Index
A
Active Directory (AD)
Advanced persistent threats (APTs)
Application Programming Interface (API)
Application to Application (A2A)
Application-to-database (A2D)
Australian Signals Directorate (ASD)
B
Biometrics
Black box approach
Break glass
access controls
application-to-application passwords
architecture
context
highest-level system accounts
password manager
physical password storage
process
recovery
session management
stale passwords
Bring Your Own Device (BYOD)
C
Cloud models
break glass
distributed information technology
IaaS
information technology collaboration
mobile workforce
PaaS
PAM
password storage
SaaS
technology professionals
Common Configuration Enumeration (CCE)
Common Configuration Scoring System (CCSS)
Common Platform Enumeration (CPE)
Common Vulnerabilities ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.