S


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SafeDllSearchMode 2nd 3rd 4th
sahres
        built-in 2nd
salting
SAM (security accounts manager)
SBS (Small Business Server)
scanners
        patches
        vulnerability
scanning
        patches
scans
        SYN
SCE (Security Configuration Editor) 2nd 3rd 4th
SCM (Services Control Manager)
screened subnets
scripting
        XSS (cross-site scripting)
scripts
        cross-site scripting 2nd
        PUBLIC persmissions 2nd
SCW (Security Configuration Wizard)
SeBCAK (security between chair and keyboard)
secedit.exe tool
second-level zombies
secrets
        LSA 2nd 3rd
SecurID
security
        10 immutable laws of 2nd 3rd 4th 5th 6th 7th
       applications
                baselining systems 2nd 3rd 4th
                evaluating
                reviewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th
        awareness 2nd
        bulletins
                registering for
       client tweaks
                anonymous restrictions
                blank passwords
                enabling auditing 2nd
                LAN Manager authentication
                liniting malicious code 2nd
                password policies
                removable media
                SafeDllSearchMode 2nd 3rd 4th
                SMB message signing
       configuration
                false information about guides 2nd 3rd 4th 5th 6th 7th
                tools 2nd 3rd 4th
       databases
                troubleshooting 2nd
       dependencies [See dependencies]
       descriptors
                ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th
        EFS 2nd
       firewalls
                configuring for small businesses 2nd
       for small businesses [See computers;small businesses]
       groups
                reviewing
       guides
                applying
                necessity of
        high 2nd
        HTML e-mail 2nd
       information security [See information security]
       management
                administrator responsibilities
                receiving feedback 2nd 3rd 4th 5th
                usability 2nd
                vendor design tradeoffs 2nd 3rd 4th 5th 6th
        MBSA (Microsoft Baseline Security Analyzer)
        objectives
        passgen tool
        passwords 2nd
                applying 2nd 3rd 4th 5th 6th 7th 8th 9th
                attacks 2nd 3rd 4th 5th 6th 7th
                best practices 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
                management 2nd 3rd 4th 5th 6th 7th 8th 9th
                multifactor authenticaiton 2nd
                overview of 2nd 3rd
                policies
       patches [See patches]
        penetration tests
       physical [See physical security]
                security tweaks 2nd
        policies [See also policies]
                analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th
                creating awareness of 2nd
                developing
                enforcing 2nd
                failure of
                identifying threats
                modifying
                necessity of
                structure of 2nd
        process
        service accounts 2nd 3rd 4th 5th
        stored procedures 2nd 3rd
        tweaks
                anonymous restrictions 2nd 3rd 4th
                audit settings 2nd
                avoiding 2nd
                defense in depth model 2nd
                IPsec filters
                LAN Manager authentication 2nd
                LM hash value storage 2nd
                necessity of 2nd
                number of settings 2nd
                password policies 2nd
                physical security 2nd
                restricted groups 2nd
                restricting access
                SMB message signing 2nd
                SRPs (software restriction policies) 2nd
                stopping worms/viruses
                TCP hardening 2nd
       updates
                testing 2nd 3rd
                tools 2nd 3rd
       users
                exploits against 2nd
                involvement vs. influence 2nd
                protecting 2nd 3rd 4th 5th 6th 7th 8th
                social engineering 2nd 3rd 4th 5th 6th 7th
                value of passwords 2nd
                vulernabilities 2nd
        VPN clients
        WLANs (wireless LANs) 2nd
security accounts manager (SAM)
security administration 2nd
security administrators
security associations
security between chair and keyboard (SeBCAK)
Security Configuration Editor [See SCE]
Security Configuration Wizard [See SCW]
Security Guidance Center
security identifier (SID)
SeDebugPrivilege
segmentation
        network threat modeling processes 2nd 3rd
selection
        of access controls (physical security) 2nd 3rd
        of firewalls 2nd 3rd 4th 5th 6th
        of passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
        of patch management solutions
senior management [See also management]
        security policies
servers
        applications
                analyzing 2nd
                ASR (attack surface reduction) 2nd 3rd 4th 5th 6th 7th
                removing service privileges 2nd 3rd
       back-end
                structure of
        enforcement
        Exchange Server Best Practices Analyzer Tool
       for small businesses
                protecting 2nd
                storing client information on 2nd 3rd
        IPsec protecting 2nd
        ISA (Internet Security and Acceleration) Server
        privileges
       proxy
                dependencies
        SBS (Small Business Server)
       SQL Server
                customizing authentication 2nd
                dropping stored procedures 2nd 3rd
                hardening 2nd
                IIS (Internet Information Services)
                securing service accounts 2nd 3rd 4th 5th
       VPN
                placement of
       Windows Server 2003
                VPN quarantine 2nd
serves
       DNS
                lookup requests
service level agreement (SLA)
        troubleshooting
Service Pack 1
Service Pack 2
service packs 2nd
        Windows XP Service Pack 2
services
        accounts
                dependencies 2nd
                securing 2nd 3rd 4th 5th
        ACS (Audit Collection Services)
       administrative security dependencies
                mitigating 2nd 3rd 4th 5th 6th 7th
        Alerter
        ASR (attack surface reduction)
                blocking unnecessay interfaces 2nd
                disabling unnecessay features
                uninstalling unnecessary components 2nd 3rd
        Messenger
        MSN Bill Payer
       privileges
                removing 2nd 3rd
       Web-based
                protecting
Services Control Manager (SCM)
sessions
        null 2nd 3rd 4th 5th 6th
showaccs.exe tool
SID (security identifier)
SLA (service level agreement)
        troubleshooting
slipstreaming 2nd 3rd 4th 5th 6th 7th
small business
       computers
                applying anti-spyware/antivirus software 2nd
                configuring firewalls 2nd
                controlling automatic updating
                protecting 2nd 3rd 4th
                updating software 2nd
        data protection 2nd
       networks
                securing WLANs (wireless LANs) 2nd
                selecting passwords 2nd
       servers
                protecting 2nd
                storing client information on 2nd 3rd
       Web sites
                navigating safely 2nd
Small Business Server (SBS)
smart cards
SMB
        message signing 2nd
        reflection attacks
SMB message signing
SMB Message Signing switches, enabling
Smith, Ben
SMS (Microsoft Systems Management Server)
sniffers
        packets
sniffing 2nd
social engineering 2nd 3rd 4th 5th 6th 7th
SOCKS 2nd
software
        firewalls 2nd
       for small businesses
                applying anti-spyware/antivirus software 2nd
                configuring firewalls 2nd
                controlling automatic updating
                updating 2nd
software restriction policies [See SRPs]
       malicious code
                limiting
software restriction policies (SRPs)
source code
        release of Microsoft
spoofing
        preventing 2nd
spyware
       anti-spyware software
                applying 2nd
        blocking
SQL
        injection 2nd 3rd 4th 5th 6th
        input validations 2nd 3rd
SQL (Structured Query Language)
        injection
SQL Security.com (http://www.sqlsecurity.com)
SQL Server
        hardening 2nd
                customizing authentication 2nd
                dropping stored procedures 2nd 3rd
                securing service accounts 2nd 3rd 4th 5th
        IIS (Internet Information Services)
SRPs (software restriction policies) 2nd
SRPS (software restriction policies)
SSCP (system sensitivity classification policy)
SSL
        transactions
stacks
        networks
        RRAS
        with ISA Servers installed
starting
        service accounts
startup keys, enabling 2nd
storage
        client information on servers 2nd 3rd
        passwords 2nd 3rd 4th 5th 6th 7th 8th
stored procedures
        dropping 2nd 3rd
strengthening passwords
STRIDE
structure
        of security policies 2nd
structure of applications and back-end servers
substitution (of passwords)
supplicants
supportability
SYN scans
SYSKEY
system administration 2nd
system sensitivity classification policy (SSCP)
systems
        analyzing existing
        baselining 2nd 3rd 4th
        hiding
        LM hash value storage 2nd
        quarantine 2nd 3rd 4th 5th
        rights management 2nd 3rd 4th



Protect Your Windows Network From Perimeter to Data
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net