[html xmlns:o=urn:schemas-microsoft-com:office:officexmlns:w=urn:schemas-microsoft-com:office:wordxmlns=http://www.w3.org/TR/REC-html40>Preface @font-face {font-family:Times New Roman; panose-1:0 2 2 6 3 5 4 5 2 3; mso-font-alt:Times; mso-font-charset:77; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:variable; mso-font-signature:50331648 0 0 0 1 0;}@font-face {font-family:Geneva; panose-1:0 2 11 5 3 3 4 4 4 2; mso-font-charset:0; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:50331648 0 0 0 1 0;}@font-face {font-family:Frutiger 67BoldCn; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;}@font-face {font-family:New Caledonia; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;}@font-face {font-family:I New Caledonia Italic; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;}@font-face {font-family:Courier-AddisonWesley; mso-font-alt:Arial; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Geneva; color:fuchsia;}p.HB, li.HB, div.HB {mso-style-name:HB; mso-style-parent:; margin-top:12.0pt; margin-right:0in; margin-bottom:71.0pt; margin-left:0in; line-height:36.0pt; mso-line-height-rule:exactly; mso-pagination:widow-orphan; font-size:34.0pt; font-family:Frutiger 67BoldCn;}p.Body, li.Body, div.Body {mso-style-name:Body; mso-style-parent:; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:48.0pt; margin-bottom:.0001pt; text-align:justify; text-indent:.25in; line-height:13.0pt; mso-line-height-rule:exactly; mso-pagination:widow-orphan lines-together; font-size:11.0pt; font-family:New Caledonia;}p.BodyNoIndent, li.BodyNoIndent, div.BodyNoIndent {mso-style-name:BodyNoIndent; mso-style-parent:Body; margin-top:0in; margin-right:0in; margin-bottom:0in; margin-left:48.0pt; margin-bottom:.0001pt; text-align:justify; line-height:13.0pt; mso-line-height-rule:exactly; mso-pagination:widow-orphan lines-together; font-size:11.0pt; font-family:New Caledonia;}span.BodyCODE {mso-style-name:BodyCODE; mso-style-parent:; font-size:9.5pt; letter-spacing:0pt;} @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no; mso-footnote-position:end-of-section; mso-endnote-position:end-of-section; mso-footnote-numbering-start:0; mso-endnote-numbering-style:arabic; mso-endnote-numbering-start:0;}@page Section1 {size:588.0pt 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;}div.Section1 {page:Section1;}--> Preface As long as networks of Microsoft Windows systems aremanaged, administered, and used by people, security incidents will occur.Regardless of whether weOre talking about hundreds of corporate Windowsworkstations and servers or home user systems running Windows XP on broadbandconnections to the Internet, Windows systems will be attacked, compromised, andused for malicious purposes
This is not to say that only Windows systems willbe attacked; rather, Windows systems are highly pervasive throughout the entirecomputing infrastructure, from home and school systems to high-end e-commercesites. In contrast to this pervasiveness, information regarding conductingeffective incident response and forensic audit activities on Wi
|
|