My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
ANAHEIM, CITY OF 5-2006
Clerk
>
Contracts / Agreements
>
A
>
ANAHEIM, CITY OF 5-2006
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/3/2012 3:24:37 PM
Creation date
2/15/2007 1:03:48 PM
Metadata
Fields
Template:
Contracts
Company Name
ANAHEIM, CITY OF
Contract #
A-2006-326-01
Agency
POLICE
Council Approval Date
12/18/2006
Destruction Year
0
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
398
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />Section 5 CvberSecuritv Enhancement Eauioment <br />AEL Ref No Title <br />~ :;;;;~ ,~~~:p Description <br /> <br />ilJZPP C__ <br /> <br />Spring 2006 SEL <br />Reference Number <br /> <br />Check boxes under each record show SUDDorted TaNlet CaDabilitv(ies) bv number. See list at beeinninf! ofreDort for kev <br /> <br />5.2.4 <br /> <br />~~~~ <br /> <br />Shredder / Disintegrator <br /> <br />Shredding or disintegrating device for the destruction of sensitive materials such as reports or encryption <br />key material. Products evaluated by the National Security Agency can be found in (a) NSA/CSS <br />Evaluated Products Ust (EPL) for High-Security Disintegrators, Annex A to NSAlCSS 02-02, dated 31 July <br />2004; or (b) NSAlCSS Evaluated Products Ust (EPL) for High Security Crosscut Paper Shredders, Annex <br />A to NSA/CSS 02-01, dated 31 July 2004. <br /> <br />(ONLY PRODUCTS CONTAINED IN ONE OF THE TWO LISTS ABOVE ARE ALLOWABLE.) <br />1 2 3 4 S 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />D~DDD~~~D==DDDDDDDDDDDDnD=DDDDDDnDDDD <br /> <br />(5.3) <br />5.3.1 <br />i,1~ <br />~ ~ <br />~~ <br /> <br />Host Level Security <br /> <br />Software, Malware Protection <br />Software for protection against viruses, spyware, and malicious code. May be obtained for individual hosts <br />or for entire network segments. <br /> <br />~~ <br />~~ <br /> <br />05HS-OO-MALW <br /> <br />1 2 3 4 5 6 7 8 9 10 lJ 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />~~nD~~~~~~U=n~~DnDDDn~~~DD~~=~C~DnD=D <br /> <br />5.3.2 <br />~~~~ <br />~~~~ <br />~~ <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />~~DD~~~~~~D=D~~DDDDDD~~~D=~~D~D~DDDDD <br /> <br />System, Personal Firewall <br />Personal firewall for operation on individual workstations. <br />also available. <br /> <br />05HS-OO-PFWL <br /> <br />Usually a software solution, but appliances are <br /> <br />5.3.3 System, Patch/Configuration Management <br />~ ~ ~ ~ System to manage the update and installation of patches, applications, and/or operating systems, utilized <br />~ ~ by an organization in order to maintain current "version control." <br />~ ~.. <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />n~DDDU~~~~DDD~~DDD~DD~~~=DD~D~D~DDDDn <br /> <br />05PM-OO-PTCH <br /> <br />Software, Forensic <br />Application suites that allow in-depth analysis of hosts based on operating system and file systems. <br />Software of this type may be used by law enforcement officers, governmenUcorporate investigators and <br />consultants to investigate the aftermath of computer-related crimes. Forensics software generally <br />includes disk analysis tools, tools for the recovery of deleted files, and integrated database support to mark <br />files and data of interest to investigators. <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />~~DD~~~~~~DDD~~DDDDDD~~~DD~~D~n~DDDnD <br /> <br />5.3.4 <br />~~~~ <br />~~~~ <br />~ ~ <br /> <br />05HS-OO-FRNS <br /> <br />Interactive versions of this appendix and the Fall 2005 SEL are available on-line at www.rkb.mipt.org. <br />Friday, August 11,2006 Full AEL: Page 43 of 123 <br />
The URL can be used to link to this page
Your browser does not support the video tag.