Index

A

  1. “AAA of access control”

  2. Acceptable usage policy (AUP)

    1. authorized security controls

    2. change regulations

    3. consequences of violations

    4. copyright infringement

    5. data

    6. goals

    7. machines

    8. misuse

    9. organization’s IT equipment and data

    10. overview

    11. personal usage

    12. privacy

    13. privacy disclaimers

    14. protect confidential data

    15. rollout

    16. sanctions

    17. scope

    18. security

    19. social media

    20. use of IT resources

  3. Access control

    1. defining

    2. effectiveness

    3. tools

  4. Accountability

  5. Account reset mechanism

  6. Address Resolution Protocol (ARP)

  7. Adjacent systems

  8. Administrative access

  9. Administrative controls

    1. application security

    2. asset management

    3. change control

    4. CMM

    5. documented processes

    6. machines

    7. policies

    8. record and media management

    9. security policy document

    10. verbal work culture

  10. Adversarial risk

    1. advanced threats

    2. bare-minimum threat

    3. cyber-criminals

    4. cyber-militants ...

Get IT Security Risk Control Management: An Audit Preparation Plan now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.