Secure hashing algorithm, 75
Secure/multipurpose Internet mail extensions, 74 75
Secure socket layer
appliance
extranet, 139 141
network
deployment, 135
description, 134
end-to-end/one way, 135
key generation capacity, 135
one-way/end-to-end, 135
summary, 137 138
transaction acceleration, 136 137
basic function, 98 99
description, 80
development, 98
enabling, 81 83
encryption, 98 100
handshake, 98 99
legal issues, 101 102
management, air gap, 144 144
transactions, certificates, 102 106
Security
managers, responsibilities, 54
perimeters, 49
zones, 49
Security analysis
costs
appraisal, 246
external, 246 252
internal, 246
prevention, 245
plans/policies
acceptable use, 59
access control, 57
change control, 60
compliance, 60
data classification, 56
goals/objectives, 53
implementation, 60 65
incident handling, 58 59
network security, 55
passwords, 57 58
physical security, 55
responsibilities, 53 55
scope, 53
training, 60
requirements, steps to, 42 45
risk assessment, 49 52
technology, 45 49
Service legal agreement, 256
SHA-1. see Secure hashing algorithm
Shakespeare, William, 70
Share finder, 279
Single sign-on programs, 164 166
SIZE, 226 227
Slater, Christian, 70
Smart cards, 154, 166 168
S/MIME. see Secure/multipurpose Internet mail extensions
SMTP configuration settings, 226 230
SPAM, 208
spam, 208 211
Spamming, 93
Spoofing attack domain name system (DSN) query, 93
SSL. see Secure Socket Layer
Stakeholders, 43
Stanford Linear Accelerator Center, 10
Surfing. see Scanning
|