|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Gregg M. — CISA Exam Cram |
|
|
Предметный указатель |
Parallel tests 456
Passive attacks 313—314 467
Passive RFID tags 218
Password-cracking attacks 317
PBX (Private Branch Exchange) 328—329
PCI (Peripheral Component Interface) bus 213
PCMCIA (Personal Computer Memory Card International Association) cards 213
PDAs, handheld computers 215
PDCA (Plan-Do-Check-Act) 209
Peer-to-Peer networks 215
penetration testing 337—339
Performance, measuring 71—72
Personnel controls for physical, guards 379—380
Personnel controls for physical, identification 380
Personnel controls for physical, IDSs 380—381
Personnel controls for physical, security 379
PERT (Program Evaluation and Review Technique) 125
PERT (Program Evaluation and Review Technique), project completion times, calculating 127
PGP (Pretty Good Privacy) 349
Phased changeover 456
Phases of DHCP operation 254
Phases of SLDC implementation 142
phishing 315
phreakers 328 331
Physical layer (OSI reference model) 247
Physical security, authentication 387
Physical security, authentication, biometrics 387—389
Physical security, breaches, sources of 370—371
Physical security, controls 371
Physical security, environmental controls, backup power supplies 381—383
Physical security, environmental controls, fire prevention, detection, and suppression 384—386
Physical security, environmental controls, HVAC 383
Physical security, exterior controls 372—374
Physical security, interior controls 375
Physical security, interior controls, doors 375—376
Physical security, interior controls, locks 377—378
Physical security, interior controls, windows 376—377
Physical security, personnel controls 379
Physical security, personnel controls, guards 379—380
Physical security, personnel controls, identification 380
Physical security, personnel controls, IDSs 380—381
Physical security, policies 389
Physical security, policies, commercial information classification system 393
Physical security, policies, defining 390
Physical security, policies, governmental information classification system 392
Physical security, policies, implementing 391
Physical security, policies, purposes of 390
Physical security, vulnerabilities 365
Physical security, vulnerabilities, man-made events 366—367
Physical security, vulnerabilities, natural events 365—366
PIA (privacy impact analysis) 298 466
Picking locks, methods of 378
PIDAS (perimeter intrusion and detection assessment system) 373
Pilot tests 456
Ping command 274
Ping of Death 318
PKI (Public Key Infrastructure) 347—348 469—470
Plan design and development 419—420
Plenum-grade cable 256
policies 76—77
Policies for physical security 389
Policies for physical security, commercial information classification system 393
Policies for physical security, defining 390
Policies for physical security, governmental information classification system 392
Policies for physical security, implementing 391
Policies for physical security, purposes of 390
Policies for physical security, reviewing 78—79
Policies, disaster recovery, corrective control 76
Policy development 75 77
POP3 (Post Office Protocol Version 3) 249
Portable wireless devices 271
Post-deployment change-management process 209
Post-implementation phase of SDLC 140
POTS (Plain Old Telephone System) 268
Power systems, anomalies vulnerable to 381
Power systems, EPO buttons 382
Power systems, protecting 382
Power systems, UPSs 382—383
Practice exams, answers 509—525
Practice exams, questions 476—508
Preaction water sprinklers 385
Preparedness testing 424 473
Preparing for exam, methods of 7—9
Preparing for exam, resources 4—5
Preparing for exam, study tips 9—10
Presentation layer (OSI reference model) 246
Pretexting 315
PRI (Primary Rate Interface) 268
print servers 216
Privacy 298
Privacy, and trust 298—299
Privacy, Internet issues 273
Privacy, WEP 326
private IP addresses 322
Private key encryption 342—343
Problem escalation 205
Problem management 202
Procedures 77
Procedures for ISACA auditing 30—31
Procedures, reviewing 78—79
Process owner, role in information security 295
Processing controls 162—164 458
Processing controls, data file controls 165—166
Program library systems 207—208
Program servers 216
Programming languages 222
Programming languages, generations of 223
Project management 117
Project management, auditing 177—178
Project management, CPM 455
Project management, key roles 118
Project management, project control and execution 128
Project management, project culture and objectives 119—120
Project management, project initiation 121
Project management, project organizational forms 119
Project management, project organizational types 454
Project management, project planning 121
Project management, project planning, critical paths 127
Project management, project planning, scheduling 125—127
Project management, project planning, software cost estimation 122—123
Project management, project planning, software size estimation 123—124
Project management, project planning, timebox management 128
Project management, projects, closing 128—129
Project management, role in BCP process 410
Project management, SDLC 455
Protecting power systems 382
Protecting power systems, UPSs 382—383
Protocol analyzers 275
Protocols 244
Prototyping 143 457
Proxies 263 321
Proxies, application proxies 263
Proxies, circuit-level proxies 264
Proxy servers 216
Public key encryption 344
Public relations, role in disaster recovery process 408
Pure project organizational form 119
Qualitative risk assessment 87—88
quality management 96—98
Quality management, CobiT 98
Quality management, COSO 99
Quality management, ERP 98
Quantitative analysis 412
Quantitative risk assessment 83—86 452—453
Quantum cryptography 345
Questionnaires, information gathering for BIA 413
Questions (practice exam) 476—508
RAD (Rapid Application Development) 143 457
RADIUS (Remote Access Dial-In User Service) 310
RAID (redundant array of inexpensive disks) 430—431
| Rainbow tables 318
RAM (Random Access Memory) 212 259
RBAC (role-based access control) 302—303
RDMSs (relational database-management systems) 228 464
Real-world cryptographic solutions 349—350
Reciprocal agreements 428
Recovering, from hardware failures 429
Recovering, from hardware failures, RAID 430—431
Recovering, from software failures 431—432
Recovery alternatives 425
Recovery alternatives, alternate processing sites 426—429
Recovery strategies 417—419
Recovery strategies, interruptions, types of 418
Red team activities 337
Redundant processing sites 426
Reengineering 144
Referential integrity 170
regression tests 456
Regulatory standards 24—25. See also legislation
Regulatory standards, verifying compliance with 25—26
relational integrity 171
release management 208—209 461
Reliability of evidence, determining 48
Remote-access security 309—311
repeaters 259—261
Rescorla, Rick 384
Resource usage, monitoring 200
Resource usage, monitoring, abnormal events, tracking 202—203
Resource usage, monitoring, incident handling 201
Resource usage, monitoring, keystroke monitoring 200
Resource usage, monitoring, problem management 202
Responding to incidents 330—332
Responding to incidents, auditing information security 335
Responding to incidents, auditing information security, data ownership 335—336
Responding to incidents, auditing information security, security baselines 336
Responding to incidents, computer forensics 334—335
Responding to incidents, emergency response 332—334
Reviewing policies 78—79
RFI (radio frequency interference) 382
RFID tags 218—219
Right-to-audit statements 94
Rijndael 344
ring topology 255
Risk analysis 32
Risk analysis, categories of risk 32—33
Risk analysis, material risks 36
Risk assessment, qualitative 87—88
Risk assessment, quantitative 83—86
Risk management 33 79
Risk management, monitoring phase 35
Risk management, risk management team, establishing 33—34
Risk management, risk mitigation 34
Risk-based auditing 35—36
Risks, mitigating 448
Risks, transferring 449
Risks, types of 448
RMON (Remote Monitoring) 275
Roles of auditor in IT governance 69
Roles of employees, understanding 100—101
Roles of employees, understanding, segregation of duties 101—103
Roles, project management-related 118
Roll-up fixes 208
ROM (read-only memory) 212 462
Rounding-down attacks 317
routers 217 260
Routing protocols 251
Royce, W.W. 131
RPO (recovery point objective) 414 472
RSA encryption 345
RTO (recovery time objective) 414 472
S-HTTP (Secure Hypertext Transfer Protocol) 349
S/MIME (Secure Multipurpose Internet Mail Extensions) 349
Safe Harbor Act 24
Salami technique 317
Sampling 46—47 450
Sandbox scheme 222
SANs (storage area networks) 243 434
SAS 70 reports 95
Satellite systems 257
SCADA (U.S. Supervisory Controls and Data Acquisition) 25
SCARF/EAM (systems control audit review file and embedded audit modules) 460
Scheduling project tasks 125
Scheduling project tasks, estimating task completion times 126—127
SCM (supply chain management) 186
scope creep 136
Screened host firewalls 265 322
Screened subnets 265
Script kiddies 331
Scrubbing locks 379
SCRUM 144 457
SCSI (Small Computer Systems Interface) bus 213
SDLC (system development lifecycle) 117 455
SDLC (system development lifecycle), application disposal 140—141
SDLC (system development lifecycle), business application development 130—131
SDLC (system development lifecycle), business application development, systems-development methodology 131—132
SDLC (system development lifecycle), changeover methods 456
SDLC (system development lifecycle), design phase 136
SDLC (system development lifecycle), development phase 136—139
SDLC (system development lifecycle), feasibility 133
SDLC (system development lifecycle), implementation phase 139—140
SDLC (system development lifecycle), phases of 142
SDLC (system development lifecycle), post-implementation phase 140
SDLC (system development lifecycle), project management 117
SDLC (system development lifecycle), project management, key roles 118
SDLC (system development lifecycle), project management, project control and execution 128
SDLC (system development lifecycle), project management, project culture and objectives 119—120
SDLC (system development lifecycle), project management, project initiation 121
SDLC (system development lifecycle), project management, project organizational forms 119
SDLC (system development lifecycle), project management, project planning 121—128
SDLC (system development lifecycle), project management, projects, closing 128—129
SDLC (system development lifecycle), requirements definition 133—135
SDLC (system development lifecycle), testing phase 456
Secondary storage 212 224
Security advisory group, role in information security 295
Security, authentication, biometric systems 466
Security, baselines, establishing 336
Security, defense-in-depth 293
security, firewalls 263 468
Security, firewalls, screened host firewalls 265
Security, information security governance, funding 73
Security, logical, goals of 294
Security, logical, IS protection mechanisms 294—295
Security, logical, key roles in 295—296
Security, logical, logical access controls 303—312
Security, of wireless networks 271
Security, physical controls 470
Security, physical controls, verifying 276
segregation of duties 101—102
Segregation of duties, compensating controls 102—103
Semipassive RFID tags 218
Semiquantitative analysis 88
Sensitive information, destroying 369—370
Sensitive information, privacy issues 298—299
Sensitive systems 472
Servers 215
service packs 208
Session layer (OSI reference model) 246
SET (Secure Electronic Transaction) 349
Shared cost method of security system funding 73
Shredders, types of 369
Signature IDS detection 323 469
Simple backup-rotation schemes 433
Simplex communication 225
Single Sign-on 307—309
Site licensing 230
Size of software, estimating 123—124
SLAs (service level agreements) 95—96 199
SLE (single loss expectancy), calculating 86 416
SLOC (source lines of code) 123
SMTP (Simple Mail Transfer Protocol) 248
|
|
|
Реклама |
|
|
|