D


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

damage from attacks (types of) 2nd 3rd
data destruction attacks 2nd
Data Encryption Standard (DESX)
data flow diagrams (DFDs) 2nd 3rd
data modification attacks 2nd
data protection for small businesses 2nd
Data Source Name (DSN)
data-protection mechanisms 2nd
        ACLs (access control lists)
                best practices 2nd 3rd 4th
                layers 2nd
                security descriptors 2nd 3rd 4th 5th 6th 7th
       applications
                incorporating into 2nd
        rights managemet systems 2nd 3rd 4th
       security groups
                reviewing
databases
       security
                troubleshooting 2nd
        troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
DC (domain controller)
DDoS (distributed denial-of-service) attacks
debugging
        LSA
defens ein depth models
        security tweaks 2nd
defense- in-depth model 2nd 3rd
demilitarized zone (DMZ)
denial of service [See attacks;DoS]
denial-of-service (DoS) attacks
       availability
                protecting
dependencies
        administrative security 2nd 3rd 4th 5th
                mitigating services 2nd 3rd 4th 5th 6th 7th
        overview of 2nd 3rd
        service accounts 2nd
        types of 2nd 3rd 4th
        UNIX 2nd
deperimeterization 2nd 3rd
descriptors
       security
                ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th
design
        defense-depth model 2nd 3rd
        network threat modeling processes 2nd
                access restriction 2nd 3rd 4th 5th
                documentation 2nd 3rd 4th 5th 6th 7th
                segmentation 2nd 3rd
       tradeoffs
                vendors 2nd 3rd 4th 5th 6th
desktops
        family (physical security)
        protecting (physical security) 2nd 3rd 4th
       small businesses
                applying anti-spyware/antivirus software 2nd
                configuring firewalls 2nd
                controlling automatic updating
                protecting 2nd 3rd 4th
                updating software 2nd
DESX (Data Encryption Standard)
detecting
        attacks
deterministic passwords
development
        security policies
                analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th
                creating awareness of 2nd
                enforcing 2nd
                failure of
                identifying threats
                modifying
                necessity of
                structure of 2nd
DFDs (data flow diagrams) 2nd 3rd
dialog boxes
        Manage Add-ons
digital certificates
        IPsec
digrams (DFDs (data flow diagrams) 2nd 3rd
direct tap policy (DTP)
disabling
        cached credentials
        LM hash value storage 2nd
        LM hashes 2nd
        unnecessay features
        USB drives
DiscoverHosts
        executing
distributed denial-of-service (DDoS) attack
Distributed Management Objects (DMO)
distribution
        password length
DMO (Distributed Management Objects)
DMZ (demilitarized zone)
DNS (Domain Name Server)
        lookup requests
Do Not Duplicate markings
doamins
        Microsoft
Document Tracking and Administration (DTA)
documentaiton
        passwords
documentation
        network threat modeling processes 2nd 3rd 4th 5th 6th 7th
documents
       security policies
                analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th
                creating awareness of 2nd
                developing
                enforcing 2nd
                failure of
                identifying threats
                modifying
                necessity of
                structure of 2nd
domain controller (DC)
domain controllers
        operations of
domain local groups
Domain Name Server (DNS)
        lookup requests
domains
        cached credentials 2nd
                attacks
                protecting 2nd
       isolation
                applying IPsec 2nd
        LM hash value storage 2nd
        taking over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
doors
        locking
DoS (denial of service) attacks 2nd
DoS (denial-of-service) attacks
       availability
                protecting
downtime
        preventing
DPAPI (Windows Data Protection API)
drives
       USB (universal serial bus)
                disabling
dropping stored procedures 2nd 3rd
DSN (Data Source Name)
DTA (Document Tracking and Administration)
DTP (direct tap policy)
dumpinfo



Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net