Laserfiche WebLink
<br />Section 5 CvberSecuritv Enhancement EQuioment <br /> <br />AEL Ref No <br /> <br />Title <br /> <br />Spring 1006 SEL <br />Reference Number <br /> <br />.~,I!~~I LEUI' MMIlS eel" <br />1~~PG ISSGI' T'SCP I'SGP <br />IBuP I~=- <br /> <br />Description <br /> <br />Check boxes under each record show SIIDDorted Tllrtlet CaDabilitv(iesJ bv number. See list at hellinnine ofreDort for kev <br /> <br />(5.4) <br />5.4.1 <br />~~~~ <br />~ ~ <br /> <br />Network Perimeter Security <br /> <br />Firewalls and Authentication Technologies, Network <br />Firewall (software or standalone appliance) for use in protecting networks. <br /> <br />05NP-OO-FWAL <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />D~DD~~~~~~DDD~~DDD~DD~~~DDD~Li~D~~~D~D <br /> <br />5.4.2 System, Intrusion Detection 05NP-OO-IDS <br /> <br />~ ~ ~ ~ Intrusion Detection System (IDS), deployed at either host or network level to detect unauthorized or <br />~ ~ ~ ~ aberrant behavior on the network. Software and hardware (appliance) solutions exist. <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 3S 36 37 <br />C~DD~~~~~~DLDC~DDDDDD~D~DDD~D~D~DDDDD <br /> <br />5.4.3 <br />~~~~ <br />~~ <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />[J ~ D u i,{1 ~ ~ ~ 1"'1 ~ D C LJ C ~ LI D D D OJ ~ D ~ D D [! ["'I C ~ [J ~ n D riD D <br /> <br />Scanning and Penetration Tools <br />Port scanners and other tools designed to identify security vulnerabilities on networks or individual hosts <br />on target networks. <br /> <br />05NP-OO-SCAN <br /> <br />System, Security Event/Incident Management <br />Software or appliance that gathers data from multiple security sources such as firewalls, intrusion <br />detection systems, malware protection systems, etc. to provide log file consolidation and event correlation <br />capability in support of network security operations. <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />D~D'~~~~~~DDnD~nDDDDD~D~DDC~C~D~DDunD <br /> <br />5.4.4 <br />~~ <br />~~ <br /> <br />05NP-OO-SEIM <br /> <br />~~ <br />~~ <br /> <br />lnteractive versions of this appendix and the Fa/I 2005 SEL are available on-line at www.rkb.miptorg. <br />Friday, Auguslll, 2006 Full AEL: Page 44 of 123 <br />