O'Reilly logo

Network Defense and Countermeasures: Principles and Practices, Third edition by Chuck Easttom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INDEX

Numbers

2G, 435

3DES encryption, 111

3G, 436

4G, 436

56-bit cipher key (DES), 148

A

acceptance of risk, 314

access control

building access, 383384

DAC (Discretionary Access Control), 208

defined, 28

MAC (Mandatory Access Control), 208

RBAC (Role Based Access Control), 208

security policies for, 303304

Windows accounts, 207208

AccessData Forensic Toolkit, 437

accounts

administrator, 206207

ASP.NET, 207

database, 207

IUSR_Machine name, 207

lockout policies, 210

user access/privileges, 207208

viewing, 203205

ACK flag, 400

active code scanning, 247

Active Port, 335336

active scanning

enumeration, 403406

FreeNetEnumerator, 405406

NSAuditor, 403404

ShareEnum, 405

Nmap, 406408

NSAuditor, 400402

enumeration, 403404

Network Scanner, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required