M



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

MAC addresses
     locking 2nd 3rd
     spoofing 2nd
MAC addresses, displaying 2nd
mail masquerading
mail relays 2nd 3rd 4th
     configuring 2nd 3rd 4th
         Microsoft Exchange 2000 Server Enterprise Edition 2nd
         Microsoft Windows 2003 Server Enterprise Edition 2nd
     functions of
mailing lists
     patch notifications
main mode authentication exchanges (IKE phase 1 negotiations)
maintaining perimeter security
     change management
         communicating proposed changes
         detecting/preventing unauthorized changes 2nd
         discovering systems/devices
         patches 2nd
         personnel support
         rolling back undesired changes
         testing changes
         verifying proper system operation
     incident response
         automating 2nd
         notifications 2nd
         phases of 2nd
         response guidelines 2nd
     system/network monitoring
         alerts
         Big Brother software 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
         establishing procedures 2nd
         establishing procedures, defining hosts/procedures 2nd 3rd
         establishing procedures, monitoring local system attributes 2nd 3rd 4th 5th 6th
         establishing procedures, network/remote service accessibility 2nd 3rd 4th
         HP OpenView software 2nd
         remote monitoring security 2nd 3rd 4th 5th
malware
    mutations
         detecting via antivirus software
    polymorphic
         detecting via antivirus software
managing
     firewalls (network security assessments) 2nd
     host defense components
     unattended user accounts 2nd
Mantin, Itsik
     Weaknesses in the Key Scheduling Algorithm of RC4 [ITAL] 2nd
masquerading (mail)
Maxim
     CD-Universe credit card attacks 2nd
MBSA (Microsoft Baseline Security Analyzer)
MD5 (Message Digest 5) hash algorithms
message digests [See hashes]
MetaFrame (Citrix)
     reverse proxies
Metasploit exploitation library software
metrics
     performance
Microsoft
     Qaz worms
    security bulletins
         MS04-036 2nd
Microsoft Exchange 2000 Server Enterprise Edition
     mail relays, configuring 2nd
Microsoft Outlook
     email, security of
Microsoft OWA
     security of
Microsoft OWA (Outlook Web Access)
     SSL 2nd
Microsoft Windows 2000
     Secure Cache Against Pollution check box
Microsoft Windows 2003 Server Enterprise Edition
     mail relays, configuring 2nd
middleware components (multitier applications) 2nd
mkacct command (HP Virtual Vault Servers)
modems
     access, controlling
     secure perimeter design 2nd
ModemScan
     wardialing
modwall firewalls
     IPS 2nd
monitor ports
monitoring systems/networks (perimeter security maintenance)
     alerts
     Big Brother software 2nd 3rd 4th
         defining hosts/procedures 2nd
         monitoring local system attributes 2nd 3rd
         network/remote service accessibility 2nd 3rd
     HP OpenView software 2nd
     procedures, establishing 2nd
         defining hosts/procedures 2nd 3rd
         monitoring local system attributes 2nd 3rd 4th 5th 6th
         network/remote service accessibility 2nd 3rd 4th
     remote monitoring security 2nd 3rd 4th 5th
Moore's law
motives for attacks 2nd
MS04-036 security bulletin 2nd
MTU (maximum transmission units)
     TCP/IP network performance 2nd
Muffett, Alec
     Crack password-cracking software 2nd
multimedia protocols
    state
         tracking
multiple firewalls
    secure perimeter design
         inline 2nd
         parallel 2nd 3rd
multiple subnets
     security zones, creating 2nd 3rd 4th
         broadcast domains 2nd 3rd 4th 5th
multiple-session remote desktop software [See terminal servers]
multiresolution filtering
multitier applications
     component placement 2nd
     database components
     middleware components 2nd
     user interface components 2nd
multiuser servers
mutations (malware)
    detecting
         antivirus software



Inside Network Perimeter Security
Inside Network Perimeter Security (2nd Edition)
ISBN: 0672327376
EAN: 2147483647
Year: 2005
Pages: 230

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net