Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1. Protecting the Infrastructure
2. Protecting the Network
3.1. Name Servers (DNS and NIS(+))
3.2. Password/Key Servers (NIS(+) and KDC)
3.3. Authentication/Proxy Servers (SOCKS, FWTK)
3.4. Electronic Mail
3.5. World Wide Web (WWW)
3.6. File Transfer (FTP, TFTP)
3.7. NFS
4.5.1. Physical Access
4.5.2. Walk-up Network Connections
4.5.3. Other Network Technologies Dial-in Users Must Be Authenticated Call-back Capability All Logins Should Be Logged Choose Your Opening Banner Carefully Dial-out Authentication Make Your Modem Programming as "Bullet-proof" as Possible
4.6.1. What to Collect
4.6.2. Collection Process
4.6.3. Collection Load
4.6.4. Handling and Preserving Audit Data
4.6.5. Legal Considerations
4.7. Securing Backups
5.1. Preparing and Planning for Incident Handling
5.2.1. Local Managers and Personnel
5.2.2. Law Enforcement and Investigative Agencies
5.2.3. Computer Security Incident Handling Teams
5.2.4. Affected and Involved Sites
5.2.5. Internal Communications
5.2.6. Public Relations - Press Releases
5.3.2. Types and Scope of Incidents
5.3.3. Assessing the Damage and Extent
5.4.1. Types of Notification and Exchange of Information
5.4.2. Protecting Evidence and Activity Logs
5.4.3. Containment
5.4.4. Eradication
5.4.5. Recovery
5.4.6. Follow-Up
5.5. Aftermath of an Incident
5.6.2. Good Internet Citizenship
5.6.3. Administrative Response to Incidents
0 of .
Results for:
No results containing your search query
P. 1
Introduction to Internet Security

Introduction to Internet Security

Ratings: (0)|Views: 138|Likes:
Published by Clevius Almeida

More info:

Published by: Clevius Almeida on Sep 11, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 44 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Jigar S Shah liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->