Solaris CX-310-301 Manual de usuario Pagina 6

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 77
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 5
Solaris 9 Security CX-310-301 5
General Security Concepts .......................................................................................... 10
Information Security ................................................................................................................... 10
The Security Life Cycle .............................................................................................................. 10
Good Security ............................................................................................................................ 11
Security Awareness ................................................................................................................... 12
Security Policies......................................................................................................................... 12
Policies and Procedures.........................................................................................................12
Physical Security .................................................................................................................... 13
Platform Security .................................................................................................................... 13
Network Security .................................................................................................................... 13
Application Security................................................................................................................ 14
Security Operations and Management................................................................................... 14
Insecure Systems ...................................................................................................................... 14
User Trust............................................................................................................................... 15
Threat ..................................................................................................................................... 15
Risk......................................................................................................................................... 15
Authentication and Privacy ........................................................................................................ 15
Accountability ......................................................................................................................... 16
Authentication......................................................................................................................... 16
Authorization........................................................................................................................... 16
Privacy.................................................................................................................................... 16
Confidentiality......................................................................................................................... 17
Integrity................................................................................................................................... 17
Non-repudiation...................................................................................................................... 17
Attackers .................................................................................................................................... 17
Classification of Attackers and Motives.................................................................................. 17
Information Gathering............................................................................................................. 18
Gathering Techniques ............................................................................................................19
Steps to Prevent Information Disclosure................................................................................ 21
Evaluation Standards................................................................................................................. 21
Invalidating a Certification ...................................................................................................... 22
Vista de pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 76 77

Comentarios a estos manuales

Sin comentarios