T
tampering, STRIDE model, 71
targets, security threats, 63 “64
Task feature, OWA, 352 “53
technical access controls, 6
telephone lines, legal issues, 451 “52
temperature, environmental security, 78
templates
applying, 120 “21
obtaining, 119 “20
Outlook security form, 304 “8
with predefined policies, 121 “23
ten immutable laws
for administrators ( see security laws, for administrators)
for end-users ( see security laws, for end users)
terminology, security. See security vocabulary
testing
block lists, 166 “67
relay, 162 “63
third-party antispam products
costs, 178
evaluating, 179
overview of, 177
threats, 63 “67. See also risk assessment
additional reading, 74
attack vs. defense, 64 “65
classifying, 65 “67
defined, 61
operational security, 76 “77, 84
physical security, 76 “77
risk assessment and, 68 “69
targets, 63 “64
TLS (Transport Layer Security)
failed negotiations, 225
forcing all traffic with, 223 “24
for inbound mail, 224 “25
overview of, 30 “31, 216
problems with mail through SMTP server, 157
requesting SSL certificate, 216 “23
for specific domains, 224
tokens, Windows logon, 50
toolbar, Outlook, 319 “20
Transport Layer Security. See TLS (Transport Layer Security)
Triple-DES algorithm, 18, 300
Trojan horses, 12 “13, 205 “6
trust, confidentiality and, 9
Trusted Code, Outlook, 303, 308
trusted third parties (TTPs), 250
trusts
building, 287 “88
cross-certification and, 263 “64
TTPs (trusted third parties), 250
tunneling. See RPCs (remote procedure calls) over HTTPS
turfdir (message filtering directory), 173