|
|
W3C (World Wide Web Consortium), 361–362, 534
WAN framing, 110
WANs (Wide Area Networks), 533
WAP (Wireless Applications Protocol)
about, 194–195, 195
gap in the, 195
security protocols for, 121–122
warm sites, 419, 533
water-based fire suppression system, 275
weak key attacks, 345, 533
weak keys, 533
web Internet connections, 131–137
HTML and, 131–132
secure, 133
vulnerabilities of, 133–136
ActiveX, 135
buffer overflows, 135
CGI, 136, 505
cookies, 135–136, 505
Java applets, 134
JavaScript, 134
signed applets, 134–135
SMTP relay, 136–137
web proxy, 533
web servers, 236, 533
websites on security issues, 479–480
WEP (Wired Equivalent Privacy), 195, 372, 534
WiFi (Wireless Fidelity), 534
Windows 9x systems, 221
Windows 2000, 223–224, 224
Windows and .NET Magazine, 481
Windows Internet Naming Service (WINS), 172, 172, 533
Windows .NET Server 2003, 225
Windows NT 4 Service Pack, 231, 533
Windows NT 4 systems, 222–223
Windows Socket API interface, 67, 67, 534
Windows XP, 224–225
WinNuke, 534
WINS (Windows Internet Naming Service), 172, 172, 533
Wired Equivalent Privacy (WEP), 195, 372, 534
wireless access points, 112–113, 113, 534
Wireless Applications Protocol. See WAP
wireless bridges, 534
wireless cells
securing wireless devices, 269
security considerations for, 268–269
Wireless Ethernet protocol, 112
Wireless Fidelity (WiFi), 534
Wireless Local Area Network (WLAN), 534
Wireless Markup Language (WML), 194
wireless portal, 534
wireless systems, 192–196
IEEE 802.1x wireless protocols, 112, 124, 193–194, 500, 512
overview, 192
security of connections, 113
vulnerabilities of, 195–196
WAP, 194–195, 195
WEP, 195, 372
wireless access points, 112–113, 113, 534
wireless bridges, 534
wireless cells
securing wireless devices, 269
security considerations for, 268–269
wireless portal, 534
WTLS for, 192, 192, 372
wireless technologies, 106, 534
Wireless Transport Layer Security (WTLS), 192, 192, 372, 534
WLAN (Wireless Local Area Network), 534
WML (Wireless Markup Language), 194
WMLScript, 194
work factor, 325, 534
workgroups, 534
working copy, 534
working copy backups, 408
workstations
defined, 534
file sharing via FTP, 138
preventing unauthorized software installation, 120–121
thin clients for protecting, 153
vulnerability of, 120
World Wide Web Consortium (W3C), 361–362, 534
worms, 85, 534
WTLS (Wireless Transport Layer Security), 192, 192, 372, 534
|
|