Index_W

 < Day Day Up > 



W

WAN, see Wide area network

War driving, 209

Warm sites, 30

Web

application assessments, 191, 201

-based e-mail, 224, 323

pages, password cracking, 303

proxy, 199

server policies, 97

site(s)

E-commerce, 214

privacy statement, 387

vandalism, 257, 258

tools, automated, 199

Well-known ports, 409-449

WEP, see Wired Equivalent Privacy

What-if idea, 15

Whisker, 200, 504

White-hat system attacking, 172

Wide area network (WAN), 26, 99

Wilbur, 221

Windows

Advanced Server for LAN Management, 168

-based operating systems,undeleting in, 277

Developers Conference, 168

FAT, information hiding in, 278

file allocation table, 276

logging, 241

logical file review in, 297

NT, auditing,168, 227

NT audit policy, 307

NT file system (NTFS), 278, 279

NT incidents, responding to, 293

collecting volatile live-time evidence, 296

data storage, 293

open ports and listening services, 295

processes running on target computer, 295

system turned off, 294

system users, 294

tools in tool bag, 293

NT logging, 304

NT Server multi-user core, 169

operating systems, evidence on, 296

password-protected user accounts, 102

Registry, 222, 299

Server Message Block, 142

system documentation, 141

Windump, 162, 205

Winscan, 504

Wire communications, 392

Wired Equivalent Privacy (WEP), 83, 85, 208, 209, 210

Wireless local area network (WLAN), 82, 207

Wireless networks, auditing, 206

Wireless policies, 84

Witness reports, 265

WLAN, see Wireless local area network

Workplace

fraud, 354

safety, 76, 77

Workstation auditing, 68, 104, 219, 220

World Wide Web, search, 85, see also Web

WORM media, see Write Once, Read Many media

Worms, 23, 70, 229

WPRM media, 78

Write Once, Read Many (WORM) media, 70



 < Day Day Up > 



Critical Incident Management
Critical Incident Management
ISBN: 084930010X
EAN: 2147483647
Year: 2004
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net