Solaris CX-310-301 Manuel d'utilisateur Page 6

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 77
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 5
Solaris 9 Security CX-310-301 5
General Security Concepts .......................................................................................... 10
Information Security ................................................................................................................... 10
The Security Life Cycle .............................................................................................................. 10
Good Security ............................................................................................................................ 11
Security Awareness ................................................................................................................... 12
Security Policies......................................................................................................................... 12
Policies and Procedures.........................................................................................................12
Physical Security .................................................................................................................... 13
Platform Security .................................................................................................................... 13
Network Security .................................................................................................................... 13
Application Security................................................................................................................ 14
Security Operations and Management................................................................................... 14
Insecure Systems ...................................................................................................................... 14
User Trust............................................................................................................................... 15
Threat ..................................................................................................................................... 15
Risk......................................................................................................................................... 15
Authentication and Privacy ........................................................................................................ 15
Accountability ......................................................................................................................... 16
Authentication......................................................................................................................... 16
Authorization........................................................................................................................... 16
Privacy.................................................................................................................................... 16
Confidentiality......................................................................................................................... 17
Integrity................................................................................................................................... 17
Non-repudiation...................................................................................................................... 17
Attackers .................................................................................................................................... 17
Classification of Attackers and Motives.................................................................................. 17
Information Gathering............................................................................................................. 18
Gathering Techniques ............................................................................................................19
Steps to Prevent Information Disclosure................................................................................ 21
Evaluation Standards................................................................................................................. 21
Invalidating a Certification ...................................................................................................... 22
Vue de la page 5
1 2 3 4 5 6 7 8 9 10 11 ... 76 77

Commentaires sur ces manuels

Pas de commentaire