb cache servers

     Squid Web Cache Proxy software Web caches [See also proxy servers]

     freshness

Web management

     disabling

Web proxies

     logging

     Web browsing

Web servers

     attacks on 2nd 3rd

    public

         external;adversarial reviews, determining attacker access 2nd 3rd

         HP Virtual Vault, adversarial reviews 2nd 3rd 4th 5th

         HP Virtual Vault, mkacct command

    public Web

         adversarial reviews, determining impact of misconfigurations/vulnerabilities 2nd     PUT attacks 2nd

Web services 2nd 3rdwebsites     executable packers

     packers

     workstation firewalls

WEP (Wired Equivalent Privacy) 2nd

WEP Wedgie

     wireless encryption, auditingWEPCrack     wireless encryption, auditing 2nd wget

whois searches

wildcard masks 2nd 3rd 4thWill, Rita

     GIACE complex e-commerce site case study 2nd         DMZ 2nd 3rd 4th         internal networks 2nd         Internet 2nd 3rd

         proxy layers 2nd 3rd         security networks 2nd 3rd 4th Winalysis file integrity checker utility

Windows

    Add/Remove Programs applet

         removing programs

    Administrator accounts         host hardening 2nd

         renaming

         SID     Check Point FireWall-1 stateful firewalls 2nd 3rd 4th 5th 6th 7th

    Computer Management applet         creating/deletiung file shares

    Event Viewer         auditing security logs

    file shares

         creating/deleting

    Local Security Policy editor

         auditing security logs

         null sessions, limiting

    MAC addresses

         spoofing 2nd

    NetBIOS protocol

         disabling 2nd

    NTFS

         file permission restrictions

    Regedit utility

         restricting Registry permissions 2nd

    Regedit32 utility         restricting Registry permissions 2nd

    Registry         restricting permissions 2nd    Remote Desktop service

         deactivating

    Remote Registry Service

         deactivating

    security logs

         auditing 2nd    Server service         deactivating     SuperScan network scanner 2nd

    Terminal Services

         deactivating    tracert

         network security assessments 2nd    troubleshooting tools         BinText utility 2nd         ipconfig utility 2nd 3rd

         PacketCrafter (Komodia) 2nd         versus UNIX toolsWindows (MS)

     NNTP, vulnerabilities of 2nd

Windows 2000 (Microsoft)

     Secure Cache Against Pollution check box

Windows 2003 Server Enterprise Edition (Microsoft)     mail relays, configuring 2nd

Windows XP

    Filter Action Wizard         enforcing IPSec parameters 2nd 3rd

     IPSec VPN configuration examples 2nd 3rd 4th 5th 6th 7th 8th    Security Rule Wizard

         establishing IPSec parameters 2nd 3rd         opening

wired management

     locking 2nd

wireless DMZ 2nd

wireless encryption

     auditing 2nd 3rd

     EAP-TLS 2nd 3rd

     implementing 2nd

     LEAP 2nd

         dictionary attacks 2nd

     PEAP 2nd 3rd

         TinyPEAP

     WEP 2nd

     WPA protocol 2nd

         dictionary attacks 2nd wireless networks

     AP         FakeAP         hardening, disabling bridges

         hardening, disabling SSID broadcasts 2nd 3rd 4th

         hardening, disabling Web management

         hardening, locking MAD addresses 2nd 3rd

         hardening, locking wired management 2nd

         hardening, passwords         hardening, updating firmware         segmenting         VLAN 2nd

         warchalking

         wardriving    defense in depth strategies

         host defenses         VPN/IPSec     designing         auditing network controls

         auditing signal leakage 2nd         case studies 2nd 3rd 4th 5th         network separation

         network separation, AP segmentation

         network separation, Layer 3 access controls 2nd 3rd

         network separation, VLAN 2nd

         network separation, wireless DMZ 2nd         signal leakage

         WDoS defense 2nd

     infrastructure mode    types of

         802.11a         802.11b

         802.11g     wireless encryption

         auditing 2nd 3rd

         EAP-TLS 2nd 3rd

         implementing 2nd

         LEAP 2nd 3rd 4th

         PEAP 2nd 3rd

         TinyPEAP

         WEP 2nd

         WPA protocol 2nd

         WPA protocol, dictionary attacks 2nd

wireless systems

     resource separation 2nd 3rd

wizards

    Filter Action (Windows XP)

         enforcing IPSec parameters 2nd 3rd    Security Rule (Windows XP)

         establishing IPSec parameters 2nd 3rd         opening workstations

     firewalls

         configuring 2nd

         Norton Personal Firewalls 2nd 3rd

         versus server firewalls 2nd

         websites         ZoneAlarm Pro 2nd     IDS         categories of

         deploying 2nd

         file integrity checkers 2nd         file integrity checkers, AIDE

         file integrity checkers, Samhain         file integrity checkers, Tripwire         file integrity checkers, Tripwire Manager         file integrity checkers, Winalysis

         log file monitoring utilities, Logcheck 2nd         network connection monitoring utilities, BlackICE 2nd         network connection monitoring utilities, PortSentry 2nd

         versus network IDS 2nd

     maintaining 2nd

     MBSA

     secure perimeter design 2ndworms

     Beagle

    Code Red         SANS Institute exploit

     identifying     Lion

     NetSky     Nimda

         defense in depth case study 2nd

         signature of 2nd

     Qaz

     secure perimeter design 2nd 3rd

WPA (Wi-Fi Protected Access) protocol 2nd

     dictionary attacks 2nd

WPACrack

     wireless encryption, auditing

Wright, Joshua

     dictionary attacks 2nd

writing

    rule sets

         for unenforceable security policies

     security policies 2nd         determining corporate culture 2nd 3rd 4th 5th

         developing policy tone         unwritten policies     unenforceable security policies 2nd

written authorization of network security assessments

wtmp files (UNIX)

     security logs, auditing

WU-FTPD (Washington University File Transport Protocol Daemon)

Категории