Index
A
Access control countermeasures
active strategies, 439–440
goals, 438–440
modes, 439
passive strategies, 439
types, 440
Accuracy spot-check, 51
Active access control, 439–440
Administrative Simplification, 4–5
Adolescence of P-1, 275
Advanced persistent threats (APT)
bot functionality malware, 392
characteristics
diverse attack methodologies, 391
goal-directed, specific targets, 390
well-organized and well funded attacks, 391
vs. conventional attacks, 391–392
definitions, 388–389
future attacks, 400
GhostNet attacks, 389
information security ...
Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.