RSA: A Guide to Security Technologies - A Primer for IT Professionals, RSA Security Inc. 1999, pp. 48.

THEMES: RSA
YEAR: 1999
Login Login
User: Anonymous


LABEL: Authentication
THINGS: Firewall | Hacker | Integrity | IPsec | Non-repudiation | PKIX | Privacy | SSL | S/MIME
TIME: 1999
 
Content
.
Table of Contents
Introduction 1
Information Security: Sizing Up the Risks 2
Information Crime Statistics 2
Why Computer and Information Crimes Are on the Rise 3
Hacker Tools and Tricks: What You’re Up Against 4
The Costs to the Enterprise 6
Fundamental Information Security Concepts 7
Security Policy and the Continuum of Risk 7
Defending the Network Perimeter 8
The Conceptual Building Blocks of Information Security Systems 8
Security Assessment, Management and Monitoring 11
An Overview of Security Technologies 12
User Authentication 12
Implementing Strong Authentication 16
Firewall Systems and Authentication 16
User Identification: Providing Access Credentials 17
Data Privacy 20
Data Integrity 21
Non-Repudiation 22
Technologies for Managing Security 23
Standards in Security Technology 24
SSL: Making online commerce secure 24
IPSec: Building security into Internet connections 24
S/MIME: Secure messaging 25
PKIX: The IETF defines interoperable Public Key Infrastructure 25
Other standards in information security 25
Summary 27
About RSA Security Inc. 27
Glossary 28
Additional Information Resources 43
.