Acquisitions, security and, 48 49
Addresses. see also Domains
class A, 21 22, 23
class B, 22, 23
class C, 22, 23
resolution protocol, 27 29
Air gap-based filtering proxies
creation, 142
description, 143
external server, 143
function, 143 144
internal server
authentication, 145
benefits, 146 148
inbound filtering, 145 146
SSL management, 144 145
switch, 144
Algorithms, 71 73
Andreesen, Marc, 10
Application gateway firewall, 112 114
Argus, 274
ARPANET
creation, 3
defense R&D, 7 8
fruition, 4 5
IMP, 4
reliability, 6
Attacker 2.1, 276
Auditors, security responsibilities, 55
Authentication
air gap-based proxies, 145
basic, 84 85
complexity, 150 151
methods
anonymous, 154 155
biometric, 153 154
certificates, 152 153
password, 152
smart cards, 154
status codes, 155 157
user name, 152
service exchange, 163
Authorization
complexity, 150 151
description, 150, 158
Kerberos
description, 162 163
development, 162
protocols, 163 164
passwords, 159 160
single sign-on, 164 166
smart cards, 166 168
tokens, 160 162
|