セキュリティ

コンピュータに適切なセキュリティ対策がなされていると、悪意のある第三者による外部からの侵入だけでなく、制限されている情報に一般ユーザーが偶然アクセスしたり、誤って重要なファイルを改変するなどの、さまざまなセキュリティ上の問題を軽減したり、取り除くことができます。

ここでは、Web サイトを適切に保護し、その他の重要なセキュリティ機能を実現するために、Web サーバーおよび Windows の両方を構成する方法について説明します。

ここで説明する項目は、次のとおりです。

関連するその他の項目


© 1997-2001 Microsoft Corporation.All rights reserved.

(The following words are used by Search; they are not intended to be displayed on the page.) security, secure, lock down, lock-down, lockdown, insecure, risk, hack, hacker, hackers, crack, cracker, crackers, exploit, firewall, unauthorized, illegal, steal, sniff, sniffs, sniffer, satan, checklist, weakness, weaknesses, vulnerable, vulnerability, gap, hole, open, spoof, fraud, defraud, fraudulent, false, bogus, virus, deface, attack, denial of service, denial-of-service, exe, .exe, executable, script, overload, spam, harrass, flood, syn flood, syn-flood, synflood, buffer overrun, buffer overload, long url, attack, attacks, breach, defeat, circumvent, overwrite, password, links, more information passwords, identity, identify, identification, logon, log on, credentials, control, user, users, authenticate, digest authentication, challenge/response, basic, ntlm, digest, control, restrict, deny, keep out, safe, confidential, sensitive, secret, protect, shield, hide, hidden, defend, defense, defending, against, defeat, stop, prevent, prevention, file, files, directory, ntfs, user account, nt account, permission, permissions, privilege, privileges, admin, administrator, operator, invalid, valid, directories, share, shared, public, private, privacy, access, limit, limited, encrypt, encryption, encrypted, hash, hashed, scramble, scrambled, intercept, code, coder, md5, kerberos, base64, digital, cleartext, clear, text, certificate, server certificate, personal certificate, certification provider, authority, certify, certified, base-64, base64, base 64, key, key, 40 bit, 40-bit, 128 bit, 128-bit, cipher, cypher, ssl, secure sockets layer, fortezza, track, audit, monitor, monitoring, detect, detection, alert, notify, false, repeated, unsuccessful attempts, intrude, intruder, intrusion, sneak, log, logs, logging, attempt, attempts, gain entry, enter, upload, trojan horse, back orifice, backorifice, html.internal, wizard, wizards, trust, trusted, account, accounts