Laserfiche WebLink
<br />Section 5 CvberSecuritv Enhancement Eauioment <br />AEL Ref No Title <br />~ :;;;;~ ,~~~:p Description <br /> <br />ilJZPP C__ <br /> <br />Spring 2006 SEL <br />Reference Number <br /> <br />Check boxes under each record show SUDDorted TaNlet CaDabilitv(ies) bv number. See list at beeinninf! ofreDort for kev <br /> <br />5.2.4 <br /> <br />~~~~ <br /> <br />Shredder / Disintegrator <br /> <br />Shredding or disintegrating device for the destruction of sensitive materials such as reports or encryption <br />key material. Products evaluated by the National Security Agency can be found in (a) NSA/CSS <br />Evaluated Products Ust (EPL) for High-Security Disintegrators, Annex A to NSAlCSS 02-02, dated 31 July <br />2004; or (b) NSAlCSS Evaluated Products Ust (EPL) for High Security Crosscut Paper Shredders, Annex <br />A to NSA/CSS 02-01, dated 31 July 2004. <br /> <br />(ONLY PRODUCTS CONTAINED IN ONE OF THE TWO LISTS ABOVE ARE ALLOWABLE.) <br />1 2 3 4 S 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />D~DDD~~~D==DDDDDDDDDDDDnD=DDDDDDnDDDD <br /> <br />(5.3) <br />5.3.1 <br />i,1~ <br />~ ~ <br />~~ <br /> <br />Host Level Security <br /> <br />Software, Malware Protection <br />Software for protection against viruses, spyware, and malicious code. May be obtained for individual hosts <br />or for entire network segments. <br /> <br />~~ <br />~~ <br /> <br />05HS-OO-MALW <br /> <br />1 2 3 4 5 6 7 8 9 10 lJ 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />~~nD~~~~~~U=n~~DnDDDn~~~DD~~=~C~DnD=D <br /> <br />5.3.2 <br />~~~~ <br />~~~~ <br />~~ <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />~~DD~~~~~~D=D~~DDDDDD~~~D=~~D~D~DDDDD <br /> <br />System, Personal Firewall <br />Personal firewall for operation on individual workstations. <br />also available. <br /> <br />05HS-OO-PFWL <br /> <br />Usually a software solution, but appliances are <br /> <br />5.3.3 System, Patch/Configuration Management <br />~ ~ ~ ~ System to manage the update and installation of patches, applications, and/or operating systems, utilized <br />~ ~ by an organization in order to maintain current "version control." <br />~ ~.. <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />n~DDDU~~~~DDD~~DDD~DD~~~=DD~D~D~DDDDn <br /> <br />05PM-OO-PTCH <br /> <br />Software, Forensic <br />Application suites that allow in-depth analysis of hosts based on operating system and file systems. <br />Software of this type may be used by law enforcement officers, governmenUcorporate investigators and <br />consultants to investigate the aftermath of computer-related crimes. Forensics software generally <br />includes disk analysis tools, tools for the recovery of deleted files, and integrated database support to mark <br />files and data of interest to investigators. <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />~~DD~~~~~~DDD~~DDDDDD~~~DD~~D~n~DDDnD <br /> <br />5.3.4 <br />~~~~ <br />~~~~ <br />~ ~ <br /> <br />05HS-OO-FRNS <br /> <br />Interactive versions of this appendix and the Fall 2005 SEL are available on-line at www.rkb.mipt.org. <br />Friday, August 11,2006 Full AEL: Page 43 of 123 <br />