Information technology
business continuity
backup methods, 267 270
contingency plans, 270 271
function, 264
impact analysis, 265
pilots, 271
policy, 264 265
roles/responsibilities, 265 266
testing plans, 271
infrastructure damage
CERT, incident reporting
contacts, 288 290
data, 290 294
definition, 285 286
procedures, 294 296
timing, 296 297
incident handling
analysis system, 257
components, 257
procedures, 259 262
processes, 257 258
reporting system, 257
requirements, 256
steps, 254 256
team implementation, 262 263
recovery
backup methods, 267 270
contingency plans, 270 271
description, 263 264
pilots, 271
roles/responsibilities, 265 266
testing plans, 271
Windows NT intruder
listing 1, 299 306
listing 2, 306 307
listing 3, 307 311
procedures, 297 299
security, risks analysis, 237 241
trusted network, 45 49
International Telecommunication Union, 195
Internet
activities board, 9
addressing, 20 21
anywhere toolkit, 277
assigned numbers authority, 36 37
birth of, 10
definition, 11
engineering task force, 195 196
history
1960's, 3 4
1970's, 5 7
1980's, 7 10
infrastructure, analysis, 109 110
security analysis (see Security analysis)
Intrusion detection systems, 142
IPSec. see IP security protocol
IP security protocol, description, 96 97
ITU. see International Telecommunication Union
|