19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Remember icon, 6<br />

remote access services, 56<br />

reporting results<br />

about, 319<br />

compiling, 319–320<br />

creating reports, 322–324<br />

prioritizing vulnerabilities, 320–322<br />

Request for Comments (RFCs) list, 123<br />

residential phones, 72<br />

respecting privacy, 17<br />

responding to vulnerabilities, 43–44<br />

restricting anonymous connections to<br />

system, 213<br />

reverse ARPs (RARPs), 176<br />

reverse social engineering, 75<br />

.rhosts file, 238–241<br />

RIPE Network Coordination Centre, 53, 358<br />

Risk Taxonomy (Open Group), 321, 366<br />

risks. See also vulnerabilities<br />

database security, 310–311<br />

minimizing storage system security, 315<br />

minimizing web security, 300–304<br />

security, 14–16<br />

rogue wireless devices, 172–177<br />

rules of ethical hacking, 17–18<br />

• S •<br />

salt, 101<br />

SANS GIAC (website), 356<br />

SANS Institute, 118, 159, 369<br />

Sarbanes-Oxley Act (website), 359<br />

scanners, 126–127<br />

scanning<br />

internal hosts, 54–55<br />

ports, 128–133<br />

SNMP (Simple Network Management<br />

Protocol), 133–135<br />

systems, 54–56<br />

for unauthorized APs, 162–163<br />

scrape, 73<br />

screen captures, 48<br />

script kiddies, 26, 28, 32<br />

SeattleWireless Hardware Comparison<br />

page (website), 372<br />

Index<br />

Secure Shell (SSH), 156, 170<br />

Secure Sockets Layer/Transport Layer<br />

Security (SSL/TLS), 170<br />

SecureIIS (website), 302, 368<br />

securing<br />

operating systems, 118–119<br />

.rhosts and hosts.equiv files, 238–241<br />

Securities and Exchange Commission<br />

(SEC), 52, 71, 358<br />

security. See also physical security<br />

checklists, 12<br />

education and learning resources, 366<br />

evaluations, 348<br />

methods and models, 366<br />

monitoring outsourcing, 333–334<br />

by obscurity, 96, 300–301<br />

Windows 8, 216<br />

Security Accounts Manager (SAM)<br />

database, 102<br />

security assessment tools, 44–45<br />

Security Awareness, Inc. (website),<br />

336, 368<br />

security events, logging, 333<br />

security infrastructure, assessing, 329–330<br />

Security On Wheels (blog), 366<br />

security policy, 12–13<br />

security processes, managing<br />

automating ethical-hacking, 331–332<br />

maintaining security efforts, 337<br />

monitoring malicious use, 332–334<br />

outsourcing ethical hacking, 334–335<br />

security-aware mindset, 336<br />

security researchers, 28<br />

Security Tools Distribution (website), 360<br />

security-aware mindset, 336<br />

Secur/Tree (Amenza Technologies<br />

Limited), 39, 366<br />

segmenting networks, 156<br />

semidirectional wireless antenna, 160<br />

Server Message Block (SMB), 206<br />

ServerDefender (website), 368<br />

ServerMask (Port 80 Software), 301, 370<br />

service set identifier (SSID), 162<br />

Session Initiation Protocol (SIP), 271<br />

SetGID, 242, 243<br />

SetUID, 242, 243<br />

385

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!