Information Technology Reference
In-Depth Information
Review the most important topics in the chapter, noted with the Key Topic icon in the
outer margin of the page. Table 12-12 lists a reference of these key topics and the page
numbers on which each is found.
Ta b l e 1 2 -1 2
Key Topics
Key Topic Element
Description
Page
Ta ble 1 2 - 2
Security legislation
449
Ta ble 1 2 - 3
Security threats
450
Ta ble 1 2 - 4
Security risks
453
Ta ble 1 2 - 5
Software features to manage DoS attacks
454
Ta ble 1 2 - 6
Key network security elements of the network
security life cycle
457
Ta ble 1 2 -7
Security policy documents
459
Ta ble 1 2 - 9
Steps for continuous security
462
List
Two ways to send a key to the remote endpoint
467
List
VPN protocols
467
List
Security management solutions
472
Print a copy of Appendix D, “Memory Tables,” (found on the CD), or at least the section
for this chapter, and complete the table s and lists from memor y. Appendix E, “Memor y
Ta ble s A n s wer Ke y, ” a l s o on t he C D, i nc l ude s c om ple te d t a ble s a nd l i s t s to c he c k you r
work.