Index
Note: Page numbers followed by b indicates boxes, f indicates figures and t indicates tables.
A
Access control defensive categories
21b
discretionary access control (DAC)
130
mandatory access control (MAC)
130
Access control technologies
centralized access control
125
decentralized access control
125
Federated identity management (FIdM)
126
lightweight directory access protocol (LDAP)
127
security association markup language (SAML)
126
Address space location randomization (ASLR)
58
Administrative personnel controls
least privilege/minimum necessary access
147
mandatory leave/forced vacat
148
nondisclosure agreement (NDA)
148
Advanced encryption standard (AES)
67,
71,
72t
Agile software development
Annualized loss expectancy (ALE)
24–25,
25t
Annual rate of occurrence (ARO)
24
Application-layer, OSI model
99–100
Application-layer TCP/IP protocols
Application programming interface (API)
193
Application whitelisting
156
Arithmetic logic unit (ALU)
55
vulnerability testing
137
configuration management
157
data security control determination
40–44
memory and remanence
37–39
Diffie-Hellman key agreement protocol
73
factoring prime numbers
72–73
Asynchronous dynamic token
120
phishers and spear phishers
29
Authentication, authorization, and accountability (AAA)
4
Authentication protocols and frameworks
Authentication server (AS)
120
B
Background checks
19,
148
Basic input/output system (BIOS)
38,
57
rules and properties
50,
50b
Bridges, layer 2 device
108
BS-25999 and ISO 22301
180
Business Continuity Institute (BCI)
180–181
Business Continuity Management System (BCMS)
180
Business continuity planning (BCP)
business impact analysis (BIA)
167–169
critical state, assessing
167
Emergency Operations Center (EOC)
173
Business impact analysis (BIA)
BCP/DRP-focused risk assessment
168
failure and recovery metrics
168–169
maximum tolerable downtime (MTD)
168
Business recovery plan (BRP)
172
C
Carnegie Mellon University’s (CMU)
202
Centralized access control
125
multitasking and multiprocessing
56
Certificate authorities (CAs)
77
Certificate revocation lists (CRL)
77
Challenge-handshake authentication protocol (CHAP)
130
Cipher block chaining (CBC)
70
Circuit-switched networks
point-to-point connections
97
Code repository security
192
Combinatorial software testing
140
Commercial off-the-shelf (COTS) software
203
Communication and network security, domain 4
network architecture and design
96–107
secure network devices and protocols
107–111
Complex instruction set computer (CISC)
56
Computer-aided software engineering (CASE)
187
import/export restrictions
13
international cooperation
12
Computer Ethics Institute
16
Confidentiality, integrity, and availability (CIA)
3–4
vulnerability management
157
Conflict of interest categories (CoIs)
51
Constrained user interface
196
Content-dependent access control
131
Content distribution networks (CDN)
114–115
Context-dependent access control
131
service level agreement (SLA)
158
Continuity of operations plan (COOP)
163,
172
Continuity of support plan
172
Cornerstone cryptographic concepts
confidentiality, integrity, authentication, and nonrepudiation
67
confusion, diffusion, substitution, and permutation
67
cryptographic strength
67
data at rest and in motion
68
monoalphabetic and polyalphabetic ciphers
67–68
Cornerstone information security concepts
3–5
Council of Europe Convention on Cybercrime
12
Crisis management plan (CMP)
172
Crossover error rate (CER)
121,
122f
Cross-site request forgery (CSRF)
201
Cryptographic attacks
74–75
adaptive chosen ciphertext
75
adaptive chosen plaintext
75
differential cryptanalysis
75
Cryptographic strength
67
asymmetric encryption
72–73
symmetric encryption
69–72
Custom-developed third-party products
203
Cyberincident response plan
172
D
Database management system (DBMS)
194
Database normalization
196
data warehousing and data mining
197–198
replication and shadowing
197
inference and aggregation
65
Data classification
34–35
formal access approval
35
sensitive information/media security
35
Data collection limitation
37
Data definition language (DDL)
196
Data encryption standard (DES)
69–71
Data execution prevention (DEP)
58
Data manipulation language (DML)
196
drive and tape encryption
44
media storage and transportation
44
Data retention policies
150
certification and accreditation
40
standards and control frameworks
40–43
Decentralized access control
125
Denial of service (DoS)
4
Desktop and application virtualization
113
Differential linear analysis
75
Diffie-Hellman key agreement protocol
73
Digital subscriber line (DSL)
112–113
Direct-sequence spread spectrum (DSSS)
106
Disaster recovery plan (DRP) testing
business interruption
178
simulation test/walkthrough drill
177
Disaster recovery process
Disclosure, alteration, and destruction (DAD)
4
Distributed network protocol (DNP3)
104
Domain name system (DNS)
103
Drive and tape encryption
44
Duress warning systems
87
Dynamic random-access memory (DRAM)
38
Dynamic testing tests
139
E
EAP-Transport Layer Security (EAP-TLS)
111
EAP Tunneled Transport Layer Security (EAP-TTLS)
111
Electronic code book (ECB)
70
Elliptic curve cryptography (ECC)
73
Embedded device forensics
149
Emergency Operations Center (EOC)
173
application whitelisting
156
removable media controls
156
End-user license agreements (EULAs)
11
Enticement and entrapment
9
Environmental controls
85–90
ABCD fires and suppression
88
electromagnetic interference (EMI)
86
portable fire extinguishers
90
Equal error rate (EER)
121
Erasable programmable read-only memory (EPROM)
38
Computer Ethics Institute
16
Ethics and the Internet 16–17
European union (EU) privacy
11–12
Data Protection Directive
12
US-based organizations
12
Evaluation assurance level (EAL)
41
Exclusive OR (XOR)
68,
68t
Executive Order 12356-National Security Information
34
Extended unique identifier-64 (EUI-64)
100
Extensible authentication protocol (EAP)
111
Extensible markup language (XML)
64,
126
F
False accept rate (FAR)
121
False reject rate (FRR)
121
redundant array of inexpensive disks (RAID)
158–162
Federated identity management (FIdM)
126
Fetch and execute cycle
55
Fibre Channel over Ethernet (FCoE)
104–105
Fibre Channel over IP (FCIP)
104–105
File allocation table (FAT)
39
File transfer protocol (FTP)
102
Formal access approval
35
Frequency-hopping spread spectrum (FHSS)
106
Full-duplex communication
96
G
Global area network (GAN)
96
Global positioning system (GPS)
124
Good Practice Guidelines (GPG)
180–181
Greatest lower bound (GLB)
50
H
Half-duplex communication
96
Halon extinguishers
89–90
Heating, ventilation, and air conditioning (HVAC)
86
Heavyweight process (HWP)
56
Heuristic-based antivirus
63
High-availability cluster
Host-based intrusion detection systems (HIDS)
155
Host-based intrusion prevention systems (HIPS)
155
Host-to-host transport layer
100
Hypertext transfer protocol (HTTP)
103
Hypertext transfer protocol secure (HTTPS)
103
I
Identity and access management
Identity and authentication
4
Identity as a service (IDaaS)
126
Incident response management
Inference and aggregation
65
Information security governance
17–20
Information security professionals
2
Information security program
business owners and mission owners
36
Information Systems Audit and Control Association (ISACA)
43
Information Technology Infrastructure Library (ITIL)
43
Infrastructure as a service (IaaS)
60
Integrated circuit card (ICC)
81
Integrated product team (IPT)
192
Intellectual property
10–11
International Common Criteria
41–42
International cooperation
12
import/export restrictions
13
International data encryption algorithm (IDEA)
71
International Organization for Standardization
42
International Software Testing Qualifications Board (ISTQB)
202–203
Internet Activities Board’s (IAB) ethics
16–17
Internet control message protocol (ICMP)
99,
101
Internet message access protocol (IMAP)
102
Internet protocol security (IPsec)
78–79,
112
authentication header (AH)
78
encapsulating security payload (ESP)
78
internet security association and key management protocol (ISAKMP)
78
security association (SA)
78
tunnel and transport mode
78–79
Internet protocol version 4 (IPv4)
100–101
Internet protocol version 6 (IPv6)
101
Internet relay chat (IRC)
114
Internet service provider (ISP)
84
Internet small computer system interface (iSCSI)
104–105
Interpreted languages
187
Intrusion detection system (IDS)
153–154
Intrusion prevention system (IPS)
153–154
Investigations, legal aspects of
8–9
entrapment and enticement
9
J
Java Virtual Machine (JVM)
64
K
Kernel, operating system
58–59
Key Distribution Center (KDC)
128
L
Large-scale parallel data systems
60–61
Lattice-based access control
50
Least upper bound (LUB)
50
Legal and regulatory issues
5–13
Lightweight directory access protocol (LDAP)
127
Lightweight extensible authentication protocol (LEAP)
111
Lightweight process (LWP)
56
Local-area network (LAN)
96,
103
Logical link control (LLC)
98
M
civil law (legal system)
6
religious and customary law
6
Malicious code (malware)
62–63
Mandatory access control
147
Mandatory leave/forced vacation
148
Maximum allowable downtime (MTD)
168
Mean time between failures (MTBF)
168–169
Media access control (MAC)
98
Media storage and transportation
44
Message Digest algorithm 5 (MD5)
74
Metropolitan area network (MAN)
96
Minimum operating requirements (MOR)
168–169
Monoalphabetic cipher
67–68
Multiprotocol label switching (MPLS)
104
Multipurpose Internet mail extensions (MIME)
79
Multitasking and multiprocessing
56
N
Network architecture and design
application-layer TCP/IP protocols and concepts
101–103
fundamental concepts
96–97
LAN technologies and protocols
103
WAN technologies and protocols
103–104
Network-based intrusion detection system (NIDS)
154–155,
154f
Network-based intrusion prevention system (NIPS)
154–155,
155f
circuit-switched networks
97
full-duplex communication
96
half-duplex communication
96
packet-switched networks
97
The New New Product Development Game 189–190
Nondisclosure agreement (NDA)
148
Nondiscretionary access control
Nontechnical stake holders
152
O
Object-oriented databases
197
Object-oriented programming (OOP)
198–200
Object request brokers (ORBs)
200
Occupant emergency plan (OEP)
163,
172
One-way hash functions
73
Online Certificate Status Protocol (OCSP)
77
Open and closed systems
54,
54b
Open-source Metasploit
136
Open system interconnection (OSI)
98t
Open Web Application Security Project (OWASP)
64
Operational expenses (OPEX)
153
Operationally Critical Threat, Asset, and Vulnerability Evaluation
sm 41
Operational preventive and detective controls
security information and event management
155
Organisation for Economic Co-operation and Development (OECD)
12,
37
Organizational registration authorities (ORAs)
77
Orthogonal frequency-division multiplexing (OFDM)
106
business/mission owners
36
data collection limitation
37
data controllers and data processors
37
information security roles
36
P
Packet-switched networks
97
Partial-knowledge tests
136
Password authentication protocol (PAP)
130
Payment Card Industry Data Security Standard (PCI DSS)
40–41,
138
Peer-to-peer (P2P) networks
61
smart cards and magnetic stripe cards
81
tailgating/piggybacking
81
walls, floors, and ceilings
83
Permanent virtual circuit (PVC)
104
Personal area networks (PAN)
96
Personal digital assistants (PDAs)
114
Personal identification number (PIN)
82,
118
Personally identifiable information (PII)
3,
61
outsourcing and offshoring
20
security awareness and training
19
vendor, consultant, and contractor security
20
Phishers and spear phishers
29
Photoelectric motion sensor
82
Platform as a service (PaaS)
60
Point-to-point protocol (PPP)
112
Polyalphabetic cipher
67–68
Polyinstantiation
65,
199
Port-based network access control (PNAC)
111
Power-on self-test (POST)
57
Pretty Good Privacy (PGP)
79
Programmable logic device (PLD)
38
Programmable read-only memory (PROM)
38
Public key infrastructure (PKI)
77
Publicly released software
open-source and closed-source software
187
Q
Qualitative risk analysis
27
Quality of service (QoS)
97
Quantitative risk analysis
27
R
Radio frequency identification (RFID)
81,
107
Random-access memory (RAM)
37–38
Rapid application development (RAD)
190
Reading down and writing up model
50
Read-only memory (ROM)
37–38
Real-time transport protocol (RTP)
105
Reciprocal agreements
170
Recovery point objective (RPO)
168
reciprocal agreements
170
Recovery time objective (RTO)
168
Reduced instruction set computer (RISC)
56
Redundant array of inexpensive disks (RAID)
dual-distributed parity
161
desktop and application virtualization
113
remote desktop console access
113
remote meeting technology
114
Remote authentication dial in user service (RADIUS) protocol
128–129
Remote desktop protocol (RDP)
113
Removable media controls
156
Responsible disclosure
202
Return on investment (ROI)
3,
25–26
Right to penetration test/right to audit
14
schematic diagram of
53,
53f
Risk acceptance criteria
27
quantitative and qualitative
27
Risk analysis matrix
23,
23t
Risk management process
28
Robust security network (RSN)
107,
107b
Role-based access control (RBAC)
130
S
authentication protocols and frameworks
111–112
Secure European system for applications in a multivendor environment (SESAME)
128
Secure hardware architecture
54–58
system unit and motherboard
54
Secure hash algorithm (SHA)
73–74
Secure network devices and protocols
107–111
Secure operating system and software architecture
58–59
Secure sockets layer (SSL)
78,
112
Secure system design concepts
52–54
open and closed systems
54
Security and third parties
13–14
service provider contractual security
13–14
Security architecture layers
52
Security assessment and testing
Security association markup language (SAML)
126
Security documentation
18,
19t
Security engineering, domain 3
cornerstone cryptographic concepts
66–68
cryptographic attacks
74–75
environmental controls
85–90
secure hardware architecture
54–58
secure operating system and software architecture
58–59
secure system design concepts
52–54
site selection, design, and configuration
83–84
system vulnerabilities, threats, and countermeasures
61–66
virtualization and distributed computing
59–61
Security Information and Event Management (SIEM)
155
Bell-LaPadula model
50,
50b
lattice-based access control
50
reading down and writing up
50
testing, training, and awareness
176–178
incident response management
150–153
operational preventive and detective controls
153–157
Security risk management, domain 1
2
access control defensive
20–22
cornerstone information security concepts
3–5
due care and due diligence
8
import/export restrictions
13
information security governance
17–20
intellectual property
10–11
international cooperation
12
legal and regulatory issues
5–13
security and third parties
13–14
Sensitive information/media security
35
Service level agreement (SLA)
13,
158,
203
Service Management Practices-Core Guidance
43
Service-oriented architecture (SOA)
heterogeneous applications
65
Service provider contractual security
13–14
right to penetration test/right to audit
14
Session initiation protocol (SIP)
105
Signature-based antivirus software
63
Simple mail transfer protocol (SMTP)
102
Single-loss expectancy (SLE)
24
Site design and configuration issues
84
media storage facilities
84
shared tenancy and adjacent buildings
84
Site selection issues
83–84
utility reliability
83–84
Software as a service (SaaS)
60
Software capability maturity model
202
Software-defined networking (SDN)
105
Software development security
193
application development methods
188–194
object-oriented programming
198–200
Software Engineering Institute (SEI)
202
static and dynamic testing
139
synthetic transactions
140
test coverage analysis
141
Solid-state drives (SSDs)
34
ATA Secure Erase and destruction
39
Standards and control frameworks
40–43
International Common Criteria
41–42
ISO 17799 and the ISO 27000 Series
42
Static random-access memory (SRAM)
38
Storage area network (SAN)
104
Structured query language (SQL)
194
Switches, layer 2 device
108
Symmetric encryption
69–72
blowfish and twofish
71–72
initialization vectors and chaining
69
stream and block ciphers
69
Synchronous dynamic token
120
Synthetic transactions
140
Systems development life cycle (SDLC)
191–192
System unit and motherboard
54
System vulnerabilities, threats, and countermeasures
61–66
malicious code (malware)
62–63
web architecture and attacks
63–65
T
Tailoring, of organization
43
Target of evaluation (ToE)
41
Task-based access control
131
Terminal access controller access control system (TACACS)
129
Test coverage analysis
141
Third-party payroll company
45
Ticket Granting Service’s (TGS)
128
Time of check/time of use (TOC/TOU)
201
Total cost of ownership (TCO)
3,
25
outsourcing and offshoring
20
Transmission control protocol/Internet protocol (TCP/IP)
96
host-to-host transport layer
100
reserved and ephemeral ports
101
Transport layer security (TLS)
78,
98
Triple data encryption algorithm (TDEA)
71
Triple Data Encryption Standard (TDES)
67
Trusted platform module (TPM)
58
Type 2 authentication
120
U
Ultrasonic and microwave motion detectors
82
Unified Modeling Language (UML)
141
Unshielded twisted pair (UTP)
98
US Department of defense (DoD)
50
Users, information security roles
36
US National Institute of Standards and Technology (NIST)
71
V
Virtualization and distributed computing
59–61
large-scale parallel data systems
60–61
Virtualization escape (VMEscape)
59
Virtual network computing (VNC)
113
Virtual private networks (VPNs)
112
Voice over Internet protocol (VoIP)
105
W
Web architecture and attacks
63–65
White-box software testing
139
Wired equivalent privacy protocol (WEP)
106–107
Wireless local-area networks (WLANs)
105–107
Work recovery time (WRT)
168
Write once, read many (WORM) storage
57
X
Z
Zed Attack Proxy (ZAP)
64
Zero-day vulnerabilities
157