|
back doors
eliminating, Step 8: No Back Doors
locking down, Fundamental Lockdown Principles
backing up servers
importance of, Fundamental Lockdown Principles
bandwidth startvation attacks, Table 6-1: Forms of DoS Attacks
Big Brother systems, Privacy vs. Security
binaries, scanning, Take the Attacker’s View
BIOS passwords, Implement BIOS Password Protection
blueprints of applications, Take the Attacker’s View, Create a Blueprint of Your Application
browsers
hidden field vulnerability, Create Scenarios Based on Inroads for Attack
brute force attacks, Keeping Private Keys Safe
budget limitations, Design Challenges
buffer overrun attacks, Buffer Overrun
buffer overruns
Slammer worm, The Arms Race of Hacking
SQL Server 2000 vulnerability to, The Arms Race of Hacking
bugs, Web security, Is It a Bug, or an Attack from a Criminal Mastermind?
builds
Authenticode with, Incorporate Authenticode Signing in Your Build Process
bypassing UI attack, Table 14-2: Example of Common Attacks and Techniques to Mitigate Them
|