Laserfiche WebLink
<br />Section <br /> <br />5 CvberSecuritv Enhancement EQuioment <br /> <br />AEL Ref No Title / Description <br />SHSPI LETPP MMRS EMPG <br />..vAS' <br /> <br />Fall 1004 <br />SEL Ref Number <br /> <br />5.1 Software, Virus Protection 05CS-03-AVIR <br />~ ~ ~ ~ Virus protection software <br />5.2 System, Intrusion Detection 05CS-D2-IDS <br />~ ~ ~ ~ Intrusion detection devices and systems, deployed at either host or network <br /> level to detect unauthorized or aberrant behaviors on the network. <br />5.3 Scanning and Penetration Tools <br />~ ~ ~ ~ Tools for scanning and vulnerability detection <br />5.4 Firewalls and Authentication Technologies 04SW-02-PFWL <br />~ ~ ~ ~ Includes both firewalls for workstations and network.level firewalls. The <br /> latter may include both firewall software and a hardware platform, or may be <br /> sold as a firewall appliance. <br />5.5 Software, Encryption 05CS-01-ECRP <br />~ ~ ~ ~ Encryption software for protecting stored data files or smail messages. <br />5.6 Encryption, Data Transmission 05CS-01-ETRN <br />~ ~ ~ ~ A class of network access solutions, usually for remote access, Ihat provide <br /> encrypted user access. Some will utilize hardware "tokens" in addition to <br /> software clients. This includes Virtual Private Networks, and encrypted <br /> transmission modes such as SSH and SSL. <br />5.7 Software, Network management 04SW.02-NMGT <br />~ ~ ~ ~ Network management software for monitoring network performance and/or <br /> maintaining configuration. <br />5.8 Configuration/Patch Management <br />~ ~ ~ ~ Configuration management and patch management/dissemination toots. <br />5.9 Countermeasures <br />~ ~ ~ ~ Security hardware and software countermeasures to protect against cyber <br /> attacks. <br /> <br />Interactive versions of this appendb: and the FaJl2004 SEL are available on~line at www.rkb.mipt.org. <br />Wednesday, April 27, 2005 Full AEL: Page 30 of 78 <br />