INDEX
- acceptable use policy
- conscious agreement
- improper nonofficial computer usage
- Michael A. Smyth v. The Pillsbury Company (case)
- sample attributes
- team effort
- violations
- access control
- access control policy
- discretionary
- mandatory
- role-base
- visitor and contractor
- agreement
- badging and identification
- check-outs
- designated parking
- electronics
- emergencies and evacuations
- enforcement
- network or system access
- reception
- tours
- American Civil Liberties Union (ACLU)
- annualized loss expectancy (ALE)
- annualized rate of occurrence (ARO)
- anonymous
- anti-malware
- antispyware
- antivirus
- AOL Time Warner
- auditing
- authentication
- backdoor
- Balanced Scorecard
- “Big Data”
- BigMIMS (medical information management system)
- BigRX
- BigMIMS
- business intelligence capability
- CEO, recommendations
- Corporation
- event likelihood
- functional specifications
- incident impact
- new policy
- planning division
- Plieno Corporation
- risk assessments
- SQL injection vulnerability
- testing procedures
- three-tier measurement techniques
- web pages, specifications
- BigRX plan, reduced SQL injection risk
- additional resources
- applicability
- available resources
- execution, concept
- contract modifications
- promotion to live system
- recurring performance management
- software procurement, contracts
- testing and acceptance
- governance
- management reviews
- penetration testing
- vulnerability scanning
- purpose
- board involvement, levels
- boardroom interactions
- cybersecurity audits
- cybersecurity risk management, corporate culture
- goals and ...
Get Cybersecurity for Executives: A Practical Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.