filtering firewalls, 110 112
sniffers, 79 80
switching, development, history, 3 4
Palo Alto Research Center, 12
PARC. see Palo Alto Research Center
Partridge, Craig, 8
Passwords
authentication and, 152
authorization, 159 160
basic authentication, 83 85
crackable, preventing, 57
management, 160
use, guidelines, 57
PEM, 74
Performance indicators, 63
Perimeters, security, 49
PGP. see Pretty good privacy
Ping of death, 93
PKI. see Public key infrastructure
Plans and policies
acceptable use, 59
access control, 57
change control, 60
compliance, 60
data classification, 56
goals/objectives, 53
implementation
execution, 64 65
goals/objectives, 62
infrastructure, 63 64
overview, 60
pilots, 64
scope, 62
training, 64 65
incident handling, 58 59
network security, 55
passwords, 57 58
physical security, 55
responsibilities, 53 55
scope, 53
training, 60
Point-to-point tunneling protocol, 95 96
Ports, 30 32
PortWatch, 279
Postel, Jon, 5, 8
PPTP. see Point-to-point tunneling protocol
Pretty good privacy, 74, 76
PrivacyMaker, 279
Process owners, 54
ProtectX, 278
Protocols. see specific protocols
Proxy-server firewall, 112 114
Pseudocode, 218
Public key infrastructure
certificate
authority, 178 183
practice statement, 183 187
revocation lists, 187 189
closed systems, 178 179
components, 171 172
cryptography standards, 194 195
key recovery, 189 190
LDAP, 190 193
open systems, 179 183
service environments, applications, 170 171
X.509
attribute types and, 172
certificate, 174 178
concept of, 172
infrastructure standards, 195 197
Public system, description, 179 180
|