N


naming conventions, 125-126

NAT (network address translation), 117

National Security Agency Infosec Assessment Methodology (NSA IAM), 323-325

concepts, 323

on-site activities phase, 324-325

overview, 323

post-assessment phase, 325

pre-assessment phase, 324

National Vulnerability Database (NVD), 119

NDAs (nondisclosure agreements), 74

neighborhood, where data centers located, 88

Nessus plugin, 201, 217

Nessus Scanner, 161

NetMeeting Remote Desktop Sharing, 145 .netrc files, 194-195

Netsh tool, 139

Netstat utility, 139, 144

netstumbler, 272

network

connectivity, 86

encryption, 239-241

remote access into, 75

network address translation (NAT), 117

network auditing, 113-134

background, 113-114

firewalls, 116-117

additional firewall controls, 130-131, 134

application proxies, 117

application-level firewalls, 117

overview, 116-117

packet-filtering firewalls, 117

stateful packet inspection (SPI) firewalls, 117

general steps, 118-126, 132-133

knowledge base, 132

overview, 21, 113

routers, 116, 129-130, 133

switches, 114-116, 126-128, 133

tools and technologies, 131-132

Network File System (NFS), 193-194

network scanners, 160

network security and controls

Unix and Linux operating systems auditing

master checklist, 205

test steps, 188-195

Windows Server, 151-156

host-based vulnerability scanning, 155-156

intrusion detection, 154

intrusion prevention, 154

network vulnerability scanning, 154-155

overview, 151-154

Network Time Protocol (NTP), 124

network vulnerability scanning, 154-155, 189-190, 199

NFS (Network File System), 193-194

Nikto tool, 217

NIS, 171-172

NIS+, 171-172

Nitko, 221

*nix systems. See Unix and Linux operating systems

NMAP, 201

nondisclosure agreements (NDAs), 74

nonemployee logical access, 73-74

NSA IAM (National Security Agency Infosec Assessment Methodology), 323-325

concepts, 323

on-site activities phase, 324-325

overview, 323

post-assessment phase, 325

pre-assessment phase, 324

NTP (Network Time Protocol), 124

NVD (National Vulnerability Database), 119



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net