My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
ANAHEIM, CITY OF 5-2006
Clerk
>
Contracts / Agreements
>
A
>
ANAHEIM, CITY OF 5-2006
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/3/2012 3:24:37 PM
Creation date
2/15/2007 1:03:48 PM
Metadata
Fields
Template:
Contracts
Company Name
ANAHEIM, CITY OF
Contract #
A-2006-326-01
Agency
POLICE
Council Approval Date
12/18/2006
Destruction Year
0
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
398
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />Section 5 CvberSecuritv Enhancement EQuioment <br /> <br />AEL Ref No <br /> <br />Title <br /> <br />Spring 1006 SEL <br />Reference Number <br /> <br />.~,I!~~I LEUI' MMIlS eel" <br />1~~PG ISSGI' T'SCP I'SGP <br />IBuP I~=- <br /> <br />Description <br /> <br />Check boxes under each record show SIIDDorted Tllrtlet CaDabilitv(iesJ bv number. See list at hellinnine ofreDort for kev <br /> <br />(5.4) <br />5.4.1 <br />~~~~ <br />~ ~ <br /> <br />Network Perimeter Security <br /> <br />Firewalls and Authentication Technologies, Network <br />Firewall (software or standalone appliance) for use in protecting networks. <br /> <br />05NP-OO-FWAL <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />D~DD~~~~~~DDD~~DDD~DD~~~DDD~Li~D~~~D~D <br /> <br />5.4.2 System, Intrusion Detection 05NP-OO-IDS <br /> <br />~ ~ ~ ~ Intrusion Detection System (IDS), deployed at either host or network level to detect unauthorized or <br />~ ~ ~ ~ aberrant behavior on the network. Software and hardware (appliance) solutions exist. <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 3S 36 37 <br />C~DD~~~~~~DLDC~DDDDDD~D~DDD~D~D~DDDDD <br /> <br />5.4.3 <br />~~~~ <br />~~ <br /> <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />[J ~ D u i,{1 ~ ~ ~ 1"'1 ~ D C LJ C ~ LI D D D OJ ~ D ~ D D [! ["'I C ~ [J ~ n D riD D <br /> <br />Scanning and Penetration Tools <br />Port scanners and other tools designed to identify security vulnerabilities on networks or individual hosts <br />on target networks. <br /> <br />05NP-OO-SCAN <br /> <br />System, Security Event/Incident Management <br />Software or appliance that gathers data from multiple security sources such as firewalls, intrusion <br />detection systems, malware protection systems, etc. to provide log file consolidation and event correlation <br />capability in support of network security operations. <br />1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 <br />D~D'~~~~~~DDnD~nDDDDD~D~DDC~C~D~DDunD <br /> <br />5.4.4 <br />~~ <br />~~ <br /> <br />05NP-OO-SEIM <br /> <br />~~ <br />~~ <br /> <br />lnteractive versions of this appendix and the Fa/I 2005 SEL are available on-line at www.rkb.miptorg. <br />Friday, Auguslll, 2006 Full AEL: Page 44 of 123 <br />
The URL can be used to link to this page
Your browser does not support the video tag.