Information technology

business continuity

backup methods, 267 270

contingency plans, 270 271

function, 264

impact analysis, 265

pilots, 271

policy, 264 265

roles/responsibilities, 265 266

testing plans, 271

infrastructure damage

CERT, incident reporting

contacts, 288 290

data, 290 294

definition, 285 286

procedures, 294 296

timing, 296 297

incident handling

analysis system, 257

components, 257

procedures, 259 262

processes, 257 258

reporting system, 257

requirements, 256

steps, 254 256

team implementation, 262 263

recovery

backup methods, 267 270

contingency plans, 270 271

description, 263 264

pilots, 271

roles/responsibilities, 265 266

testing plans, 271

Windows NT intruder

listing 1, 299 306

listing 2, 306 307

listing 3, 307 311

procedures, 297 299

security, risks analysis, 237 241

trusted network, 45 49

International Telecommunication Union, 195

Internet

activities board, 9

addressing, 20 21

anywhere toolkit, 277

assigned numbers authority, 36 37

birth of, 10

definition, 11

engineering task force, 195 196

history

1960's, 3 4

1970's, 5 7

1980's, 7 10

infrastructure, analysis, 109 110

security analysis (see Security analysis)

Intrusion detection systems, 142

IPSec. see IP security protocol

IP security protocol, description, 96 97

ITU. see International Telecommunication Union



Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net