Index_P


P

packet sniffers, 402 “405
packet-inspecting/filtering gateways, 10, 40 “41
partners , as user type, 25
passwords
avoiding common, 121 “122
changing defaults on WAPs, 250 “252
password policy, 33
VTP, 380
patches/updates, 445 “473
applications, 472
change control patch policy, 450 “451
keeping current with, 448 “449
maintenance and support agreements, 449 “450
overview, 445 “447
planning patch response, 453
procedures, 451 “452
system configuration. See system configuration
system image. See system image
when to use, 447 “448
pattern matching detection, 77
PEAP (Protected EAP), 266 “267
penetration testing, 399, 424
perceptions/expectations
management. See management perceptions/expectations
overview, 478 “479
users. See user perceptions/expectations
performance management, 333 “335
permissions, 50
physical security, 29, 273
PKI (Public Key Infrastructure) Administrator, 507
PocketPC, 252
Point-to-Point Tunneling Protocol (PPTP), 108 “110, 122
policies. See also security policy
acceptable-use, 35, 207, 392
analog/ISDN, 30
antivirus, 30
change control, 450 “451
enterprise monitoring, 34
extranet, 31 “32
function of, 22
IDS/IPS, 34
incident response, 525 “527
Internet content filtering, 34
password, 33
remote access, 33
risk analysis, 31
routers and switches, 33
VPN, 32
wireless communication, 32
wireless security, 242
polling
products, 314
with WhatsUp Gold, 314 “320
port mirroring, 86, 213
port scanning, 401, 406 “410
port security, 201 “202
port-based authentication. See 802.1x port-based authentication
ports, disabling unused, 380
PPTP (Point-to-Point Tunneling Protocol), 108 “110, 122
prevention, security policies, 395 “396
private VLANs. See PVLANs (private VLANs)
privileged internal user, 25
procedures, 22
Protected EAP (PEAP), 266 “267
Proxy ARP, 169
Public Key Infrastructure (PKI) Administrator, 507
public relations, 521
publications . See resources ( vendors , publications, and web sites)
PureSecure
alerts, 98 “99
hardening, 78 “81
logs, 95 “96
tuning sensors, 88 “90
purpose section, of security policy, 26
PVLANs (private VLANs)
configuring, 195 “196
enforcing trust models among hosts , 374 “375
isolating traffic devices, 380



Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
Hardening Network Infrastructure. Bulletproof Your Systems Before You Are Hacked.
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 125

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net