Index
A
“AAA of access control”
Acceptable usage policy (AUP)
authorized security controls
change regulations
consequences of violations
copyright infringement
data
goals
machines
misuse
organization’s IT equipment and data
overview
personal usage
privacy
privacy disclaimers
protect confidential data
rollout
sanctions
scope
security
social media
use of IT resources
Access control
defining
effectiveness
tools
Accountability
Account reset mechanism
Address Resolution Protocol (ARP)
Adjacent systems
Administrative access
Administrative controls
application security
asset management
change control
CMM
documented processes
machines
policies
record and media management
security policy document
verbal work culture
Adversarial risk
advanced threats
bare-minimum threat
cyber-criminals
cyber-militants ...
Get IT Security Risk Control Management: An Audit Preparation Plan now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.