“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information contained herein”
Figure 13-1 The Security Policy Development Life Cycle
Figure 13-4 Security vs. Productivity Balance
Figure 13-7 Assests, Threats, Vulnerabilities, Risks, and Protective Measures
Figure Representative Security Architecture
Figure Collaborative Software Infection/Reinfection Cycle
Figure Virus Infection Points of Attack and Protective Measures
Figure 13-20(a) Packet Filters and Application Gateways
Figure 13-20(b) Proxies, Trusted Gateways, and Dual-Homed Gateways
Figure Enterprise Firewall Architecture
Figure Challange-Response vs. Time-Synchronous Token Authentication
Figure Kerberos Architecture
Figure Private Key Encryption, Public Key Encryption, and Digital Signature Encryption
Figure Remote Authentication Dial-In User Services (RADIUS) Architecture
Figure Tunneling Protocols Enable Virtual Private Networks
Figure IP Packet Plus Authentication and Encryption Headers