Flylib.com
List of Scenarios
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Analyzing Security Policies, Procedures, and Requirements
Design Scenario: Analyzing Security Risks
Real World Scenario: Adjusting Security Policies to Comply with Government Regulations
Real World Scenario: Pencils and Server Room Doors
Design Scenario: Analyzing Security Policies and Procedures
Design Scenario: Analyzing the Requirements for Securing Data
Real World Scenario: Exchange 2000 and Active Directory Distribution List
Design Scenario: Technical Constraints when Designing Security
Chapter 2: Identifying and Designing for Potential Security Threats
Design Scenario: Predicting Internal Threats to Your Network
Design Scenario: Predicting External Threats to Your Network
Real World Scenario: A Incident Response Procedure Will Prevent Mistakes
Design Scenario: Designing a Response to an Incident
Real World Scenario: Recovering Services by Making Hard Decisions
Real World Scenario: The Importance of Perimeter Security
Design Scenario: Segmenting Networks for Security
Chapter 3: Designing Network Infrastructure Security
Design Scenario: Designing for SSL on a Windows Server 2003 Network
Design Scenario: Designing for PPTP on a Windows Server 2003 Network
Real World Scenario: A W32.Slammer Worm Attack Prevented Because of Filters
Design Scenario: Designing for Filtering
Design Scenario: Choosing an Authentication Strategy
Design Scenario: Designing a VPN Solution
Design Scenario: Designing a Demand-Dial Solution for a Branch Office
Design Scenario: Designing a Connection Strategy with an External Organization
Design Scenario: Designing Wireless Security
Chapter 4: Designing an Authentication Strategy for Active Directory
Real World Scenario: Cleartext Passwords Across a Network.
Real World Scenario: Stored Credentials Are Easy to Exploit
Design Scenario: Evaluating Windows Authentication Methods
Design Scenario: Designing Client Authentication
Design Scenario: Designing Trust Models
Design Scenario: Analyzing Accounts
Design Scenario: Analyzing Account Risks by Cost Analysis
Design Scenario: Analyzing and Securing Accounts with Account Policies
Chapter 5: Designing an Access Control Strategy for Network Resources
Real World Scenario: Avoiding Deny Permissions
Design Scenario: Designing an Access Control Strategy for Active Directory Objects
Real World Scenario: Taking Advantage of Universal Groups
Design Scenario: Planning an Appropriate Group Strategy
Design Scenario: Delegating Permissions
Design Scenario: Designing an Access Control Strategy for Files and Folders
Real World Scenario: Preventing Internal Attacks through Auditing
Design Scenario: Designing an Audit Policy
Chapter 6: Designing a Public Key Infrastructure with Certificate Services
Design Scenario: Choosing Where to Host Certificates
Design Scenario: Choosing a CA Hierarchy
Real World Scenario: Establishing a Cross-Certificate Trust
Design Scenario: Designing an Enrollment and Distribution Strategy
Design Scenario: Designing a Renewing and Revocation Strategy
Design Scenario: Designing Security for a CA
Chapter 7: Designing Security for Internet Information Services
Design Scenario: Designing a Baseline Based on Business Requirements
Real World Scenario: Code Red Worm
Design Scenario: Designing for Minimum Services with IIS
Design Scenario: Designing an Authentication Strategy with IIS Authentication
Design Scenario: Designing an Authentication Strategy with Forms-Based Authentication
Design Scenario: Designing an Authentication Strategy with Certificate Authentication
Design Scenario: Designing an Authentication Strategy with RADIUS
Design Scenario: Designing a Monitoring and Auditing Strategy for IIS
Design Scenario: Designing a Content Update Strategy
Chapter 8: Designing Security for Servers with Specific Roles
Design Scenario: Determining the Security Environment
Design Scenario: Defining Custom Templates for Servers with Specific Roles
Real World Scenario: Preventing Attacks by Securing DNS Updates
Design Scenario: Securing the DNS Infrastructure
Chapter 9: Designing an Infrastructure for Updating Computers
Design Scenario: Designing an OU Model
Design Scenario: Designing Software Restriction Policies
Design Scenario: Using Groups to Restrict Access to the Operating System
Design Scenario: Selecting the Appropriate Template Setting
Design Scenario: Designing a Patch Management Solution
Design Scenario: Auditing Your Security Patch Solution
Chapter 10: Designing Secure Network Management Infrastructure
Design Scenario: Evaluating Remote Management Needs
Real World Scenario: Designing for Remote Access
Design Scenario: Evaluating Remote Management Security Needs
Design Scenario: Risks of Managing Networks
Real World Scenario: Using MMC to Manage Windows Server 2003
Real World Scenario: Designing for Secure Server Management with MMC
Real World Scenario: Using Remote Desktop for Administration
Design Scenario: Designing for Secure Server Management with Remote Desktop for Administration
Real World Scenario: Using Remote Assistance to Support Users
Design Scenario: Designing for Secure Remote Assistance
Real World Scenario: Using EMS to Manage Servers
Design Scenario: Designing for Emergency Management Services
< Day Day Up >
Previous page
Table of content
Next page
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168
Authors:
Brian Reisman
,
Mitch Ruebush
,
Sybex
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Shared Memory Operations
Summary
Sockets: The Connection-Oriented Paradigm
Key Terms and Concepts
C.4. Some RPC Examples
Qshell for iSeries
The Exit Status and Decision-Making
Input and Output
Functions
Path-Name Expansion
The Perl Utility
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cisco IP Telephony Users
Configuring Cisco Unified CallManager Attendant Console
Dropping Conference Calls
Symmetric Encryption
Programming Microsoft ASP.NET 3.5
Web Forms Internals
Working with the Page
ASP.NET Iterative Controls
ASP.NET Security
Extending Existing ASP.NET Controls
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Getting Visio and Diagram Help
Key Points
Creating Timelines to View Projects at a Glance
Creating Organization Charts
Creating Network Reports
FileMaker 8 Functions and Scripts Desk Reference
Date()
Evaluate()
Get(ScreenWidth)
ScriptIDs()
Project Management, Programming, and Software Development
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies