Index

4

419 Nigerian Scam, 142

A

Access control, 251

Access control lists (ACLs), 251

Access Management, 212

Access Registry, 212

Active Directory, 223

Anomaly-based IDS, 260

Asset characterization, 114

Asset criticality, 116

Asset life cycle, 119

Asset sensitivity, 114

Assets

deferrable, 117

essential, 117

general, 105

idiosyncratic, 105

ownership, 127

required, 117

restricted, 115

tracking attributes, 111

types, 109

Authentication, 213

B

Bash, 53

Block encryption, 187

C

Caesar cipher, 179

CarderPlanet, 144

Central Authentication Service (CAS), 227

Certificates, 195

CIA triad, 11

Cipher block chaining, 189

Cliff Stoll, 237

Competencies, 4

Cryptography, 177, 317, 408

Cuckoo's egg, 239

Cultural cognition, 403

CVE, 85

D

Disasters, 327

E

Edward Snowden, 147

Electronic code book, 189

Encryption, 177

general algorithm properties, 180

keys, 180

Encryption in use, 194

End-point protection, 264

Event criticality, 337

F

Federation, 228

Firewalls, 252

G

Gang of 414, 5

H

Hash functions, 185

Heartland Payment Systems, 8, 37

HIPAA, 6, 16, 325, 368, 369, 375, 377, 379, 385

History, 5

I

ILOVEYOU, 7, 21, 87, 259

Identity discovery, 208

Identity enrichment, 210

Identity management, 207

Identity reconciliation, 208

Incident communication, 312

Incident detection and analysis, 317

Incident handling, 307

Incident response policy, 308

Incident response Team, 309

Information security

compliance, 374

guideline, 363

policy, 361

standard, 362

Intrusion detection/prevention, 256

J

Jobs, 1

K

Kerberos, 223 ...

Get Information Security and IT Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.