O'Reilly logo

Network Defense and Countermeasures: Principles and Practices, Second Edition by William Easttom II

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

access

buildings, 367-368

control

Bell-LaPadula model, 353

defined, 25

lists (ACLs), 129

policies, 292-293

Unix, Grey/Silver Book, 350

Violet Book, 351

physical attacks, 387-389

bypassing passwords, 388

OphCrack, 388-389

tech support, tricking, 389

remote attacks

cross-site scripting, 391

SQL injection, 390-391

AccessData1 FTK, 408

accounts, securing, 200, 249

ACLs (Access Control Lists), 129

Active Ports, 325

active scanning, 238, 379-380

enumerating, 379

FreeNetEnumerator, 385

NSAudit, 380-384

aggressiveness levels, 381

enumeration capabilities, 383-384

network scanner, 381

Remote Explorer, 382

scan types, selecting, 381

website, 380

ports, 379

ShareEnum, 384

types, 379

vulnerability assessments, 379

addresses (IP)

hiding, 87

scanning, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required