... 169 summary, 1 56 157supplier requirements, 166 technology focus, 161 time stamps, 158notarization service, PKI, 343notebook computers, 6, 220–221Novell Netware, directory services, 62 NTP. See ... refer to both an intrusion detectionsystem (IDS) and vulnerability analysis (VA) system. Intrusion detectionand vulnerability analysis often go hand-in-hand in the security planningprocess. ... address takes the form of 255.255.0.0 (called dotted decimal nota-tion). For each network segment in your organization, you will assignone subnet address. To enhance security, manageability, and...