My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
ANAHEIM, CITY OF - 2005
Clerk
>
Contracts / Agreements
>
INACTIVE CONTRACTS (Originals Destroyed)
>
A (INACTIVE)
>
ANAHEIM, CITY OF - 2005
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
7/22/2015 12:39:18 PM
Creation date
6/19/2006 11:50:25 AM
Metadata
Fields
Template:
Contracts
Company Name
City of Anaheim
Contract #
A-2005-310-19
Agency
Police
Council Approval Date
9/19/2005
Destruction Year
2012
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
303
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Attachment C <br />Section 5 CvberSecurity Enhancement Eauinment <br />AEL Ref No Title /Description Fall 2004 <br />.SHSP/ LETPP AIMRS EMPG SEL Ref Number <br />Un l <br />5.1 Software, Virus Protection <br />❑� FV] S6 Virus protection software <br />05CS- 03 -AVIR <br />5.2 System, Intrusion Detection 05CS -02 -IDS <br />0 0 0 0 Intrusion detection devices and systems, deployed at either host or network <br />level to detect unauthorized or aberrant behaviors on the network. <br />5.3 Scanning and Penetration Tools <br />0 0 0 0 Tools for scanning and vulnerability detection <br />5.4 Firewalls and Authentication Technologies 04SW- 02 -PFWL <br />0 0 0 0 Includes both firewalls for workstations and network -level firewalls. The <br />latter may include both firewall software and a hardware platform, or may be <br />sold as a firewall appliance. <br />5.5 Software, Encryption 05CS- 01 -ECRP <br />0 0 0 0 Encryption software for protecting stored data files or email messages. <br />5.6 Encryption, Data Transmission 05CS- 01 -ETRN <br />0 0 0 0 A class of network access solutions, usually for remote access, that provide <br />encrypted user access. Some will utilize hardware "tokens" in addition to <br />software clients. This includes Victual Private Networks, and encrypted <br />transmission modes such as SSH and SSL. <br />5.7 Software, Network management 04SW- 02 -NMGT <br />o ©o © Network management software for monitoring network performance and /or <br />maintaining configuration. <br />5.8 Configuration /Patch Management <br />0 0 Configuration management and patch management/dissemination tools. <br />5.9 Countermeasures <br />0 0 0 0 Security hardware and software countermeasures to protect against cyber <br />attacks. <br />Interactive versions of this appendix and the Fail 2004 SEL are available on -line at www.rkb.mipt org. <br />Wednesday, April 27, 2005 Fult AEL: Page 30 of 78 <br />
The URL can be used to link to this page
Your browser does not support the video tag.