Index

A

access

buildings, 367-368

control

Bell-LaPadula model, 353

defined, 25

lists (ACLs), 129

policies, 292-293

Unix, Grey/Silver Book, 350

Violet Book, 351

physical attacks, 387-389

bypassing passwords, 388

OphCrack, 388-389

tech support, tricking, 389

remote attacks

cross-site scripting, 391

SQL injection, 390-391

AccessData1 FTK, 408

accounts, securing, 200, 249

ACLs (Access Control Lists), 129

Active Ports, 325

active scanning, 238, 379-380

enumerating, 379

FreeNetEnumerator, 385

NSAudit, 380-384

aggressiveness levels, 381

enumeration capabilities, 383-384

network scanner, 381

Remote Explorer, 382

scan types, selecting, 381

website, 380

ports, 379

ShareEnum, 384

types, 379

vulnerability assessments, 379

addresses (IP)

hiding, 87

scanning, ...

Get Network Defense and Countermeasures: Principles and Practices, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.