O'Reilly logo

IT Security Risk Control Management: An Audit Preparation Plan by Raymond Pompon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

A

  1. “AAA of access control”

  2. Acceptable usage policy (AUP)

    1. authorized security controls

    2. change regulations

    3. consequences of violations

    4. copyright infringement

    5. data

    6. goals

    7. machines

    8. misuse

    9. organization’s IT equipment and data

    10. overview

    11. personal usage

    12. privacy

    13. privacy disclaimers

    14. protect confidential data

    15. rollout

    16. sanctions

    17. scope

    18. security

    19. social media

    20. use of IT resources

  3. Access control

    1. defining

    2. effectiveness

    3. tools

  4. Accountability

  5. Account reset mechanism

  6. Address Resolution Protocol (ARP)

  7. Adjacent systems

  8. Administrative access

  9. Administrative controls

    1. application security

    2. asset management

    3. change control

    4. CMM

    5. documented processes

    6. machines

    7. policies

    8. record and media management

    9. security policy document

    10. verbal work culture

  10. Adversarial risk

    1. advanced threats

    2. bare-minimum threat

    3. cyber-criminals

    4. cyber-militants ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required