Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 30_118054 bindex.qxp 10/11/07 9:54 AM Page 345 Index ActiveX • Numerics • defined, 241, 335 48-bit recovery option, 192 and DHTML, 246 128-bit encryption, 173, 188 disabling, 250 256-bit encryption, 173, 188 and HTML, 241 256-bit recovery option, 192 and IE7, 15, 241–243 in Internet Zone, 250 object caching, 253 • A • properties of, 256 security risks of, 236 About.com identity-theft site, 330 threat of, 243 Access Control Entry (ACE), 105 typically installed, 255 access control list (ACL), 109 ActiveX Opt-In access control model, 335 and automatic downloads, 256 access levels, 40 defined, 242, 257 access management options, 242–243 with auditing and logging, 124–132 and security risks, 243 discussed, 96, 103 acts of God (natural threat-sources), 32 to floppy, 299 AD. See Active Directory with NTFS permissions, 111–116 ad hoc (peer-to-peer) wireless network object-level security, 96–97, 103–111 defined, 335 to Registry, 116–124 discussed, 219, 230–232, 320 system security settings, 96 Add button access point (AP). See also wireless access for ACEs, 114 point in File Sharing Wizard, 99 in discovery process, 218–219 Add text (File Sharing Wizard), 98, 99 and SSID values, 235 http://www.pbookshop.com Admin Approval mode username and password for, 232 administrators in, 69–70 account(s) for built-in administrators, 59–61 built-in, 83–87 defined, 335 defined, 81 disabled, 60 managing, 81–83 COPYRIGHTEDelevation MATERIAL prompt for administrators in, password-protected, 286 61–63 SAM, 299 enabled, 60, 61 account-lockout policy, 297–298 Local Security Policy, 59–63 ACE (Access Control Entry), 105 and Standard User mode, 55–57 ACL (access control list), 109 and UAC, 69–70 action pane, 206 administrative templates Active Directory (AD) custom, 303 and domain network, 207, 296–297 discussed, 302 Domain Profile, 207 interface, 303–304 password policies, 296–297 and Registry, 302 Active Server Pages (ASP), 250 settings, 303 30_118054 bindex.qxp 10/11/07 9:54 AM Page 346 346 Windows Vista Security For Dummies administrative username, 232–233 ASP (Active Server Pages), 250 Administrator (account), 83–84 asymmetric encryption in Admin Approval mode, 61–63, 69–70 defined, 335 built-in, 59–61, 300 discussed, 160–161 common tasks of, 55 and symmetric encryption, 163 elevation prompt for, 61–63 @RISK: The Consensus Security Alert sharing, 98 (newsletter), 329 Standard Users versus, 55 attachment Administrators (group), 82, 84 in e-mail, 318 .admx, 303 in instant messaging, 321 Advanced Encryption Standard (AES), Audit Account Logon Events, 126 173, 188 Audit Account Management, 126 Advanced Security applet Audit Logon Events, 126 Getting Started section with, 211–213 Audit Object Access, 126, 130 and Resources pane, 213–214 audit policy, 298 Windows Firewall with, 205–214 Audit Policy Change, 126 Advanced tab (Windows Firewall), 204–205 Audit Privelege Use, 126–127 adware, 260 Audit Process Tracking, 127 AES (Advanced Encryption Standard), Audit System Events, 127 173, 188 auditing alert(s) access management with, 124–132 for application installations, 65 defined, 105, 125 when program is blocked, 203 discussed, 105, 124–125 in Windows Defender, 270–271 and logging, 124–132 in WSC, 50 of NTFS objects, 130–131 allow of objects, 130–132 access, 214 passive, 131 connection, 212 policies, 124–129 secure connections, 212 of Registry objects, 131 Unicast Response, 210 of service objects, 131 Allowed Items, 274–275 AuditPol.eze, 298 anonymous enumeration,http://www.pbookshop.com 299 Authenticate Communications between ANONYMOUS LOGON, 84 Computers section (Getting antispyware, 261 Started), 211 antivirus software Authenticated Users, 83, 85, 106 discussed, 325–326 authentication, 81–82, 335 and firewalls, 328 authorization, 335 in mobile devices, 322 Auto Start, 265 AP. See access point automatic (scheduled) scan, 269, 270 application installations Automatic Updating alerts for, 65 and ActiveX Opt-In, 256 backing up, 141 discussed, 44 by malicious programs, 65 managing, 45–46 Apply To, 114, 115 monitoring, 45 archive folder, 151 and WSC, 44–46 30_118054 bindex.qxp 10/11/07 9:54 AM Page 347 Index 347 Automatically Deny Elevation Requests, binary behaviors 63–64 and DHTML, 246 AutoPlay and AutoRun in IE7, 246 of CD/DVDs, 285 BIOS policies, 304 and BitLocker, 173 availability, 20, 36 changes to, 180 BitLocker additional security with, 187 • B • advanced options, 181–182 backing up basic options, 179–181 advanced methodologies, 140 and BIOS, 173 application information, 141 data recovery, 191–194 with Backup and Restore, 151–154 and data theft, 171–173 with Backup Files Wizard, 152–153 defined, 17, 172, 335 business information, 141 disabling, 195–196 on CD, 152 discussed, 171–173 with CompletePC Backup, 139, 154–157 encryption with, 16–17, 188–189 discussed, 135 folders, recovering, 191–192 on DVD, 152 and Group Policy Object Editor, 178, 191 encryption keys, 170 interface, 179, 195 files, 138–139, 146, 152–153 methods, 188–189 folders, 138–139, 146 options for recovery, 192–194 on hard disk, 152 and PIN, 183–186 options for, 137–140 preparing system for, 174–178 organization for, 150–151 Prevent Memory Overwrite, 189–191 and partitioning, 174 recovering data, 191–194 preserving data by, 147–150 for removable media, 196 private keys, 170 requirements for, 173–174 reasons for, 136–137 setting up, 178–187 requirements for, 140–144 and startup key, 186–187 with Shadow Copy, 139–140 and TPM, 173, 179, 182–187 with shadow copy, 157http://www.pbookshop.comweaknesses of, 196 storage media for, 142 BitLocker Drive Encryption, 194, 304 strategy planning for, 145–147 blocking supported devices for, 140 alerts, 203 system data, 141 connections, 201, 208, 209, 212 with System Restore, 137–138, 147–149 of file downloads, 13 third-party software for, 327–328 of inbound connections, 201, 208 Backup and Restore Center of programs, 203 defined, 335 with spyware removal tools, 327 discussed, 151–154 Bluetooth, 322 Backup Files Wizard, 152–153 boot protection, 172 Backup Log Automatically When Full, 129 broadband Internet, 313. See also wireless Backup Operators, 84 network BATCH, 84 broadband router, 314 BCWipe (Jetico), 333 built-in account, 83–87 30_118054 bindex.qxp 10/11/07 9:54 AM Page 348 348 Windows Vista Security For Dummies built-in administrator, 59–61, 300 Control Panel, 303 built-in group (special identity), 83–87 Co-Owner (permission), 100 built-in identity, 83–87 Credentials, Prompt for business information in Administrator mode, 62 backing up, 141 in Standard User mode, 63 protection of, 21 cross-domain scripting protection, 15–16 cross-domain security defined, 257 • C • and IE7, 243–244 Cancel button (File Sharing Wizard), 100 scripting attacks, 15–16, 243–244 caution, 215 Currently Running Programs, 276 CD custom scan, 11, 268 AutoPlay and AutoRun, 285 customer information, 21 backing up on, 152 deny write access to, 292 CD-ROM access, 299 • D • cellphone. See mobile device DACL (Discretionary Access Control List), Change (permission), 78 104, 105 Change button, 115 data. See also sensitive information Change Scope button, 203 backing up, 147–150 Change Settings, 46 in BitLocker, 191–194 Check for Updates, 45 and EFS, 167–168 Check Names, 92 organizing, 150–151 Check this Web site, 245 preserving, 147–150 child object, 109, 111 recovering, 167–168, 191–194 children, controls for, 12 on removable media, 286–288 Classic View (UAC), 59 removing, 286–287 Clear All button, 115 System Restore for, 147–149 code, 10 Data Recovery Agent, 163 Cogswell, Bryce, 332 data scrubber program, 288 common sense, 24 data theft, 171–173 Communications, Securehttp://www.pbookshop.com in, 9, 10 DDoS (Distribute Denial-of-Service), 317–318 company financials, 21 decryption, 336 CompletePC Backup (system image) Default, Secure by, 9, 10 backing up with, 154–155 Default Action (Definition-Based), 271, 272 description, 146 Default View (UAC), 59 discussed, 139, 154–157 Defender. See Windows Defender restoring, 155–156 definition files, 262–263, 269 and shadow copies, 156–157 deny write access, 292 Components (Windows), 304 Deployment, Secure in, 9, 10 compressed files, 162 Design, Secure by, 9, 10 compressed folder, 162 Desktop, 303 computing, 1, 12 detect application installations confidentiality, 36–37 disabled, 65 configuration policy, 301 for elevation prompts, 65–66 Consent, Prompt for, 61, 63 enabled, 65 console tree, 206 device Container Only check box, 115 installation, 290–291 Contributor (permission), 100 usage, 292 30_118054 bindex.qxp 10/11/07 9:54 AM Page 349 Index 349 Device Control defined, 288 • E • for device installation, 290–291 Edit button, for ACEs, 114 for device usage, 292 effective permissions, 105–108 discussed, 288 EFS. See Encrypting File System and Group Policy, 289 Elevate without Prompting, 62 installation settings of, 288–289 elevated privilege, 336 for removable media, 286–292 elevation prompt usage settings of, 289–290 in Admin Approval mode, 61–63 DHCP (Dynamic Host Configuration for administrators, 61–63 Protocol), 221, 228 and automatic denial, 63–64 DHTML (Dynamic HTML), 246 defined, 56 Diffuser, 173, 188 detect application installations, 65–66 diffusion, 188 and Secure Desktop, 70–71 digital certificate signature checks for, 66–67 defined, 336 for Standard Users, 63–65 support for, 161 in UAC, 61–68 Digital Rights Management (DRM), 80 UIAccess, 67–68 digital signature, 336 e-mail discovery process, 218–219 attachments, 318 Discretionary Access Control List (DACL), MMC attacks via, 319 104, 105 and mobile devices, 322 Distribute Denial-of-Service
Recommended publications
  • 2 | 2013 2 | Volume Issue ISSN 2190-3387 Law
    2 | 2013 Volume 4 (2013) Issue 2 ISSN 2190-3387 Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Articles Online Sexual Harassment: Issues & Solutions by Mohamed Chawki, Yassin el Shazly Breathing Space for Cloud-Based Business Models: Exploring the Matrix of Copyright Limitations, Safe Harbours and Injunctions by Martin Senftleben A Model Framework for publishing Grey Literature in Open Access by Matěj Myška, Jaromír Šavelka Injunctions against innocent Third Parties: The Case of Website Blocking by Martin Husovec Evaluation of the Role of Access Providers Discussion of Dutch Pirate Bay Case Law and Introducing Principles on Directness, Effectiveness, Costs, Relevance and Time by Arno R. Lodder, Nicole S. van der Meule Das Verhältnis zwischen Urheberrecht und Wissenschaft: Auf die Perspektive kommt es an! by Alexander Peukert Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Journal of Intellectual Property, Information Technology and Table Of Contents Electronic Commerce Law Volume 4 Issue 2, August 2013 Articles www.jipitec.eu [email protected] Online Sexual Harassment: Issues & Solutions A joint publication of: by Mohamed Chawki, Yassin el Shazly 71 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Vincenz-Prießnitz-Str. 3, Breathing Space for Cloud-Based Business Models: 76131 Karlsruhe Exploring the Matrix of Copyright Limitations, Safe Prof. Dr. Axel Metzger, LL. M., Harbours and Injunctions Exploring the Matrix of Institute for Legal Informatics,
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Darknet As a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks
    Darknet as a Source of Cyber Threat Intelligence: Investigating Distributed and Reflection Denial of Service Attacks Claude Fachkha A Thesis in The Department of Electrical and Computer Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy at Concordia University Montreal, Quebec, Canada November 2015 c Claude Fachkha, 2015 CONCORDIA UNIVERSITY SCHOOL OF GRADUATE STUDIES This is to certify that the thesis prepared By: Claude Fachkha Darknet as a Source of Cyber Threat Intelligence: Entitled: Investigating Distributed and Reflection Denial of Service Attacks and submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: 'U'HERUDK'\VDUW*DOH Chair 'U0RKDPPDG=XONHUQLQH External Examiner 'U-RH\3DTXHW External to Program 'U5DFKLGD'VVRXOL Examiner 'U5RFK+*OLWKR Examiner 'U0RXUDG'HEEDEL Thesis Supervisor Approved by 'U$EGHO5D]LN6HEDN Chair of Department or Graduate Program Director 'U$PLU$VLI Dean of Faculty ABSTRACT Cyberspace has become a massive battlefield between computer criminals and com- puter security experts. In addition, large-scale cyber attacks have enormously ma- tured and became capable to generate, in a prompt manner, significant interruptions and damage to Internet resources and infrastructure. Denial of Service (DoS) attacks are perhaps the most prominent and severe types of such large-scale cyber attacks. Furthermore, the existence of widely available encryption and anonymity techniques greatly increases the difficulty of the surveillance and investigation of cyber attacks. In this context, the availability of relevant cyber monitoring is of paramount im- portance.
    [Show full text]
  • DS0122 1007 FISE:DS0100 0605 FT EE.Qxd.Qxd
    FaceTime Internet Security Edition™ Total Control for Web and Real-Time Internet Communications About FaceTime Internet Security FaceTime Internet Security Edition is the next generation Internet security solution, providing Edition total control over web usage and real-time communications. For the first time, enterprises FaceTime Internet Security Edition can enable, secure and manage all Internet channels – web browsing, IM, P2P, Skype, and enables the safe and productive use chat - with unified policy management through a single access point. FaceTime Internet of the Internet including web brows- Security Edition combines state-of-the-art IM & P2P security with an industry leading URL ing, IM, P2P, Skype and other real- filtering database and award winning gateway anti-spyware solution. time communications applications. Purpose-built and integrated to pro- Real-time Communications in the Enterprise vide total visibility and control, Internet communications have evolved from point-to-point channels such as email to real- FaceTime Internet Security Edition time, presence-oriented communications like IM, P2P file-sharing, Skype, and web confer- allows organizations to implement encing. For the new generation of workers, access to real-time communications is an powerful policies that detect, assumption; if it’s not available, they will download it to their computer regardless of policy, secure, manage and enable real- because they know what a positive impact these applications can have on effectiveness and time collaborative applications while efficiency. preventing malware threats, mini- mizing information leakage, and FaceTime terms these real-time communications applications ‘greynets’ – often installed by control employee Internet use. end users without the permission or knowledge of the IT department and use highly evasive techniques to circumvent the existing security infrastructure.
    [Show full text]
  • Instructional Objectives
    Information Security Governance & Compliance Assessment Essentials: Strategies for Staying Current with Technology Douglas Brown – CISM, CISSP, Security Solutions Architect HP Security and Risk Management HP Services © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Instructional objectives • Share enabling technologies taxonomy as it applies to the P5 Model • Familiarize one’s self with common technologies encountered during security engagements • Understand HP’s security product portfolio • Understand HP’s strategy in selecting and aligning with 3rd party partners • Know where to go for “quick” education on security tools 5/25/2007 2 1 Agenda • Assessing technology controls • Technology types • Emerging technologies • Enabling technologies • Applying enabling technologies • HP security technologies • Consultant resources • Security technology predictions • Breakout 5/25/2007 3 Assessing Technology Controls © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice 2 Assessing technology controls • Role and responsibility − Understand technology in place to manage/mitigate threats • Why are they using it? • How are they using it? • How could they use it better? − Recognize that you won’t know every technology in use • Clients expect us to know every single tool as an expert • Use probing questions to mask lack of awareness of a particular technology 5/25/2007 5 Technology ecosystem Firewall Rules Management What
    [Show full text]
  • Government-Wide Cyber Security
    White Paper Government-Wide Cyber Security Leveraging Network Intelligence Technology April 2009 Enabling True Network Intelligence Everywhere White Paper Government-Wide Cyber Security Executive Summary Governments and multi-government organizations can better support IT network security across applications and government functions with a common technology platform leveraging Network Intelligence building blocks. IT security continues to be the greatest challenge facing government CIOs worldwide. Most experts agree that governments require stronger partnerships between the public and private sectors for both better protection of government IT systems from intruders and for greater visibility into operators’ network traffic to fight crime. However, government systems and intelligence activities constitute a very sensitive information environment. Governments must proceed with caution when forming technology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February 2009 was named to be the Obama Administration’s top cyber security official, points out how government IT organizations should be asking questions such as: Who designed the security technology? Who built the technology? Who operates and maintains the technology? Who upgrades the technology? Who retires the technology?1 Commercial-Off-The-Shelf (COTS) products are not always suited for government network security needs. Governments can better support network security across applications and government functions with a common technology platform consisting of reusable technology building blocks. Such a global approach would enable government organizations to control the development, performance and maintenance of security applications, while preserving the confidentiality of security mechanisms for detecting cyber criminals and protecting information. Qosmos Network Intelligence provides this capability. Qosmos Network Intelligence provides this capability with technology to extract detailed IP metadata from network traffic.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Optimal Techn Ology G Uidance
    Report Comprehensive Information Technology Assessment August 10, 2016 Optimal TechnologyOptimal Guidance Optimal Technology Guidance Technology Optimal Client Locations Coast-to-Coast Practice Locations California Illinois Minnesota North Carolina 800.806.3080 www.clientfirstcg.com Comprehensive IT Assessment Report City of West Covina, CA TABLE OF CONTENTS ENGAGEMENT PURPOSE AND BACKGROUND ............................................ 3 Comprehensive Information Technology Assessment Objective ......................................... 3 Deliverables ........................................................................................................................... 3 Methodology and Approach .................................................................................................. 4 CURRENT INFORMATION TECHNOLOGY ENVIRONMENT SUMMARY .............. 5 Summary IT Environment ..................................................................................................... 5 Key Statistics and Metrics ..................................................................................................... 6 IT STRATEGIES, GOALS, AND OBJECTIVES ............................................ 10 INFORMATION TECHNOLOGY (IT) PRINCIPLES ......................................... 13 Vision / Mission Statement .................................................................................................. 13 IT INITIATIVES ...................................................................................... 14 Introduction .........................................................................................................................
    [Show full text]
  • Warren Harrop Thesis
    Using immersive real-time collaboration environments to manage IP networks A thesis submitted for the degree of Doctor of Philosophy Warren Harrop, BEng(Hons)(Telecommunications and Internet Technologies) & BAppSc(Multimedia Technologies) (Swinburne University), Centre for Advanced Internet Architectures, Faculty of Science, Engineering and Technology, Swinburne University of Technology, Melbourne, Victoria, Australia. August 21, 2014 Declaration This thesis contains no material which has been accepted for the award to the candidate of any other degree or diploma, except where due reference is made in the text of the examinable outcome. To the best of the candidate’s knowledge this thesis contains no material previously published or written by another person except where due reference is made in the text of the examinable outcome; and where the work is based on joint research or publications, discloses the relative contributions of the respective workers or authors. Warren Harrop Centre for Advanced Internet Architectures (CAIA) - Faculty of Science, Engineering and Technology Swinburne University of Technology August 21, 2014 iii Publications arising from this thesis Some preliminary results and discussions in this thesis have been previously published in peer- reviewed literature: W. Harrop and G. Armitage, “Intuitive Real-Time Network Monitoring Using Visually Orthog- onal 3D Metaphors,” in Australian Telecommunications Networks & Applications Conference 2004 (ATNAC 2004), Sydney, Australia, 8-10 December 2004, pp. 276–282. [Online]. Available: http: //caia.swin.edu.au/pubs/ATNAC04/harrop-armitage-ATNAC2004.pdf W. Harrop and G. Armitage, “Modifying first person shooter games to perform real time network monitoring and control tasks,” in NetGames ’06: Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games.
    [Show full text]
  • Dissertation
    Securing the Internet by Analysing and Controlling DNS Traffic: Email Worm Detection and Mitigation vorgelegt von Diplom-Ingenieur Nikolaos Chatzis von der Fakult¨atIV - Elektrotechnik und Informatik der Technischen Universit¨atBerlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften { Dr.-Ing. { genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Hans-Ulrich Heiß Berichter: Prof. Dr. Radu Popescu-Zeletin Berichter: Prof. Dr. Jean-Pierre Seifert Berichter: Prof. Dr. Dimitrios Serpanos Tag der wissenschaftlichen Aussprache: 17. November 2010 Berlin 2010 D 83 ii iii Abstract The Domain Name System (DNS) is a critical infrastructure of the Internet because almost all applications that run on Internet-connected machines depend on the name resolution service it provides to work. The DNS consists of three components: the domain name space, the name servers, and the clients, formally referred to as resolvers. Due to its critical nature, the domain name space and the name servers have been for many years very attractive targets for attackers seeking to inflict widespread damage. To deal with this state of affairs, substantial attention and investment have been directed at enhancing the security of and protecting the DNS to ensure its continuous, reliable and efficient operation. This, in conjunction with a notable shift in the motivation and profile of attackers have led in recent years to a considerable change in the Internet attack landscape. Attacks have gradually become more sophisticated and focused, and financial gain has evolved into the major driving force behind them. In this new era, attackers have realised that misusing the name servers or exploiting the name resolution service comes with greater damage or economic profit than directly attacking the components of the DNS or disrupting the name resolution service.
    [Show full text]
  • Datasheet Facetime Enterprise
    FaceTime Enterprise Edition™ End-to-End Solution for Security & Management of IM, P2P & Other Greynets About FaceTime Enterprise Edition FaceTime Enterprise Edition is the leading solution used by the world's largest firms to FaceTime Enterprise Edition is a secure and manage real-time communications, and ensure that the use of instant messaging comprehensive solution for the and other real-time communication tools complies with corporate security policies and gov- ernment regulations. security, management and compli- ance of real-time communications, consisting of user policy manage- Real-time Communications in the Enterprise ment, message hygiene, spyware Instant messaging (IM), Web conferencing and other real-time communication and collabora- prevention and targeted remedia- tion tools have become requirements for strategic and competitive advantage in today’s real- tion, archiving for compliance, time enterprises. The productivity benefits reaped from the use of these tools have dramati- blocking unauthorized usage, and cally expanded their use in many organizations. protecting the network against Instant messaging in particular has quickly moved from personal communications niche to a sophisticated user workarounds. valuable business tool. Industry analysts expect that public IM usage will be ubiquitous by 2008 and the Enterprise Instant Messaging (EIM) penetration will approach 100% by 2010. EIM products are moving rapidly towards becoming unified communication and collaboration platforms integrating a wide range of real-time communications
    [Show full text]
  • DS0126-1007 USG:DS0100 0605 FT EE.Qxd.Qxd
    Unified Security Gateway™ Total Control for Web and Real-Time Internet Communication About FaceTime Unified Security The Reality of Real-time Communications Gateway The Web 2.0 landscape is alive with participation and collaboration. More than 200 social Unified Security Gateway is a secure networking sites are available to anyone with a browser. Several have evolved into full-blown devel- Web gateway that enables organizations opment platforms – Facebook alone supports almost 20,000 applications. From the enterprise side, to integrate the management, security, it’s become common practice for human resources to review candidates’ social networking activities and compliance of the full range of as part of the hiring process, and for knowledge workers, social networks have become an always-on real-time communications, Web usage, focus group for testing and reviewing new ideas. including social networks and other dynamic communications environ- Today’s young generation of workers grew up with instant messaging and are used to the immediacy ments, and enterprise-class unified of communication offered by social networks; it is natural for them to expect the same level of communications such as Microsoft OCS immediacy in the business environment, because they innately understand its value. They see no and IBM Lotus Sametime. reason not to interact with social networks from inside the corporate network. However, as the line between corporate networks and social networks blurs, social networks and their applications – many of which involve real-time communications – become an issue for enterprise IT. Unfortunately, most IT departments cannot actually see these new activities at all, because they KEY FEATURES bypass traditional corporate network protection measures.
    [Show full text]