Contents
Data security...........................................................................................................................................283
E-Shredding..................................................................................................................................... 283
IPsec .................................................................................................................................................284
Chapter 6
Overview....................................................................................................................................................... 300
System and Network security..................................................................................................................... 302
Ports - Protocols..................................................................................................................................... 302
Security Patches.....................................................................................................................................306
Protocol protection................................................................................................................................ 308
Antivirus .................................................................................................................................................312
Roles and Passwords.............................................................................................................................313
Roles and profiles............................................................................................................................ 313
Access control........................................................................................................................................ 316
Audit log................................................................................................................................................. 317
Data security................................................................................................................................................. 318
User authentication................................................................................................................................318
Log out .............................................................................................................................................339
Troubleshooting.............................................................................................................................. 342
Hard disk encryption..............................................................................................................................345
E-Shredding............................................................................................................................................347
E-shredding presentation................................................................................................................347
IPsec ....................................................................................................................................................... 351
IPsec presentation .......................................................................................................................... 351
HTTPS .................................................................................................................................................... 367
Troubleshooting.............................................................................................................................. 379
Chapter 7
Overview....................................................................................................................................................... 384
systems................................................................................................................................................... 384
6