Securing Citrix XenApp Server in the Enterprise.

By: Azad, TariqMaterial type: TextTextSeries: eBooks on DemandPublisher: Burlington : Elsevier Science, 2014Description: 1 online resource (768 p.)ISBN: 9780080569987Subject(s): Citrix MetaFrame. Client/server computing --Security measures. Computer security | Client/server computing - Security measures | Client/server computing | Computer securityGenre/Form: Electronic books.Additional physical formats: Print version:: Securing Citrix XenApp Server in the EnterpriseDDC classification: 005.4476 LOC classification: QA76.9.C55S369 2008Online resources: Click here to view this ebook.
Contents:
Front Cover; Securing Citrix XenApp Server in the Enterprise; Copyright Page; Technical Editor; Contributors; Contents; Chapter 1: Introduction to Security; Introduction; Defining Security; Defining Risk; Defining Value; Defining Threat; Defining Vulnerability; Defining Countermeasures; You Really Can't Counter Threat; What Is a Security Program?; Optimizing Risk; Consciously Accept Risk; Understanding the Security Design Process; The CIA Triad; Why Does Your Organization Need a Security Infrastructure?; Analyzing Existing Security Policies and Procedures; Acceptable Use Policies
Privacy versus SecuritySecurity versus Usability; Designing a Framework for Implementing Security; Predicting Threats to Your Network; Recognizing Internal Security Threats; Increasing Security Awareness; Recognizing External Threats; Denial-of-Service Attacks; Distributed Denial-of-Service Attacks; Viruses, Worms, and Trojan Horses; Software Vulnerabilities; Nontechnical Attacks; What Motivates External Attackers?; Implementing Risk Analysis; Addressing Risks to the Corporate Network; Analyzing Security Requirements for Different Types of Data
Defining Best Practices for Designing Your Security FrameworkReviewing Compliancy; Citrix and HIPAA, Sarbanes-Oxley, FERPA; FIPS 40-2, FIPS 20 and HSPD- 2; Explaining Security Technologies; Digital Certificates; Cryptography; Auditing and Vulnerability Assessments; Assessment Types; Host Assessments; Network Assessments; Automated Assessments; Stand-Alone versus Subscription; Two Approaches; Administrative Approach; The Outsider Approach; The Hybrid Approach; Realistic Expectations; Defining Authentication Models; How Does the System Authenticate a User?; Kerberos
Understanding the Kerberos Authentication ProcessSecure Sockets Layer/Transport Layer Security; NT LAN Manager; Digest Authentication; Passport Authentication; Multifactor Authentication Models; Passwords; Windows Password Policies; Smart Card; Token; Biometrics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Security Guidance for Operating Systems and Terminal Services; Introduction; Windows 2003 Basics; Kernel Protection Mechanisms; Disk File System Basics and Recommendations; NTFS; FAT 32; Creating, Using, and Maintaining Users and Groups in Windows 2003
Local AccountsDomain Accounts; Windows 2003 Security Essentials; What Is Vulnerable in Windows 2003?; RUNAS Service; Files and Applications; Accounts Data; Providing Basic Security Levels in Windows 2003; Creating Security Templates; Analyzing Security Policy Templates and Machine Security Configuration; Installing and Checking Security Policy Templates; Attacking Windows 2003; System Identification Methods; Remote Enumeration; NetBIOS; SNMP; Probing; Local Enumeration; Authentication Attack Methods; Attacks Using Common and Known Vulnerabilities; Defending and Hardening Windows 2003
Evaluate Your Needs and Current Status
Summary: Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.C55S369 2008 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=405218 Available EBL405218

Front Cover; Securing Citrix XenApp Server in the Enterprise; Copyright Page; Technical Editor; Contributors; Contents; Chapter 1: Introduction to Security; Introduction; Defining Security; Defining Risk; Defining Value; Defining Threat; Defining Vulnerability; Defining Countermeasures; You Really Can't Counter Threat; What Is a Security Program?; Optimizing Risk; Consciously Accept Risk; Understanding the Security Design Process; The CIA Triad; Why Does Your Organization Need a Security Infrastructure?; Analyzing Existing Security Policies and Procedures; Acceptable Use Policies

Privacy versus SecuritySecurity versus Usability; Designing a Framework for Implementing Security; Predicting Threats to Your Network; Recognizing Internal Security Threats; Increasing Security Awareness; Recognizing External Threats; Denial-of-Service Attacks; Distributed Denial-of-Service Attacks; Viruses, Worms, and Trojan Horses; Software Vulnerabilities; Nontechnical Attacks; What Motivates External Attackers?; Implementing Risk Analysis; Addressing Risks to the Corporate Network; Analyzing Security Requirements for Different Types of Data

Defining Best Practices for Designing Your Security FrameworkReviewing Compliancy; Citrix and HIPAA, Sarbanes-Oxley, FERPA; FIPS 40-2, FIPS 20 and HSPD- 2; Explaining Security Technologies; Digital Certificates; Cryptography; Auditing and Vulnerability Assessments; Assessment Types; Host Assessments; Network Assessments; Automated Assessments; Stand-Alone versus Subscription; Two Approaches; Administrative Approach; The Outsider Approach; The Hybrid Approach; Realistic Expectations; Defining Authentication Models; How Does the System Authenticate a User?; Kerberos

Understanding the Kerberos Authentication ProcessSecure Sockets Layer/Transport Layer Security; NT LAN Manager; Digest Authentication; Passport Authentication; Multifactor Authentication Models; Passwords; Windows Password Policies; Smart Card; Token; Biometrics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2: Security Guidance for Operating Systems and Terminal Services; Introduction; Windows 2003 Basics; Kernel Protection Mechanisms; Disk File System Basics and Recommendations; NTFS; FAT 32; Creating, Using, and Maintaining Users and Groups in Windows 2003

Local AccountsDomain Accounts; Windows 2003 Security Essentials; What Is Vulnerable in Windows 2003?; RUNAS Service; Files and Applications; Accounts Data; Providing Basic Security Levels in Windows 2003; Creating Security Templates; Analyzing Security Policy Templates and Machine Security Configuration; Installing and Checking Security Policy Templates; Attacking Windows 2003; System Identification Methods; Remote Enumeration; NetBIOS; SNMP; Probing; Local Enumeration; Authentication Attack Methods; Attacks Using Common and Known Vulnerabilities; Defending and Hardening Windows 2003

Evaluate Your Needs and Current Status

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious

Description based upon print version of record.

There are no comments on this title.

to post a comment.