Index

A

Access control countermeasures

active strategies, 439–440

goals, 438–440

modes, 439

passive strategies, 439

types, 440

Accuracy spot-check, 51

Active access control, 439–440

Administrative Simplification, 4–5

Adolescence of P-1, 275

Advanced persistent threats (APT)

bot functionality malware, 392

characteristics

diverse attack methodologies, 391

goal-directed, specific targets, 390

well-organized and well funded attacks, 391

vs. conventional attacks, 391–392

definitions, 388–389

future attacks, 400

GhostNet attacks, 389

information security ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.