22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

and WebSphere Portal 622<br />

benefits 282<br />

definition 281<br />

methods 283<br />

versus single password 283<br />

skulker 408<br />

SMTP 261, 263<br />

service extensions 265<br />

SMTP relay hosts 131<br />

SNMP 370<br />

SOCKS 119<br />

Software Efficient ALgorithm 28<br />

Software Engineering Institute 8<br />

SPAM 512<br />

blacklist filters 516<br />

Inbound Intended Recipient Controls 522<br />

Inbound relay control 513<br />

Inbound Relay Enforcement 519<br />

mail rules 522<br />

SSH 110<br />

SSL 133, 249, 264, 586<br />

deployment considerations 254<br />

handshake 250<br />

Stateful packet filters 118<br />

Stealth 355<br />

STEP<br />

see Sametime Everyplace<br />

Sun Solaris 353<br />

hardening 395<br />

SunONE Directory Server 311<br />

switches 123<br />

Symmetric 22<br />

Symmetric and Asymmetric ciphers 25<br />

Symmetric ciphers 24<br />

types 27<br />

Symmetric key algorithms 23<br />

advantages 28<br />

disadvantages 29<br />

example 26<br />

export considerations 29<br />

SYN Floods 48<br />

synchronization tools 326<br />

syschk.cfg 406<br />

SysmonLog 373<br />

systat service 391<br />

System V-derived UNIX systems 388<br />

696 Lotus Security Handbook<br />

T<br />

TAI 303<br />

TCB<br />

see Trusted Computing Base<br />

TCSEC 54<br />

Team Workplace see QuickPlace<br />

Threat 44<br />

time service 391<br />

TIS Firewall Toolkit 123<br />

Tivoli Access Manager 590, 628<br />

and the WebSeal plug-in 629<br />

and WebSphere Portal 572<br />

installing 628<br />

integrating Domino 630<br />

integrating WebSphere Portal 631<br />

Tivoli Directory Integrator 331<br />

TLS 249<br />

TRACE 298<br />

transparent proxies 168<br />

Transport Layer Security 249<br />

Triple-DES 27<br />

Trust Association Interceptor<br />

see TAI<br />

Trusted Computing Base<br />

Twofish 27<br />

U<br />

Unclassified 15<br />

UNIX<br />

hardening 387<br />

inetd 390<br />

remote log server 399<br />

tcp_wrappers 391<br />

UNKNOWN 298<br />

V<br />

variable-key-size encryption algorithm 28<br />

Virtual LANs 125<br />

VLAN 125<br />

frame tagging 126<br />

W<br />

WAKE<br />

see World Auto Key Encryption algorithm<br />

WAS plug-in 303<br />

Web client authentication 240<br />

name variation considerations 472

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!