switching, development, history, 3 4

Palo Alto Research Center, 12

PARC. see Palo Alto Research Center

Partridge, Craig, 8

Passwords

authentication and, 152

authorization, 159 160

basic authentication, 83 85

crackable, preventing, 57

management, 160

use, guidelines, 57

PEM, 74

Performance indicators, 63

Perimeters, security, 49

PGP. see Pretty good privacy

Ping of death, 93

PKI. see Public key infrastructure

Plans and policies

acceptable use, 59

access control, 57

change control, 60

compliance, 60

data classification, 56

goals/objectives, 53

implementation

execution, 64 65

goals/objectives, 62

infrastructure, 63 64

overview, 60

pilots, 64

scope, 62

training, 64 65

incident handling, 58 59

network security, 55

passwords, 57 58

physical security, 55

responsibilities, 53 55

scope, 53

training, 60

Point-to-point tunneling protocol, 95 96

Ports, 30 32

PortWatch, 279

Postel, Jon, 5, 8

PPTP. see Point-to-point tunneling protocol

Pretty good privacy, 74, 76

PrivacyMaker, 279

Process owners, 54

ProtectX, 278

Protocols. see specific protocols

Proxy-server firewall, 112 114

Pseudocode, 218

Public key infrastructure

certificate

authority, 178 183

practice statement, 183 187

revocation lists, 187 189

closed systems, 178 179

components, 171 172

cryptography standards, 194 195

key recovery, 189 190

LDAP, 190 193

open systems, 179 183

service environments, applications, 170 171

X.509

attribute types and, 172

certificate, 174 178

concept of, 172

infrastructure standards, 195 197

Public system, description, 179 180



Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net