Team LiB
Previous Section Next Section

Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X]

IDEA (International Data Encryption Algorithm)
identity verification [See public-key infrastructure]
information disclosure security issues
    directory
         indexes
         listings
     HTML source code
     not volunteering principle
information leaks, preventing
information-gathering tools
     Httprint
     Netcraft
     Sam Spade
     SiteDigger
     SSLDigger
     TechnicalInfo
infrastructure
     application isolation
         modules
         from servers
         virtual servers
     book recommendations
    host security [See host security]
    network design [See network design]
    network security [See network security]
injection attacks
     SQL
         database feature problems
         example
         query statements
         resources for
         UNION construct
integrity security goal
International Data Encryption Algorithm (IDEA)
intrusion containment, chroot (jail)
intrusion detection
     Apache backdoors
     detecting common attacks
         command execution and file disclosure
         content management system problems
         database
         database-specific patterns
         XSS
     evolution of
         HIDSs
         NIDS
     features
         anti-evasion techniques
         input validation enforcement
         negative versus positive models
         protocol anomaly
         response monitoring (information leak detection)
         rule-based versus anomaly-based
         state management
     firewall deployment guidelines
         configuration starting point, reasonable
         steps
     host-based
     HTTP traffic and
     log-based
    mod_security firewall module [See mod_security firewall module]
     network
     real-time
     systems for 2nd
         Prelude tool
         Snort tool
     value of

Team LiB
Previous Section Next Section