|
|
vampire taps, 143–144, 144
vendor support of security policies, 420–423
code escrow, 422–423, 505
overview, 421
service level agreements, 421–422
virtual links, 533
Virtual Local Area Networks (VLANs), 28, 28, 533
viruses, 76–83
armored, 82, 502
companion, 82
defined, 11, 76–77, 533
helping users recover from, 190–191
hoaxes, 83, 131, 511
how they work, 78, 78, 79
macro, 82–83
multipartite, 81, 81, 517
phage, 82, 521
polymorphic, 79–80, 521
retrovirus, 81, 524
scanning e-mail for, 237
stealth, 80, 81
symptoms of, 77–78
transmission in networks, 83
Trojan horse, 80, 83–84, 532
VLANs (Virtual Local Area Networks), 28, 28, 533
volume, 533
VPNs (virtual private networks)
about, 117, 117
connections for remote access with, 124
defined, 533
vulnerabilities
of coax, 143, 143–144, 144
FTP sniffing, 138
ICMP, 140
of instant messaging, 197, 198–199
NetMeeting, 132
removable media, 151–154
servers, 245
in software and systems, 35–36
of web Internet connections, 133–136
ActiveX, 135
buffer overflows, 135
CGI, 136, 505
cookies, 135–136, 505
Java applets, 134
JavaScript, 134
signed applets, 134–135
SMTP relay, 136–137
wireless systems, 195–196
|
|