My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
IRVINE, CITY OF 2005
Clerk
>
Contracts / Agreements
>
INACTIVE CONTRACTS (Originals Destroyed)
>
I-J (INACTIVE)
>
IRVINE, CITY OF 2005
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
7/23/2015 9:07:49 AM
Creation date
5/26/2006 3:41:27 PM
Metadata
Fields
Template:
Contracts
Company Name
City of Irvine
Contract #
A-2005-310-10
Agency
Police
Council Approval Date
9/19/2005
Destruction Year
2012
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
300
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br /><\..U4t\,:UUU:JJl "-- <br /> <br />Section 5 CvberSecuritv Enhancement EQuioment <br /> <br />AEL Ref No Title I Description <br />SHSP/ LETPP MMRS EMPG <br />VAS} <br /> <br />Fall 2004 <br />SEL Ref Number <br /> <br />5.1 <br />~~~~ <br /> <br />5.2 <br />~~~~ <br /> <br />5.3 <br />~~~~ <br /> <br />5.4 <br />~~~~ <br /> <br />5.5 <br />~~~~ <br /> <br />5.6 <br />~~~~ <br /> <br />5.7 <br />~~~~ <br /> <br />5.8 <br />~~~~ <br /> <br />5.9 <br />~~~~ <br /> <br />Software, Virus Protection <br />Virus protection software <br /> <br />System, Intrusion Detection <br />Intrusion detection devices and systems, deployed at either host or network <br />level to detect unauthorized or aberrant behaviors on the network. <br /> <br />Scanning and Penetration Tools <br />Tools for scanning and vulnerability detection <br /> <br />Firewalls and Authentication Technologies <br />Includes both firewalls for workstations and network-level firewalls. The <br />latter may include both firewan software and a hardware platform, or may be <br />sold as a firewall appliance. <br /> <br />Software, Encryption <br />Encryption software for protecting stored data files or email messages. <br /> <br />Encryption, Data Transmission <br />A class of network access solutions, usually for remote access, that provide <br />enaypted user access. Some win utilize hardware -tokens. In addition to <br />software clients. This includes Virtual Private Networks, and encrypted <br />transmission modes such as SSH and SSL. <br /> <br />Software, Network management <br />Network management software for monitoring network performance andlor <br />maintaining configuration. <br /> <br />Configuration/Patch Management <br />Configuration management and patch management/dissemination tools. <br /> <br />Countermeasures <br />Security hardware and software countermeasures to protect against cyber <br />attacks. <br /> <br />05CS-G3-AVIR <br /> <br />05CS-G2-IDS <br /> <br />04SW-02-PFWL <br /> <br />OSCS-01-ECRP <br /> <br />05CS-01-ETRN <br /> <br />04SW-G2-NMGT <br /> <br />Interactive versions of this appendix and the Fall 2004 SEL are U11ailable on-line at www.rkb.mip,org. <br />Wednesday, April 27, 2005 Full AEL: Page 30 of78 <br />
The URL can be used to link to this page
Your browser does not support the video tag.