|
|
packet sniffers, Ethereal, 703
PAP (Password Authentication Protocol), 530
parasitic viruses, 658
Password Authentication Protocol (PAP), 530
password compromise attacks, 323-324
password policies, importance of, 324
Password Policy node, analyzing, 66
passwords
Account Policies and (table), 33-35
age policies, 35
cracking in Windows 2000, 123
hashing, 530
IIS control, allowing, 508
and laptop security, 111
Windows 2000 and Kerberos authentication, 472
patches, 135, 153
pbainst.exe, 579
permissions
accessing encrypted files, 275
remote access, 562
RRAS administration, 591
troubleshooting update installations, 182
using groups to assign specific (fig.), 16
PGP. See Pretty Good Privacy (PGP)
phone books
dynamic, 579
static, 578
phones, cordless, 390
ping flood, 671
Ping-of-Death attacks, 326
PKCS-7, PKCS-10, PKCS-12 standards, 222
PKI described, 248
plaintext, authentication challenge (fig.), 205
planning
organizational updates, 154
security requirements, 372
Point-to-Point Protocol (PPP), 529-530
Point-to-Point Tunneling protocol (PPTP), 556-557
policies
configuring remote access, 562-563
creating security, 356-369
disaster recovery, 652
flexible negotiation, 353
remote access, 529, 563
POP2, POP3, attack vulnerabilities, 714
pornography, viewing at work, 674
portable computers, securing, 111-112
port numbers, 710-715
Port Properties screen (fig.), 542-543
ports
checking status, 544
configuring PPTP and L2TP for inbound access only, 559-561
L2TP, 558
RAS, working with, 541-544
VPN, working with, 556-559
PPP Extensible Authentication Protocol (EAP), 532
PPP (Point-to-Point Protocol), 529-530
PPTP Forum, 556
PPTP (Point-to-Point Tunneling Protocol), 556-557
preauthentication, 477-478
preshared key authentication, 331
Pretty Good Privacy (PGP), using, 697, 706
preventing security incidents, 652-654
primary domain controller (PDC), 7
private keys, compromised, 327-328
Privilege Attribute Certificate (PAC), 479
profiles (wireless LAN cards), 111
proof of possession, 205
protocol analyzer (sniffer), 266, 323
protocols
See also specific protocol
IPSec-supported, 558-559
port numbers and (table), 712-715
proxy tickets, Kerberos delegation, 468-469
public key, encryption and decryption (fig.), 268
public key cryptography, 201-203, 207, 268
public key Group Policy, configuring, 234-237
Public Key Infrastructure (PKI), 11, 200
public keys, compromised, 327-328
|
|