1. Trang chủ
  2. » Công Nghệ Thông Tin

Microsoft Encyclopedia Of Security Phần 1 pdf

8 190 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 8
Dung lượng 222,57 KB

Nội dung

A01C618771.fm day, July 8, 2003 TuesPage 1 3:25 PM PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2003 by Mitch Tulloch All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Cataloging-in-Publication Data Tulloch, Mitch. Microsoft Encyclopedia of Security / Mitch Tulloch. p. cm. ISBN 0-7356-1877-1 1. Computer security Encyclopedias 2. Computer networks Security measures Encyclopedias. I. Title. QA76.9.A25T85 2003 005.'8'03 dc21 2003051323 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 8 7 6 5 4 3 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further informa- tion about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to mspinput@microsoft.com. Active Directory, ActiveX, Authenticode, BackOffice, Hotmail, Microsoft, Microsoft Press, MS-DOS, MSDN, MSN, Windows, Windows NT, and Windows Server are either registered trademarks or trade- marks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Acquisitions Editor: Jeff Koch Project Editor: Sandra Haynes Body Part No. X09-45918 Dedicated to Neil Salkind, my agent and friend Contents- Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii What Is Computer Security? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Threats and Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Standards and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Hacking and Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Tools and Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxv Organizations and Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxv Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxv Legal Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Who This Work Is For . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi How This Work Is Organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvi Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxvii Comments and Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxvii Alphabetical Reference of Terms Numbers 3DES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A A5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 AAA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 acceptable use policy (AUP) . . . . . . . . . . . . . . . . . . . 5 access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 access control entry (ACE) . . . . . . . . . . . . . . . . . . . . 7 access control list (ACL) . . . . . . . . . . . . . . . . . . . . . . 7 access list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 access mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 access token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 account lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 account lockout policy . . . . . . . . . . . . . . . . . . . . . . 10 account policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 ACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 802.11i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2600 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 ACK storm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 AclDiag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 ACPA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 ACSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 ACSAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 adaptive proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Adaptive Security Algorithm (ASA) . . . . . . . . . . . . . . . . . . . . . . . 12 address-based authentication . . . . . . . . . . . . . . . . . . 12 address munging . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 address spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 v Acknowledgments Thanks to my wife and business partner, Ingrid Tulloch, who was coauthor of our previous project with Microsoft Press, the Microsoft Encyclopedia of Networking, Second Edition. Thanks, Schatz, for contributing endless long hours of research and numerous helpful suggestions to assist me in writing this work. What a wife! Thanks to the terrific team at Microsoft Press (mspress.microsoft.com) and nSight (www.nsightworks.com), including Jeff Koch, Sandra Haynes, Valerie Woolley, Susan McClung, Thomas Keegan, and Christina Palaia for their hard work and excellent suggestions. What a team! Thanks to Neil Salkind of Studio B (www.studiob.com), my friend and literary agent who represented me in this project. What an agent! Thanks to MTS Communications Inc. (www.mts.ca), for providing our company with Internet and Web hosting services. What a company! And thanks finally to Ken and Bonnie Lewis, our best friends, and their four terrific kids, Karina, Alana, Sheri, and Vanessa, for encouraging us and praying for us as we worked on this project. What a family! And what friends! Mitch Tulloch www.mtit.com xxi . Tulloch, Mitch. Microsoft Encyclopedia of Security / Mitch Tulloch. p. cm. ISBN 0-7356 -18 77 -1 1. Computer security Encyclopedias 2. Computer networks Security measures Encyclopedias. I A01C 618 7 71. fm day, July 8, 2003 TuesPage 1 3:25 PM PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399. Authenticode, BackOffice, Hotmail, Microsoft, Microsoft Press, MS-DOS, MSDN, MSN, Windows, Windows NT, and Windows Server are either registered trademarks or trade- marks of Microsoft Corporation

Ngày đăng: 07/08/2014, 04:20

TỪ KHÓA LIÊN QUAN