Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] encoding mechanisms encryption, role in layered defense endpoint agents, access control process access resource, identifying consulting the security policy determining system state 2nd gathering operation data taking action enforcing security policies EtherChannel event correlation event horizon events evolution of security threats client-server computing Internet mobile computing wireless connnectivity examples of attacks CIH virus Loveletter virus Morris worm Nimda worm replacement login SQL Slammer worm of effective defense-in-depth external attack against corporate database internal attacks against management servers exploits |