My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
AIRBOURNE LAW ENFORCEMENT (ABLE)-2006
Clerk
>
Contracts / Agreements
>
A
>
AIRBOURNE LAW ENFORCEMENT (ABLE)-2006
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/3/2012 3:22:16 PM
Creation date
12/19/2006 12:00:16 PM
Metadata
Fields
Template:
Contracts
Company Name
AIRBOURNE LAW ENFORCEMENT (ABLE)
Contract #
A-2005-310-24
Agency
POLICE
Council Approval Date
9/19/2005
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
299
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />Attachment C <br /> <br />Section 5 CvberSecuritv Enhancement EQuioment <br /> <br />AEL Ref No Title / Description <br />SI1SP/ LETPP MMRS EMPG <br />VA.S! <br /> <br />Fall 2004 <br />SEL Ref Number <br /> <br />5,1 Software, Virus Protection 05CS-03-AVIR <br />~ ~ lii'l ~ Virus protection software <br />5.2 System, Intrusion Detection 05CS-02-IDS <br />~ ~ ~ ~ Intrusion detection devices and systems, deployed at either host or network <br /> level to detect unauthorized or aberrant behaviors oil the network. <br />5,3 Scanning and Penetration Tools <br />~ ~ ~ ~ Tools for scanning and vulnerability detection <br />5,4 Firewalls and Authentication Technologies 04SW-02-PFWL <br />[,Ii] [,(1 1"'1 1"'1 Includes both firewalls for workstations and network-level firewalls. The <br /> latter may include both firewall software and a hardware platform, or may be <br /> sold as a firewall appliance. <br />5,5 Software, Encryption 05CS-01-ECRP <br />~ ~ ~ ~ Encryption software for protecting stored data files or amail messages. <br />5,6 Encryption, Data Transmission 05CS-01-ETRN <br />~ ~ ~ ~ A class of network access solutions, usually for remote access, that provide <br /> encrypted user access. Some will utilize hardware "tokens" in addition to <br /> software clients. This includes Virtual Private Networks, and encrypted <br /> transmission modes such as SSH and SSL. <br />5.7 Software, Network management 04SW-02-NMGT <br />~ ~ ~ ~ Network management software for monitoring network performance and/or <br /> maintaining configuration. <br />5.8 Configuration/Patch Management <br />~ ~ ~ ~ Configuration management and patch managemenVdissemination tools. <br />5,9 Countermeasures <br />~ ~ ~ ~ Security hardware and software countermeasures to protect against cyber <br /> attacks. <br /> <br />Interactive versions of this appendix and the Fall 2004 SEL are available on-line at www.rkb.mipLorg. <br />Wednesday, April 27, 2005 Full AEL: Page 30 0/78 <br />
The URL can be used to link to this page
Your browser does not support the video tag.