... computer.
4374Book.fm Page 13 1 Tuesday, August 10 , 2004 10 :46 AM
Creating Fault Tolerance
13 7
Backup Best Practices
Backup is a critical security component of any network. Allocate a large ... Page 13 3 Tuesday, August 10 , 2004 10 :46 AM
15 0
Chapter 10
Windows Local Security
logon prompt
The interface through which users
identify themselves to the comput...
... , I T ’ S B E E
S E C R E T C O D E S E C R E T C O D E
0 1 1 1 0 1 0 1 1 1 0 0 1 0 0 0 0 0 0 1
0 1 1 1 0 1 0 1 1 1 0 0 1 0 0 0 0 0 0 1
482433
DECODE
A
B B B A B A B B B A A B A A A A A A B
S ... 26,585. This results in 1, 7 61 with a remainder of
19 ,16 0. So let’s say that we have an algorithm that simply returns the remainder
(19 ,16 0) and discards the quo...
... in your network
◆
How viruses propagate
◆
Common types of virus attacks
◆
How to protect your network from
viruses
4374Book.fm Page 11 1 Tuesday, August 10 , 2004 10 :46 AM
10 8
Chapter ... are reinstalling your operating system
4374Book.fm Page 11 7 Tuesday, August 10 , 2004 10 :46 AM
10 0
Chapter 6
Review Questions
1.
What are the three fundamental m...
... installation, and it has a UID of 0.
4374c 11. fm Page 18 1 Tuesday, August 10 , 2004 8: 21 PM
17 2 Chapter 10
Review Questions
1. Upon what foundation is Windows security built?
2. Where is the list of ... of permissions for each file system object: permissions for
4374c 11. fm Page 18 2 Tuesday, August 10 , 2004 8: 21 PM
18 6 Chapter 11
permission only. The preceding 0 indic...
... basics of Unix network security
◆
Unix authentication mechanisms
◆
Firewalling Unix machines
4374Book.fm Page 19 1 Tuesday, August 10 , 2004 10 :46 AM
Web Server Security
219
You can ... sharing
4374Book.fm Page 200 Tuesday, August 10 , 2004 10 :46 AM
Unix Network Security
19 3
Remote Logon Security
local area network (LAN)
A network in which all...
... universal encrypted authentication mechanism?
10 . How do you configure Apache?
11 . What is taint?
4374Book.fm Page 236 Tuesday, August 10 , 2004 10 :46 AM
E-mail Security 249
America Online (AOL)
A popular ... your network.
Place a firewall between your internal network and your web servers as if they
were public computers.
4374Book.fm Page 2 21 Tuesday, August 10 , 2004 10...
... flag
decoys sensor
4374Book.fm Page 267 Tuesday, August 10 , 2004 10 :46 AM
Glossary
802 .11 b
The most common wireless net-
working protocol, 802 .11 b is used in many
businesses and homes to provide ... software
4374Book.fm Page 259 Tuesday, August 10 , 2004 10 :46 AM
Appendix
A
Answers to Review Questions
Chapter 1
1.
What is security?
Answer:
Security i...