| < Day Day Up > |
|
Names and naming conventions, 67-69, 83, 88, 90-91
NAT (Network Address Translation), 128-129, 135
Natural disasters. See Physical security
NetBus (Backdoor Netbus) Trojan Horse, 341, 353
Network Address Translation (NAT), 128-129, 135, 135
Network-based IDS (NIDS), 120
Network countermeasures
defined, 122-123
firewalls, 123-124
IPSec, 124
Virtual Private Networks (VPNs), 123-128
Network layer of OSI, 97
Network News Transfer Protocol (NNTP), 260
Network scanners, 44
Network security
cabling, 104-107
countermeasures, 122-129
firewalls, 123-124
IPSec, 124
monitors, 126
scanners, 44
topologies, 98-104
Virtual Private Networks (VPNs), 123-128
see also Communications security
Neural Networks, 277
Newsgroups, 260
NIDS (network-based IDS), 120
1974 Federal Privacy Act, 304
1984 First Computer Security Act, 304
1986 Computer Fraud and Abuse Act, 304
1987 Computer Security Act, 304-305
1994 Computer Abuse Amendments Act, 305
1994 US Communications Assistance for Law Enforcement Act, 305
1996 US Economic and Protection of Proprietary Information, 305
1999 Gramm-Leach-Bliley Law, 305, 319, 328
NNTP (Network News Transfer Protocol), 260
Noise and database security, 272, 292
Nonessential services and protocols, removing or disabling, 33-34
Non-interference access control model, 22
Nonrepudiation
defined, 18, 151, 182
protecting, 62
Notification procedures, 230-231, 235
Novell Single Sign-on (NSSO) 2.1 bundle, 27
| < Day Day Up > |
|