Index_T


T

takedown notices, 455
tampering, STRIDE model, 71
targets, security threats, 63 “64
Task feature, OWA, 352 “53
technical access controls, 6
telephone lines, legal issues, 451 “52
temperature, environmental security, 78
templates
applying, 120 “21
obtaining, 119 “20
Outlook security form, 304 “8
with predefined policies, 121 “23
ten immutable laws
for administrators ( see security laws, for administrators)
for end-users ( see security laws, for end users)
terminology, security. See security vocabulary
testing
block lists, 166 “67
relay, 162 “63
third-party antispam products
costs, 178
evaluating, 179
overview of, 177
threats, 63 “67. See also risk assessment
additional reading, 74
attack vs. defense, 64 “65
classifying, 65 “67
defined, 61
operational security, 76 “77, 84
physical security, 76 “77
risk assessment and, 68 “69
targets, 63 “64
timely access, 4
TLS (Transport Layer Security)
failed negotiations, 225
forcing all traffic with, 223 “24
for inbound mail, 224 “25
overview of, 30 “31, 216
problems with mail through SMTP server, 157
requesting SSL certificate, 216 “23
for specific domains, 224
tokens, Windows logon, 50
toolbar, Outlook, 319 “20
tracking logs, 193
trade secrets, 455
traffic analysis, 9 “10
Transport Layer Security. See TLS (Transport Layer Security)
transport mode, ESP, 33
Triple-DES algorithm, 18, 300
Trojan horses, 12 “13, 205 “6
trust, confidentiality and, 9
Trusted Code, Outlook, 303, 308
trusted third parties (TTPs), 250
trusts
building, 287 “88
cross-certification and, 263 “64
TTPs (trusted third parties), 250
tunnel mode, ESP, 33
tunneling. See RPCs (remote procedure calls) over HTTPS
turfdir (message filtering directory), 173
TURN, 160
Twofish algorithm, 19



Secure Messaging with Microsoft Exchange Server 2003
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net