E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

encoding mechanisms
encryption, role in layered defense
endpoint agents, access control process
     access resource, identifying
     consulting the security policy
     determining system state 2nd
     gathering operation data
     taking action
enforcing security policies
EtherChannel
event correlation
event horizon
events
evolution of security threats
     client-server computing
     Internet
     mobile computing
     wireless connnectivity
examples
    of attacks
         CIH virus
         Loveletter virus
         Morris worm
         Nimda worm
         replacement login
         SQL Slammer worm
     of effective defense-in-depth
         external attack against corporate database
         internal attacks against management servers
exploits




Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
ISBN: 1587052393
EAN: 2147483647
Year: N/A
Pages: 115

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net