Index_S

ScanMail, 275

Scanning, 31 32

Secure hashing algorithm, 75

Secure/multipurpose Internet mail extensions, 74 75

Secure socket layer

appliance

extranet, 139 141

network

deployment, 135

description, 134

end-to-end/one way, 135

key generation capacity, 135

one-way/end-to-end, 135

summary, 137 138

transaction acceleration, 136 137

basic function, 98 99

description, 80

development, 98

enabling, 81 83

encryption, 98 100

handshake, 98 99

legal issues, 101 102

management, air gap, 144 144

transactions, certificates, 102 106

Security

managers, responsibilities, 54

perimeters, 49

zones, 49

Security analysis

costs

appraisal, 246

external, 246 252

internal, 246

prevention, 245

plans/policies

acceptable use, 59

access control, 57

change control, 60

compliance, 60

data classification, 56

goals/objectives, 53

implementation, 60 65

incident handling, 58 59

network security, 55

passwords, 57 58

physical security, 55

responsibilities, 53 55

scope, 53

training, 60

requirements, steps to, 42 45

risk assessment, 49 52

technology, 45 49

Service legal agreement, 256

SHA-1. see Secure hashing algorithm

Shakespeare, William, 70

Share finder, 279

Single sign-on programs, 164 166

SIZE, 226 227

Slater, Christian, 70

Smart cards, 154, 166 168

S/MIME. see Secure/multipurpose Internet mail extensions

SMTP configuration settings, 226 230

SPAM, 208

spam, 208 211

Spamming, 93

Spoofing attack domain name system (DSN) query, 93

SSL. see Secure Socket Layer

Stakeholders, 43

Stanford Linear Accelerator Center, 10

Surfing. see Scanning



Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net