Securing Citrix XenApp Server in the enterprise

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bin Azad, Tariq (-), Wilson, Connie, Wright, Michael
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress 2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627482506719
Tabla de Contenidos:
  • Front Cover; Securing Citrix XenApp Server in the Enterprise; Copyright Page; Technical Editor; Contributors; Contents; Chapter 1: Introduction to Security; Introduction; Defining Security; Defining Risk; Defining Value; Defining Threat; Defining Vulnerability; Defining Countermeasures; You Really Can't Counter Threat; What Is a Security Program?; Optimizing Risk; Consciously Accept Risk; Understanding the Security Design Process; The CIA Triad; Why Does Your Organization Need a Security Infrastructure?; Analyzing Existing Security Policies and Procedures; Acceptable Use Policies
  • Privacy versus SecuritySecurity versus Usability; Designing a Framework for Implementing Security; Predicting Threats to Your Network; Recognizing Internal Security Threats; Increasing Security Awareness; Recognizing External Threats; Denial-of-Service Attacks; Distributed Denial-of-Service Attacks; Viruses, Worms, and Trojan Horses; Software Vulnerabilities; Nontechnical Attacks; What Motivates External Attackers?; Implementing Risk Analysis; Addressing Risks to the Corporate Network; Analyzing Security Requirements for Different Types of Data
  • Defining Best Practices for Designing Your Security FrameworkReviewing Compliancy; Citrix and HIPAA, Sarbanes-Oxley, FERPA; FIPS 40-2, FIPS 20 and HSPD- 2; Explaining Security Technologies; Digital Certificates; Cryptography; Auditing and Vulnerability Assessments; Assessment Types; Host Assessments; Network Assessments; Automated Assessments; Stand-Alone versus Subscription; Two Approaches; Administrative Approach; The Outsider Approach; The Hybrid Approach; Realistic Expectations; Defining Authentication Models; How Does the System Authenticate a User?; Kerberos
  • Understanding the Kerberos Authentication ProcessSecure Sockets Layer/Transport Layer Security; NT LAN Manager; Digest Authentication; Passport Authentication; Multifactor Authentication Models; Passwords; Windows Password Policies; Smart Card; Token; Biometrics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Security Guidance for Operating Systems and Terminal Services; Introduction; Windows 2003 Basics; Kernel Protection Mechanisms; Disk File System Basics and Recommendations; NTFS; FAT 32; Creating, Using, and Maintaining Users and Groups in Windows 2003
  • Local AccountsDomain Accounts; Windows 2003 Security Essentials; What Is Vulnerable in Windows 2003?; RUNAS Service; Files and Applications; Accounts Data; Providing Basic Security Levels in Windows 2003; Creating Security Templates; Analyzing Security Policy Templates and Machine Security Configuration; Installing and Checking Security Policy Templates; Attacking Windows 2003; System Identification Methods; Remote Enumeration; NetBIOS; SNMP; Probing; Local Enumeration; Authentication Attack Methods; Attacks Using Common and Known Vulnerabilities; Defending and Hardening Windows 2003
  • Evaluate Your Needs and Current Status