Laserfiche WebLink
Attachment C <br />Section 5 CyberSecurity Enhancement Eauipment <br />AEL Ref No Title /Description Fall 2004 <br />snsPi LErPP MMRSE,une SEL Ref Number <br />VAR <br />5.1 Software, Virus Protection <br />D rv] ] sr Virus protection software <br />05CS- 03 -AVIR <br />5.2 System, Intrusion Detection 05CS -02 -IDS <br />[� ❑d ❑d ❑d Intrusion detection devices and systems, deployed at either host or network <br />level to detect unauthorized or aberrant behaviors do the network. <br />5.3 Scanning and Penetration Tools <br />�j 0 �, �/j Tools for scanning and vulnerability detection <br />5.4 Firewalls and Authentication Technologies 04SW- 02 -PFWL <br />❑d �� �] Includes both firewalls for workstations and network -level firewalls. The <br />latter may include both firewall software and a hardware platform, or may be <br />sold as a firewall appliance. <br />5.5 Software, Encryption 05CS -01 -ECRP <br />W ❑sr ❑d ❑Encryption software for protecting stored data files or email messages. <br />5.6 Encryption, Data Transmission 05CS- 01 -ETRN <br />❑d E/] ❑d A class of network access solutions, usually for remote access, that provide <br />encrypted user access. Some will utilize hardware "tokens" in addition to <br />software clients. This includes Virtual Private Networks, and encrypted <br />transmission modes such as SSH and SSL. <br />5.7 Software, Network management 04SW- 02 -NMGT <br />© © ❑� © Network management software for monitoring network performance and/or <br />maintaining configuration. <br />5.8 Configuration /Patch Management <br />k © ❑d © Configuration management and patch management/dissemination tools. <br />5.9 Countermeasures <br />�/❑ ❑d ]❑ Security hardware and software countermeasures to protect against cyber <br />attacks. <br />Interactive versions of this appendix and the Fall 2004 SEL are available on -line at www.rkb.mip4org. <br />Wednesday, April 27, 2005 Full AEL: Page 30 of 79 <br />