Index
B
Back Up Files and Directories right, 465
backupdesigning security for, 589
of encrypted files, 620
of IIS audit logs, 393
of keys, 580–584
log, 595
media, securing, 593
overview of, 616–617
process, designing secure, 592–593
process, securing, 589–601
security strategy design, 618–619
backup events, domain controller, 108
bandwidthCA implementation and, 161
network trust hierarchy and, 165
security and, 33–34
baseline security template, 143–146
basic authenticatione-commerce and, 405–406
HTTP W3C and, 403
NNTP security and, 384
overview of, 364–365
SMTP and, 385
batch job, 465, 467
best practicesfor backups, 594–596
for disaster recovery, 598–600
for Encrypted File System (EFS), 556–560
for securing EMS, 609–610
BIND. see UNIX Berkeley Internet Name Domain (460
blended threats, 21
block mode, 279, 280
Bluetooth, 314
/boot, 95
Boot.ini, 606
boundaries, 243–244, 292–293
breach, security, 511
brute force attack, 247–248
business requirements analysisexisting policies/procedures, 3–6
hardware loss and, 42–43
overview of, 40
requirements for securing data, 6–8
security practices analysis, 8–13
Bypass Traverse Checking right, 465