Index
4
419 Nigerian Scam, 142
A
Access control, 251
Access control lists (ACLs), 251
Access Management, 212
Access Registry, 212
Active Directory, 223
Anomaly-based IDS, 260
Asset characterization, 114
Asset criticality, 116
Asset life cycle, 119
Asset sensitivity, 114
Assets
deferrable, 117
essential, 117
general, 105
idiosyncratic, 105
ownership, 127
required, 117
restricted, 115
tracking attributes, 111
types, 109
Authentication, 213
B
Bash, 53
Block encryption, 187
C
Caesar cipher, 179
CarderPlanet, 144
Central Authentication Service (CAS), 227
Certificates, 195
CIA triad, 11
Cipher block chaining, 189
Cliff Stoll, 237
Competencies, 4
Cuckoo's egg, 239
Cultural cognition, 403
CVE, 85
D
Disasters, 327
E
Edward Snowden, 147
Electronic code book, 189
Encryption, 177
general algorithm properties, 180
keys, 180
Encryption in use, 194
End-point protection, 264
Event criticality, 337
F
Federation, 228
Firewalls, 252
G
H
Hash functions, 185
Heartland Payment Systems, 8, 37
HIPAA, 6, 16, 325, 368, 369, 375, 377, 379, 385
History, 5
I
Identity discovery, 208
Identity enrichment, 210
Identity management, 207
Identity reconciliation, 208
Incident communication, 312
Incident detection and analysis, 317
Incident handling, 307
Incident response policy, 308
Incident response Team, 309
Information security
compliance, 374
guideline, 363
policy, 361
standard, 362
Intrusion detection/prevention, 256
J
Jobs, 1
K
Kerberos, 223 ...
Get Information Security and IT Risk Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.