Network Perimeter Security: Building Defense In-Depth

W

Wardialing, 354

Web-based trust model, 175–176

Well-known port numbers, 102–103

Window field, 107–108

Window scale option, 110

Windows 2000 IIS 5.0, 194

Wired Equivalent Privacy (WEP), 341–343

Wireless network security, 60, 61–62, 64, 341–346

802.1x protocol, 345

encryption, 62

Port Authentication Protocol (PAP), 345–346

Wired Equivalent Privacy (WEP), 341–343

Workstation controls, 46

Worms, 138, 217

Категории