H



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

hackers [See also adversarial reviews]
     attacks, approach to (network security design)
     discovery process (network security design)
Hackers Choice THC-Scan
     wardialing
hardening
    routers
         auditing via RAT 2nd
         auto securing 2nd
         Cisco TCP Keepalives services
         console ports 2nd
         disabling CDP
         disabling Finger services 2nd
         disabling PAD services
         disabling proxy-ARP 2nd
         disabling small services 2nd
         disabling source routing
         FTP
         ICMP blocking
         ICMP blocking, directed broadcasts
         ICMP blocking, redirects
         ICMP blocking, unreachables 2nd 3rd
         IOS updates
         NTP configuration/authentication 2nd 3rd
         RFP
         router logging 2nd 3rd 4th
         security advisories
         SNMP 2nd 3rd
         SNMP, authentication/passwords 2nd 3rd 4th
         SNMP, disabling servers 2nd
         spoofing attacks
         SSH 2nd 3rd
         Telnet 2nd 3rd
         TFTP 2nd
hardening (host)
     account passwords 2nd 3rd 4th
    administrative accounts, protecting
         UNIX root accounts 2nd
         Windows Administrator accounts 2nd
     application installation, guidelines for
     automating 2nd
     checklists 2nd
     costs of
     defining
    file permissions, restricting
         UNIX 2nd
         Windows
         Windows, NTFS
     group account memberships, controlling 2nd
     network services, controlling
         deactivating services
         deactivating services, remote access services 2nd 3rd 4th
         deactivating services, resource-sharing services 2nd
         deactivating SNMP 2nd
         disabling NetBIOS protocol 2nd
         editing Unix files
         listing ports 2nd
         null sessions 2nd
     patches, applying 2nd 3rd
     process overview
     reasons for 2nd
    Registry permissions, restricting
         Windows 2nd
    removing/disabling
         OS components
     SANS Top 20 Vulnerabilities list
     security logs
         auditing UNIX logs 2nd 3rd
         auditing Windows logs 2nd
     security versus functionality
    software, removing
         Add/Remove Programs applet (Windows)
         UNIX operating systems 2nd
     unattended user accounts, managing 2nd
hardening AP
     bridges, disabling
     firmware, updating
     MAC addresses, locking 2nd 3rd
     passwords
     SSID broadcasts, disabling 2nd 3rd 4th
     Web management, disabling
     wired management, locking 2nd
hardware accelerators
    accelerator cards
         performance bottlenecks
     network performance 2nd
hash algorithms
     defining
     MD5
     SHA-1
hashes
hiding
     network structures 2nd
HIDS (host-based intrusion detection systems)
     defining 2nd
HIPS (host-based intrusion prevention systems)
     advantages of
     application behavior, monitoring
     challenges of
     custom application dynamic rule creation 2nd
    deployment recommendations
         attacks 2nd
         document requirements/testing procedures
         role in defense-in-depth architectures
         software update installation
         update control policies
     false positives
     file integrity, monitoring
     OS shims
     real-world experience of
     system call interception
HogWash
HoneyNet Project
     incident handling
Honeynet project website
honeypots
     DTK 2nd
     Honeynet project website
hopping attacks (VLAN) 2nd
host attacks, detecting (IDS) 2nd
host command (SSH)
     router hardening
host defenses
     wireless networks
host hardening
     account passwords 2nd 3rd 4th
    administrative accounts, protecting
         UNIX root accounts 2nd
         Windows Administrator accounts 2nd
     application installation, guidelines for
     automating 2nd
     checklists 2nd
     costs of
     defining 2nd 3rd
    file permissions, restricting
         UNIX 2nd
         Windows
         Windows, NTFS
     group account memberships, controlling 2nd
     network services, controlling
         deactivating services
         deactivating services, remote access services 2nd 3rd 4th
         deactivating services, resource-sharing services 2nd
         deactivating SNMP 2nd
         disabling NetBIOS protocol 2nd
         editing Unix files
         listing ports 2nd
         null sessions 2nd
     patches, applying 2nd 3rd
     process overview
     reasons for 2nd
    Registry permissions, restricting
         Windows 2nd
    removing/disabling
         OS components
     SANS Top 20 Vulnerabilities list
     security logs
         auditing UNIX logs 2nd 3rd
         auditing Windows logs 2nd
     security versus functionality
    software, removing
         Add/Remove Programs applet (Windows)
         UNIX operating systems 2nd
     unattended user accounts, managing 2nd
host routing tables, displaying
host security logs
    auditing
         UNIX 2nd 3rd
         Windows 2nd
host-based firewalls
     IDS logs 2nd
host-based IDS (intrusion detection systems)
     file integrity checkers
     log analyzers
host-centric firewalls [See personal firewalls]
     internal network defense, role in 2nd 3rd
host-to-gateway IPSec architectures
     VPN
host-to-host IPSec architectures
     VPN
hosts
    compromised
         usage of defense components in
    defense components
         managing
         updating
     firewalls 2nd 3rd
         servers, IPSec packet-filtering 2nd
         servers, PF 2nd 3rd 4th
         servers, versus workstation firewalls 2nd
         workstations
         workstations, configuring 2nd
         workstations, Norton Personal Firewalls 2nd 3rd
         workstations, versus server firewalls 2nd
         workstations, websites
         workstations, ZoneAlarm Pro 2nd
     IDS 2nd 3rd
         deploying 2nd
         file integrity checkers 2nd
         file integrity checkers, AIDE
         file integrity checkers, Samhain
         file integrity checkers, Tripwire
         file integrity checkers, Tripwire Manager
         file integrity checkers, Winalysis
         log file monitoring utilities, Logcheck 2nd
         network connection monitoring utilities, BlackICE 2nd
         network connection monitoring utilities, PortSentry 2nd
         versus network IDS 2nd
    servers
         dedicating
         firewalls, IPSec packet-filtering 2nd
         firewalls, PF 2nd 3rd 4th
         firewalls, versus workstation firewalls 2nd
         multiuser
         sensitivity to attacks
     workstations
         firewalls
         firewalls, configuring 2nd
         firewalls, Norton Personal Firewalls 2nd 3rd
         firewalls, versus server firewalls 2nd
         firewalls, websites
         firewalls, ZoneAlarm Pro 2nd
         maintaining 2nd
         MBSA
Hosts/Networks screen (PDM)
HP OpenView system/network monitoring software 2nd
HP Virtual Vault Servers
    adversarial reviews
         determining attacker access 2nd 3rd
         determining impact of misconfigurations/vulnerabilities 2nd
     mkacct command
hping utility 2nd 3rd 4th
HTTP (Hypertext Transfer Protocol)
     interapplication communication
    state
         tracking 2nd
HTTP PUT attacks 2nd
HTTP tunneling 2nd
     IDS 2nd
HTTrack
Human Resources handbooks
     security policies, writing
hypothesis (troubleshooting process)
     forming 2nd
     testing
         analyzing results



Inside Network Perimeter Security
Inside Network Perimeter Security (2nd Edition)
ISBN: 0672327376
EAN: 2147483647
Year: 2005
Pages: 230

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net