Laserfiche WebLink
<br />Attachment C <br /> <br />Section 5 CvberSecuritv Enhancement Equipment <br /> <br />AEL ReJ No Title / Description <br />SHSP/ LETPP MMRS EMPG <br />UASI <br /> <br />Fal/2004 <br />SEL ReJNumber <br /> <br />5.1 Software, Virus Protection 05CS.03-AVIR <br />RI RI RI ~ Virus protection software <br />5.2 System, Intrusion Detection 05CS.02.1 DS <br />RI RI RI RI Intrusion detection devices and systems, deployed at either host or network <br /> level to detect unauthorized or aberrant behaviors 6n the network. <br />5.3 Scanning and Penetration Tools <br />RI RI l.!! RI Tools for scanning and vulnerability detection <br />5.4 Firewalls and Authentication Technologies 04SW.02.PFWL <br />RI RI RI ~ Includes both firewalls for workstations and network-level firewalls. The <br /> latter may include both firewall software and a hardware platform, or may be <br /> sold as a firewall appliance. <br />5.5 Software, Encryption 05CS.01.ECRP <br />~ Ii'I RI RI Encryption software for protecting stored data files or amail messages. <br />5.6 Encryption, Data Transmission 05CS.01.ETRN <br />RI RI RI RI A class of network access solutions, usually for remote access, that provide <br /> encrypted user access. Some will utilize hardware "tokens" in addition to <br /> software clients. This Includes Virtual Private Networks, and encrypted <br /> transmission modes such as SSH and SSL. <br />5.7 Software, Network management 04SW.02.NMGT <br />Ii'I RI RI RI Network management software for monitoring network performance and/or <br /> maintaining configuration. <br />5.8 ConfigurationlPatch Management <br />RI RI RI RI Configuration management and patch management/dissemination tools. <br />5.9 Countermeasures <br />RI RI RI RI Security hardware and software countermeasures to protect against cyber <br /> attacks. <br /> <br />Interactive versions oJthis appendix and the Fall 2004 SEL afe available on-line at WWHI.rkb.miptorg. <br />Wednesday, April 27, 2005 Full AEL: Page 30 of 78 <br />