Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure
Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Inside Network Security Assessment: Guarding your IT Infrastructure

Авторы: Gregg M., Kim D.

Аннотация:

As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessments: A Brick by Brick Approach to Securing a Network Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 336

Добавлена в каталог: 20.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
software vulnerability standards, defined      
SolarWinds IP Network Browser      
source code scanners      
SOWs (statements of work)      2nd
SOX      [See Sarbanes-Oxley Act]
SP 800 documents      
SP 800 documents, urls for      2nd 3rd
spyware      
spyware, defined      2nd
spyware, threat from      
SQL Slammer      
SQL Slammer, infection statistics      
SSH (Secure Shell)      
SSL (Secure Sockets Layer)      
staff      
staff, responsibilities      [See responsibility assignments]
staffing      [See assessment teams]
statement of work report sections      2nd
statement of work sections of final reports      2nd 3rd
statements of work (SOWs)      2nd
SuperScan      2nd
swarning banners      
swarning banners, purpose of      
SYN flood attacks      2nd
SYN scans      
synchronous password tokens      
system application test plans      
system application test plans, defined      
system assurance      
system assurance, accreditation      
system assurance, certification      
system assurance, Common Criteria      
system assurance, documentation review for      2nd
system assurance, ISO 17799      
system assurance, ITSEC      
system assurance, Rainbow Series      
system demonstrations      
system demonstrations, level I assessments      2nd
system demonstrations, purpose of      
system design validation step      
system design validation step, defined      
System development life cycle      2nd 3rd
system hackers      
system integrity      
system integrity, attacks against      
system requirements definition      
system requirements definition, defined      
system timeouts      
system timeouts, purpose of      
system-level scanners      2nd
systems criticality matrices      2nd
systems criticality matrix (SCM)      
systems/applications areas      2nd 3rd
TCH-Amap      
TCP      
TCP, ACK scans      
TCP, defined      
TCP, FIN scans      
TCP, handshakes      2nd
TCP, ICMP      
TCP, NULL scans      
TCP, SYN scans      
TCP, XMAS scans      
TCSEC (Trusted Computer Security Evaluation Criteria)      
TCSEC (Trusted Computer System Evaluation Criteria)      2nd
team builders      
teams, assessment      [See assessment teams]
technical controls      
technical controls, account management      2nd
technical controls, communication security      
technical controls, defined      
technical controls, identification and authentication category      2nd
technical controls, maintenance      
technical controls, malicious code protection category      
technical controls, networking connectivity      
technical controls, security auditing      
technical controls, session controls      2nd
technical controls, system assurance      2nd
technical controls, table of      
technical documentation categories      
technical information for scope definition      
technical policies      
technical policies, defined      
technical standards documents      
technical standards documents, defined      
telecommunication systems      
telecommunication systems, asset nature of      
telecommunications hackers      [See phreakers]
termination of employees      
termination of employees, threat from      2nd 3rd
THC-Amap      
theft      [See data collection stage of attacks]
third greatest threat      2nd 3rd
threats      
threats, acts of God      
threats, catastrophic damage      
threats, confidential information disclosure      2nd
threats, cyber terrorism      
threats, data modification      
threats, defined      2nd 3rd
threats, denial of service      [See DoS attacks] [See DoS]
threats, destruction      
threats, employees as      
threats, greatest threat      
threats, hacker attacks      
threats, insecure computing habits      2nd
threats, list of types      2nd
threats, malware      
threats, second greatest threat      2nd
threats, stolen and lost data      
threats, terminated employees      2nd 3rd
threats, third greatest threat      2nd 3rd
threats, unauthorized access      2nd
threats, viruses      
Tiger Teams      [See SIRTs]
timeline construction      2nd 3rd
timeline construction for assessments      2nd
timeliness      
timeliness, defined      
TLS (Transport Layer Security)      
Tokens      
tokens, asynchronous      
tokens, defined      
tokens, synchronous      
Tools      [See assessment tools]
tools, hacker      [See hacking tools]
tools, web sites for      2nd 3rd
top secret information      
top secret information, defined      
top-down approach to risk assessment      2nd
total risk score      
training staff      
training staff, assessment methodology      2nd
training staff, goals for      2nd
training staff, importance of      
training staff, strategy development      
transferring risk      
transferring risk, defined      
Transport Layer Security (TLS)      
trojans      
trojans, defined      
Trusted Computer Security Evaluation Criteria (TCSEC)      
Trusted Computer System Evaluation Criteria (TCSEC)      2nd
two-factor authentication      
types of network vulnerability assessments      2nd 3rd
U.S. Code 1029      
U.S. Code 1029, defined      
uber hackers      
UDP (User Datagram Protocol)      
UDP (User Datagram Protocol), defined      
Unauthorized access      
unauthorized access threats      
unauthorized access threats, defined      
unauthorized access, defined      
unauthorized access, disgruntled employees with      
unauthorized software use      
unclassified information      
unclassified information, defined      
unstructured attacks      2nd
URLs (Uniform Resource Locators)      
URLs (Uniform Resource Locators), defined      
US-CERT (Computer Emergency Response Team)      
US-CERT (Computer Emergency Response Team), vulnerability documentation list      
USE42      
user areas      2nd
users      
users, defined      
vendors, procuring      [See procurement]
Viruses      
viruses, defined      2nd
VLAD      
Void11      
vulnerability      
vulnerability assessment tools      [See assessment tools]
vulnerability assessments      [See network vulnerability assessments]
vulnerability exploitation      
vulnerability exploitation, management, communicating with      
vulnerability exploitation, purpose of      2nd
vulnerability exploitation, scheduling      
vulnerability management      
vulnerability management, automating patch management      
vulnerability management, defined      
vulnerability management, post-assessment overview      
vulnerability management, prioritization      
vulnerability management, processes in      2nd
vulnerability management, steps for patch management      2nd
vulnerability management, window guidelines      
vulnerability scanning tools      
vulnerability scanning tools, application-level scanners      
vulnerability scanning tools, automated exploit tools      2nd
vulnerability scanning tools, in-depth assessment requirements      
vulnerability scanning tools, ISS Internet Scanner      
vulnerability scanning tools, LANguard      
vulnerability scanning tools, N-Stealth      
vulnerability scanning tools, Nessus      
vulnerability scanning tools, NetRecon      
vulnerability scanning tools, purpose of      
vulnerability scanning tools, Retina      
vulnerability scanning tools, SAINT      
vulnerability scanning tools, SARA      
vulnerability scanning tools, source code scanners      
vulnerability scanning tools, system-level scanners      2nd
vulnerability scanning tools, urls for      
vulnerability scanning tools, VLAD      
vulnerability scans      
vulnerability scans, level II assessments, role in      2nd
vulnerability scans, problems with      
vulnerability testing      [See network vulnerability assessments]
vulnerability time      
vulnerability time, defined      
vulnerability window      
vulnerability window, defined      
vulnerability, CERT, statistics compiled by      2nd
vulnerability, CVE list of      2nd
vulnerability, defined      2nd
vulnerability, fundamental problem of software      
vulnerability, policy design based on      
vulnerability, software patches      
vulnerability, stages of      2nd
vulnerability, time to patch problem      2nd
vulnerability, types of      
vulnerabilties      
vulnerabilties, defined      
WAN areas      2nd 3rd
wardriving      
wardriving, defined      
Wayback Machine      
Web site assessment tools      
Web sites      
Web sites, archived content      
Web sites, banner information      2nd
Web sites, employee-created leaks      
WEP (Wired Equivalent Privacy)      
WEP (Wired Equivalent Privacy), assessment tools for      
WEP (Wired Equivalent Privacy), defined      2nd
WEP (wired equivalent protection)      
WEP (wired equivalent protection), 802.1x      
Wget tool      
whackers      
white hat hackers      
whois      
WHOIS, defined      
Wi-Fi Protected Access      [See WPA]
Wi-Fi Protected Access 2 (WPA2)
Windows      
Windows, null sessions      
Wired Equivalent Privacy      [See WEP]
wireless assessment tools      
wireless assessment tools, Aircrack      
wireless assessment tools, Aireplay      
wireless assessment tools, Airodump      
wireless assessment tools, antennas for      
wireless assessment tools, importance of      
wireless assessment tools, Kismet      
wireless assessment tools, LinkFerret      
wireless assessment tools, NetStumbler      
wireless assessment tools, urls for      
wireless assessment tools, Void11      
wireless assessment tools, WEP      2nd
wireless assessment tools, WPA      
workstation areas      2nd
workstations      
workstations, asset nature of      
worms      
worms, defined      
worms, Sasser      2nd
WPA (Wi-Fi Protected Access)      
WPA (Wi-Fi Protected Access), defined      
WPA (Wi-Fi Protected Access), tools for assessing      
WPA2 (Wi-Fi Protected Access 2)      
XMAS scans      
Xprobe 2      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2019
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте