|
 |
Авторизация |
|
 |
Поиск по указателям |
|
 |
|
 |
|
 |
 |
|
 |
|
Gregg M. — CISA Exam Cram |
|
 |
Предметный указатель |
smurf attacks 318
sniffers 275
SNMP (Simple Network Management Protocol) 249 275
Sociability tests 456
Social engineering 314
Software development 221
Software development, decompilers 223
Software development, programming languages 222
Software development, sandbox scheme 222
Software escrow 434
Software recovery 431—432
Software, cost estimation 122—123
Software, licensing issues 230
Software, size estimation 123—124
software, testing 455—456
Source code, verifying 460
Sources of physical security breaches 370—371
Sourcing 93
Sourcing, SLAs 95—96
SOX (Sarbanes-Oxley Act) 25 40
Spiral application development model 143 457
Sponsor payment method of security system funding 74
Spreading code 270
Sprints 144
SSH (Secure Shell) 349
SSIDs (Service Set IDs) 269
SSL (Secure Sockets Layer) 349
Standards 28 78
Standards, ISACA auditing standards 28—29
Standby database shadowing 434
Standby UPS systems 383
Standing data 165
star topologies 255
Stateful inspection firewalls 264 321 468
Stateless connections 249
stateless firewalls 322
Statistical IDS detection 323 468
Statistical sampling 46
Steering committee 70
Stochastic events 85
store-and-forward switching 260
STP (shielded twisted-pair) 256
Strategic planning 26
Stream cipher algorithm 343
Strip-cut shredders 369
Strong matrix organizational form 119
Study tips 9—10
subnetworks 250
Substantive testing 46
Substantive tests 28
Supercomputers 215
Supervisory mode 224
SURRE (Sufficient, Useable, Reliable, Relevant, Effective) rule 47
switches 217 259—261
symmetric encryption 341
Symmetric encryption algorithms 469
Symmetric encryption, AES 344
Symmetric encryption, DES 343—344
Symmetric encryption, private key encryption 342—343
Syn floods 319
System access, access creep 301
System access, discretionary access control 301
System access, layers of security controls 299—300
System access, mandatory access control 302
System access, role-based access control 302—303
System testing 137
System-control parameter 165
Systems development, auditing 176—177
T-carriers 268
TACACS 310
Tactical planning 26
Tape-management systems 219
Tasks, CPM 127
TCP (Transmission Control Protocol) 246
TCP/IP model, application layer 253—254
TCP/IP model, host-to-host layer 252—253
TCP/IP model, internet layer 250—252
TCP/IP model, network access layer 250
TCP/IP model, versus OSI reference model 249
technical support 204 206
Telecommunications recovery 434—435
TEMPEST 314
TES (terminal-emulation software) 249
Testing applications 172—173
Testing methodologies 137
Testing phase of BCP process 421—423
Testing phase of BCP process, full operation testing 424
Testing phase of BCP process, paper tests 423
Testing phase of BCP process, preparedness testing 424
testing software 456
Tests (practice), answers 509—525
Tests (practice), questions 476—508
Threat identification 81
threats 32. See also incident handling
Timebox management 128
Tokens 305
| Top-down policy development 75 451
top-down testing 137
topologies 254—255 465
Tower of Hanoi tape-rotation scheme 434
Tracking abnormal events 202—203
Training and awareness, role in BCP process 420—421
Transaction files 165
Transaction integrity 46
Transferring risks 449
Transport layer (OSI reference model) 246
Trend-/variance-detect tools 311
Trinoo attacks 319
Trojan horse programs 316
Trouble tickets 204
TSF (time service factor) 199
Tubular locks 377
Tumbler locks 377
Tuples 228
twisted-pair cable 256
Two-factor authentication schemes 305
UAs (uptime agreements) 199
UDP (User Datagram Protocol) 246
Unicast transmission 251
Unicode 226
Unit testing 137
UPSs (Uninterruptible Power Supplies) 382—383
URLs 272
USB 214
User mode (CPU) 211
Utilization reports 219
UTP (unshielded twisted-pair) 256
Vandalism 366
VANs (value-added networks) 180
Variable sampling 46 450
Variance detection tools 200
Verifying, BCP 436—437
Verifying, compliance with external regulations 25—26
Verifying, disaster recovery plans 436—437
Verifying, network infrastructure physical controls 276
Verifying, source code 460
Virtual memory 224
Viruses 316 329—330
Visual Basic 222
Vital systems 472
VLANs (virtual LANs) 261
Voice communications, PBX systems 328—329
Voice communications, phreakers 328
Voice communications, VoIP 329
VoIP (Voice over IP) 268 329
VPNs (Virtual Private Networks) 310
Vulnerabilities, to physical security 365
Vulnerabilities, to physical security, breaches, sources of 370—371
Vulnerabilities, to physical security, man-made events 366—367
Vulnerabilities, to physical security, natural events 365—366
Vulnerabilities, to power systems 381
Walk-through testing 423
Walls as physical security control 377
WANS (wide area networks) 243
WANs (wide area networks), circuit-switched 268
WANs (wide area networks), packet-switched 267—268
war chalking 327
War dialing 316
war driving 327
Warded locks 377
Warm sites 427
Water sprinklers 385—386
Waterfall development model 131 456
WBAD (web-based application development) 145
WBS (Work Breakdown Structure) 120
Weak matrix organizational form 119
Web browsers 272—273
Web servers 216
Web-based trouble tickets 204
Websites, DRII 409
Websites, ISACA 9
Websites, ISACA auditing standards 30
Websites, ISACA code of ethics 32
WEP (Wired Equivalent Privacy) 269—271 326
Wet pipe water sprinklers 385
White-box tests 456
Windows as physical security control 376
Wireless APs 260—261
Wireless communication 257
Wireless communication, APs 260—261
wireless devices 271
wireless LANs, security 326—328
wireless networks 269
wireless networks, 802.11 standards 269
Wireless networks, broadcasting methods 270
wireless networks, security 271
World Wide Web 272
WPAN (wireless PAN) 243
WPs, documenting audit findings 43—45
X.25 267
XP (Extreme Programming) 143 457
Zachma, John 73
|
|
 |
Реклама |
 |
|
|