Index

A

  1. “AAA of access control”

  2. Acceptable usage policy (AUP)

    1. authorized security controls

    2. change regulations

    3. consequences of violations

    4. copyright infringement

    5. data

    6. goals

    7. machines

    8. misuse

    9. organization’s IT equipment and data

    10. overview

    11. personal usage

    12. privacy

    13. privacy disclaimers

    14. protect confidential data

    15. rollout

    16. sanctions

    17. scope

    18. security

    19. social media

    20. use of IT resources

  3. Access control

    1. defining

    2. effectiveness

    3. tools

  4. Accountability

  5. Account reset mechanism

  6. Address Resolution Protocol (ARP)

  7. Adjacent systems

  8. Administrative access

  9. Administrative controls

    1. application security

    2. asset management

    3. change control

    4. CMM

    5. documented processes

    6. machines

    7. policies

    8. record and media management

    9. security policy document

    10. verbal work culture

  10. Adversarial risk

    1. advanced threats

    2. bare-minimum threat

    3. cyber-criminals

    4. cyber-militants ...

Get IT Security Risk Control Management: An Audit Preparation Plan now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.