Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
3Activity

Table Of Contents

1. Protecting the Infrastructure
2. Protecting the Network
3.1. Name Servers (DNS and NIS(+))
3.2. Password/Key Servers (NIS(+) and KDC)
3.3. Authentication/Proxy Servers (SOCKS, FWTK)
3.4. Electronic Mail
3.5. World Wide Web (WWW)
3.6. File Transfer (FTP, TFTP)
3.7. NFS
4.5.1. Physical Access
4.5.2. Walk-up Network Connections
4.5.3. Other Network Technologies
4.5.4.2. Dial-in Users Must Be Authenticated
4.5.4.3. Call-back Capability
4.5.4.4. All Logins Should Be Logged
4.5.4.5. Choose Your Opening Banner Carefully
4.5.4.6. Dial-out Authentication
4.5.4.7. Make Your Modem Programming as "Bullet-proof" as Possible
4.6.1. What to Collect
4.6.2. Collection Process
4.6.3. Collection Load
4.6.4. Handling and Preserving Audit Data
4.6.5. Legal Considerations
4.7. Securing Backups
5.1. Preparing and Planning for Incident Handling
5.2.1. Local Managers and Personnel
5.2.2. Law Enforcement and Investigative Agencies
5.2.3. Computer Security Incident Handling Teams
5.2.4. Affected and Involved Sites
5.2.5. Internal Communications
5.2.6. Public Relations - Press Releases
5.3.2. Types and Scope of Incidents
5.3.3. Assessing the Damage and Extent
5.4.1. Types of Notification and Exchange of Information
5.4.2. Protecting Evidence and Activity Logs
5.4.3. Containment
5.4.4. Eradication
5.4.5. Recovery
5.4.6. Follow-Up
5.5. Aftermath of an Incident
5.6.2. Good Internet Citizenship
5.6.3. Administrative Response to Incidents
0 of .
Results for:
No results containing your search query
P. 1
Introduction to Internet Security

Introduction to Internet Security

Ratings: (0)|Views: 138|Likes:
Published by Clevius Almeida

More info:

Published by: Clevius Almeida on Sep 11, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

10/31/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 44 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Jigar S Shah liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->