[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
SACL (System Access Control List)
sandboxing a directory on the local hard drive 2nd
SANS (Security Administration, Networking, and Security)
Scheduled Task Wizard
scheduled tasks
scripts 2nd 3rd 4th
Caspol tool 2nd 3rd 4th 5th
security policy administration 2nd 3rd 4th
secret key ciphers
secret key derivation 2nd 3rd 4th 5th 6th 7th 8th
sectionGroup element 2nd
secure code
definition
developer •s role 2nd 3rd 4th 5th 6th 7th 8th 9th
levels of trust 2nd 3rd 4th 5th 6th 7th 8th
Secure Hash Algorithm (SHA-1)
Secure Sockets Layer (SSL) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
IIS
secure Web sites
attacks 2nd 3rd 4th 5th 6th 7th 8th 9th
authentication 2nd 3rd
authorization 2nd 3rd 4th 5th 6th
channels 2nd 3rd 4th
designing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
firewalls
implementing 2nd 3rd 4th 5th 6th 7th 8th 9th
log files 2nd 3rd 4th
NetBIOS ports
protected modules 2nd 3rd
SecureOffice example
SSL
SecureOffice Web site
goals
hardware
user base
security
application designs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
ASP.NET
authentication for Web services 2nd 3rd 4th
Code Access Security 2nd 3rd 4th 5th 6th
forms authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
impersonation 2nd 3rd 4th
overview 2nd 3rd
passport authentication 2nd 3rd 4th
considerations
during deployment 2nd 3rd 4th 5th 6th 7th
during development 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
during execution 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
databases 2nd
Internet Explorer 2nd
mobile code
ActiveX controls 2nd 3rd 4th
downloaded executables 2nd 3rd
Java applets 2nd 3rd
scripts 2nd 3rd 4th
source code 2nd 3rd 4th
NET Framework
calling the security system
class libraries 2nd
code identity-based security checking 2nd 3rd 4th 5th
extending the security system
limitations 2nd 3rd 4th 5th 6th 7th
PrincipalPermission
registry access 2nd
SecurityPermission.ControlEvidence
structure;PrincipalPermission
operating systems
software
software vulnerabilities
buffer overflows 2nd 3rd 4th
canonicalization errors 2nd 3rd
denial-of-service attacks 2nd 3rd
information leaks 2nd 3rd
insecure default configurations 2nd
turning off 2nd
security actions 2nd 3rd 4th 5th 6th 7th
security administration
breaches in security 2nd
Configuration tool
creating a new policy level 2nd
exiting 2nd
installing
main security administrative options 2nd 3rd 4th 5th
MMC (Microsoft Management Console) requirements 2nd
obtaining
opening a policy level configuration file 2nd 3rd 4th
policy level features 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd
policy tree manipulation options 2nd 3rd
self protection mechanism 2nd 3rd 4th 5th 6th
starting 2nd 3rd 4th 5th
uses 2nd
crytography settings
administering 2nd 3rd 4th 5th 6th
Caspol
machine.config file 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
mappings 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
modifying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
testing changes 2nd 3rd 4th
uses
disallowing all assemblies from an Internet site on a machine 2nd
disallowing an assembly to do anything but execute 2nd
giving all assemblies file-read rights to a directory 2nd
granting all assemblies full trust on a machine 2nd
granting enterprise-wide full trust to an assembly 2nd
granting full trust to all assemblies of a software publisher 2nd 3rd
Isolated Storage
administering 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
deleting all stores of a user 2nd 3rd
deleting content 2nd 3rd 4th 5th
permissions 2nd 3rd 4th
properties 2nd
state 2nd
Storeadm.exe tool 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
uses
viewing all stores of a user 2nd 3rd 4th 5th
viewing content 2nd 3rd 4th
preventing all assemblies of a software publisher from running across an enterprise 2nd
preventing an assembly from running across an enterprise 2nd 3rd
reducing level of trust for all assemblies 2nd
sandboxing a directory on the local hard drive 2nd
strategies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
wizards
Adjust Security Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
Create Deployment Package Wizard
Deployment Package Wizard 2nd 3rd
Evaluate Assembly Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
New Code Group Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
Trust Assembly Wizard 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
security benefits of .NET Framework 2nd 3rd
security checks
IL Validation 2nd 3rd 4th 5th
IL Verification 2nd 3rd 4th 5th 6th 7th 8th 9th
metadata validation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
PE File Format Validation 2nd 3rd 4th 5th 6th 7th
unverifiable code 2nd
security choke points 2nd 3rd 4th 5th
security custom attributes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
security descriptors 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
security holes
inlining 2nd 3rd 4th 5th
security policy
backups
changing 2nd 3rd 4th 5th 6th 7th 8th 9th
changing programmatically
Caspol tool 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd 74th 75th 76th 77th 78th 79th 80th 81st 82nd 83rd 84th 85th
scenarios 2nd
security policy APIs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th
code groups 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd
corruption
default 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
default security policy 2nd 3rd 4th
deploying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
documenting changes to security policy 2nd
file locations 2nd 3rd
interaction with operation system settings 2nd
machine policies 2nd 3rd 4th
membership conditions 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
mobile code 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
permissions 2nd 3rd 4th
policy level features 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th 69th 70th 71st 72nd 73rd
policy levels 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
code group hierarchy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th
creating a new policy level 2nd
features 2nd 3rd 4th 5th 6th 7th 8th 9th
opening a policy level configuration file 2nd 3rd 4th
permission sets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd
policy assemblies 2nd 3rd 4th 5th 6th 7th 8th
undoing changes 2nd
policy resolution
purpose 2nd 3rd 4th
resetting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
setting
structure 2nd 3rd
testing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Trustworthy Computing initiative
user policies 2nd 3rd 4th 5th 6th
worst case scenarios 2nd
security policy APIs
classes
NamedPermissionSet class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
PolicyLevel class
SecurityManager class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
UnionCodeGroup class
programming 2nd
security policy administration 2nd 3rd
security policy model 2nd
security syntax
security vulnerabilities
buffer overflows 2nd 3rd 4th
canonicalization errors 2nd 3rd
denial-of-service attacks 2nd 3rd
information leaks 2nd 3rd
insecure default configurations 2nd
resources
CVE (Common Vulnerabilities and Exposures) Project
CERT (Computer Emergency Response Team)
SANS (System Administration, Networking, and Security)
SecurityFocus
SecurityFocus vulnerability database
security zones
evidence
mobile code 2nd
SecurityExceptions
semi-trusted applications
SecurityFocus
SecurityFocus vulnerability database
SecurityManager class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
SecurityPermission class 2nd 3rd
securityPolicy element 2nd 3rd 4th 5th 6th 7th 8th
semantic metadata validation
semi-trusted applications
class libraries 2nd 3rd 4th 5th 6th 7th 8th
code execution 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th
definition
networks 2nd
permissions 2nd 3rd 4th 5th 6th 7th 8th
sensitive data 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
ServiceControllerPermission class
services
access control 2nd
sessionState element 2nd 3rd 4th 5th 6th
SHA-1 (Secure Hash Algorithm)
shared assemblies 2nd 3rd 4th
side-by-side support
signatures
XML digital signatures
SignedXml class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th
SignedXml class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th
signing assemblies 2nd 3rd 4th 5th 6th 7th 8th 9th
Simple Object Access Protocol (SOAP)
XML
sinks 2nd 3rd
SiteIdentityPermission class
SN utility 2nd 3rd
snap-ins (MMC)
Configuration tool 2nd
SOAP
Web Services 2nd 3rd 4th
SOAP (Simple Object Access Protocol)
XML
SocketPermission class
software
security mechanisms
security problems
buffer overflows 2nd 3rd 4th
canonicalization errors 2nd 3rd
denial-of-service attacks 2nd 3rd
information leaks 2nd 3rd
insecure default configurations 2nd
Software Restriction Policies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
source code 2nd 3rd 4th
SQL server databases
authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
SqlClientPermission class
SSL
IIS
SSL (Secure Sockets Layer) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
stack walks
application performance
semi-trusted applications 2nd
stacks
data storage 2nd
frames 2nd
popping
process layouts 2nd
pushing
stack pointers 2nd
threads 2nd 3rd
uses 2nd 3rd
walking the stack 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st
standard permissions
starting
Caspol tool 2nd 3rd
Configuration tool 2nd 3rd 4th 5th
Wizards launcher
states (permission sets) 2nd 3rd
states (permissions) 2nd 3rd 4th
Storeadm tool 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
storing data
stacks 2nd
streams
cryptography 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
strong names
assemblies 2nd 3rd 4th 5th
building into assemblies 2nd 3rd 4th 5th 6th 7th 8th 9th
key pair generation 2nd 3rd 4th 5th 6th 7th 8th 9th
side-by-side support
signature invalidation 2nd 3rd 4th
StrongNameIdentityPermission class
structural metadata validation
subtags
Sun
Web address
switching off security 2nd
symmetric algorithms 2nd 3rd 4th 5th 6th
symmetric key encryption
SymmetricAlgorithm class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd
System Access Control List (SACL)
System.AppDomain class 2nd
System.Data.OleDb.OleDbPermission class
System.Data.SqlClient.SqlClientPermission class
System.Diagnostics.EventLogPermission class
System.Diagnostics.PerformanceCounterPermission class
System.Drawing.Printing.PrintingPermission class
System.Messaging.MessageQueuePermission class
System.Net.DnsPermission class
System.Net.SocketPermission class
System.Net.WebPermission class
System.Security namespace
System.Security.CodeAccessPermission class 2nd 3rd 4th
System.Security.Cryptography.Xml namespace 2nd 3rd 4th 5th 6th 7th 8th
System.Security.Crytography.Xml namespace 2nd 3rd 4th 5th 6th
System.Security.NamedPermissionSet class
System.Security.Permissions namespace 2nd 3rd 4th
System.Security.Permissions.EnvironmentPermission class
System.Security.Permissions.FileDialogPermission class
System.Security.Permissions.FileIOPermission class
System.Security.Permissions.IsolatedStorageFilePermission class
System.Security.Permissions.PrincipalPermission class
System.Security.Permissions.PublisherIdentityPermission class
System.Security.Permissions.ReflectionPermission class
System.Security.Permissions.RegistryPermission class
System.Security.Permissions.SecurityPermission class
System.Security.Permissions.SiteIdentityPermission class
System.Security.Permissions.StrongNameIdentityPermission class
System.Security.Permissions.UIPermission class
System.Security.Permissions.UrlIdentityPermission class
System.Security.Permissions.ZoneIdentityPermission class
System.Security.PermissionSet class
System.Security.Policy namespace
System.Security.Policy.CodeGroup class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
System.Security.Policy.Evidence class 2nd 3rd 4th 5th 6th
System.Security.Policy.MembershipCondition class 2nd 3rd 4th
System.Security.Policy.PolicyException class
System.Security.Policy.PolicyLevel class 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th
System.Security.SecurityElement class
System.ServiceProcess.ServiceControllerPermission class
system.web element 2nd 3rd 4th 5th 6th 7th