List of Tables
Chapter 2: Identifying and Designing for Potential Security Threats
Table 2.1: Common Network Vulnerabilities
Table 2.2: Predicted Threats Based on STRIDE Model
Table 2.3: Severity Classification Example
Chapter 3: Designing Network Infrastructure Security
Table 3.1: Common Attacks to Data Transferred across a Network
Chapter 4: Designing an Authentication Strategy for Active Directory
Table 4.1: Table 4.2 LAN Manager Compatibility Levels
Table 4.2: Windows Group Types
Chapter 5: Designing an Access Control Strategy for Network Resources
Table 5.1: Windows Access Control Model
Table 5.2: Active Directory Standard Permissions
Table 5.3: Administrative Shares
Table 5.5: Common Auditing Resources and Utilities
Table 5.4: Audit Statement Example
Chapter 6: Designing a Public Key Infrastructure with Certificate Services
Table 6.1: Available Certificate Templates
Table 6.2: Common Technologies That Rely on Certificates
Chapter 7: Designing Security for Internet Information Services
Table 7.1: List of Services Installed by Default on Windows Server 2003
Table 7.2: List of Services in the Application Server dialog box Service Description
Table 7.3: Web Service Extensions and their Common Extensions.
Chapter 8: Designing Security for Servers with Specific Roles
Table 8.1: Table 8.1 Predefined security templates
Chapter 9: Designing an Infrastructure for Updating Computers
Table 9.1: Default Administrative Templates
Table 9.2: Security Update Methods