xdxdxd123

Untitled

May 31st, 2017
1,299
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 182.23 KB | None | 0 0
  1. Key Term
  2. war game A type of rehearsal that seeks to realistically simulate the circumstances needed to
  3. thoroughly test a plan.
  4. The primary goal of the readiness and review domain is to keep the information security
  5. program functioning as designed and improve it continuously over time. This goal can be
  6. accomplished by doing the following:
  7. Policy review: Policy needs to be reviewed and refreshed from time to time to ensure
  8. its soundness—in other words, it must provide a current foundation for the informa-
  9. tion security program.
  10. Program review: Major planning components should be reviewed on a periodic basis
  11. to ensure that they are current, accurate, and appropriate.
  12. Rehearsals: When possible, major plan elements should be rehearsed.
  13. The relationships among the sectors of the readiness and review domain are shown in Figure 12-9.
  14. As the diagram indicates, policy review is the primary initiator of this domain. As policy is revised
  15. or current policy is confirmed, the planning elements are reviewed for compliance, the information
  16. Security Management Maintenance Models 639
  17. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  18. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  19. security program is reviewed, and rehearsals are held to make sure all participants are capable of
  20. responding as needed.
  21. Policy Review and Planning Review Policy needs to be reviewed periodically, as you
  22. learned in Chapter 4. The planning and review process for incident response, disaster recov-
  23. ery, and business continuity planning (IRP, DRP, and BCP) were also covered in Chapter 4.
  24. Program Review As policy needs shift, a thorough and independent review of the entire
  25. information security program is needed. While an exact timetable for review is not proposed
  26. here, many organizations find that the CISO should conduct a formal review annually. Ear-
  27. lier in this chapter, you learned about the role of the CISO in the maintenance process. The
  28. CISO uses the results of maintenance activities and the review of the information security
  29. program to determine if the status quo is adequate against the threats at hand.
  30. If the current information security program is not up to the challenges, the CISO must deter-
  31. mine if incremental improvements are possible or if it is time to restructure the information
  32. security function within the organization.
  33. Rehearsals and War Games Whenever possible, major planning elements should be
  34. rehearsed. Rehearsal adds value by exercising procedures, identifying shortcomings, and
  35. providing security personnel with the opportunity to improve the security plan before it
  36. is needed. In addition, rehearsals make people more effective when an actual event
  37. occurs. A type of rehearsal known as a war game or simulation puts a subset of plans in
  38. place to create a realistic test environment. This adds to the value of the rehearsal and
  39. can enhance training.
  40. Policy review
  41. Plan review for
  42. IRP, DRP, and BCP
  43. Security team maintains
  44. security programs and
  45. stays ready
  46. Rehearsals and
  47. war games
  48. Figure 12-9 Readiness and review
  49. © Cengage Learning
  50. 640 Chapter 12
  51. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  52. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  53. 12
  54. Digital Forensics
  55. Key Terms
  56. digital forensics The application of forensics techniques and methodologies to the
  57. preservation, identification, extraction, documentation, and interpretation of digital media for
  58. evidentiary and/or root-cause analysis.
  59. digital malfeasance A crime against or using digital media, computer technology, or related
  60. components.
  61. evidentiary material (EM) Any item or information that applies to an organization’s legal or
  62. policy-based case; also known as an item of potential evidentiary value.
  63. forensics The coherent application of methodical investigatory techniques to present evidence
  64. of crimes in a court or similar setting.
  65. Whether due to a character flaw, a need for vengeance, or simple curiosity, an employee
  66. or outsider may attack a physical asset or information asset. When the asset is in the pur-
  67. view of the CISO, he is expected to understand how policies and laws require the matter
  68. to be managed. To protect the organization and possibly assist law enforcement in an
  69. investigation, the CISO must document what happened and how. This process is called
  70. digital forensics.
  71. Digital forensics is based on the field of traditional forensics. Made popular by scientific detec-
  72. tive shows that focus on crime scene investigations, forensics involves the use of science to
  73. investigate events. Not all events involve crimes; some involve natural events, accidents, or sys-
  74. tem malfunctions. Forensics allows investigators to determine what happened by examining
  75. the results of an event. It also allows them to determine how the event happened by examin-
  76. ing activities, individual actions, physical evidence, and testimony related to the event. How-
  77. ever, forensics might not figure out the why of the event; that’s the focus of psychological,
  78. sociological, and criminal justice studies. Here, the focus is on the application of forensics
  79. techniques in the digital arena.
  80. Digital forensics involves the preservation, identification, extraction, documentation, and
  81. interpretation of digital media, including computer media, for evidentiary and/or root-
  82. cause analysis. Like traditional forensics, it follows clear, well-defined methodologies, but
  83. it still tends to be as much an art as a science. In other words, the natural curiosity and
  84. personal skill of the investigator play a key role in discovering potential evidentiary mate-
  85. rial (EM). An item does not become evidence until it is formally admitted by a judge or
  86. other ruling official.
  87. Digital forensics investigators use a variety of tools to support their work, as you will learn
  88. later in this chapter. However, the tools and methods used by attackers can be equally sophis-
  89. ticated. Digital forensics can be used for two key purposes:
  90. To investigate allegations of digital malfeasance. Such an investigation requires digital
  91. forensics to gather, analyze, and report the findings. This is the primary mission of law
  92. enforcement in investigating crimes that involve computer technologies or online
  93. information.
  94. To perform root-cause analysis. If an incident occurs and the organization suspects an
  95. attack was successful, digital forensics can be used to examine the path and
  96. Digital Forensics 641
  97. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  98. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  99. methodology used to gain unauthorized access, and to determine how pervasive and
  100. successful the attack was. This type of analysis is used primarily by incident response
  101. teams to examine their equipment after an incident.
  102. Some investigations are undertaken by an organization’s own personnel, while others
  103. require the immediate involvement of law enforcement. In general, whenever investigators
  104. discover evidence of a crime, they should immediately notify management and recommend
  105. contacting law enforcement. Failure to do so could result in unfavorable action against the
  106. investigator or organization.
  107. The organization must choose one of two approaches when employing digital forensics:
  108. 1. Protect and forget. This approach, also known as patch and proceed, focuses on the
  109. defense of data and the systems that house, use, and transmit it. An investigation
  110. that takes this approach focuses on the detection and analysis of events to deter-
  111. mine how they happened and to prevent reoccurrence. Once the current event is
  112. over, who caused it or why is almost immaterial.
  113. 2. Apprehend and prosecute. This approach, also known as pursue and prosecute,
  114. focuses on the identification and apprehension of responsible parties, with
  115. additional attention to the collection and preservation of potential EM that
  116. might support administrative or criminal prosecution. This approach requires
  117. much more attention to detail to prevent contamination of evidence that might
  118. hinder prosecution.
  119. An organization might find it impossible to retain enough data to successfully handle
  120. even administrative penalties, but it should certainly adopt the latter approach if it
  121. wants to pursue formal administrative penalties, especially if the employee is likely to
  122. challenge them.
  123. For more information on digital forensics, visit the American Society of Digital Forensics and
  124. eDiscovery at www.asdfed.com.
  125. ‡ The Digital Forensics Team
  126. Most organizations cannot sustain a permanent digital forensics team; such expertise is so
  127. rarely called upon that it may be better to collect the data and then outsource the analysis
  128. component to a regional expert. The organization can then maintain an arm’s-length distance
  129. from the case and have additional expertise to call upon if the process ends in court. Even so,
  130. the information security group should contain members who are trained to understand and
  131. manage the forensics process. If the group receives a report of suspected misuse, either inter-
  132. nally or externally, a group member must be familiar with digital forensics procedures to
  133. avoid contaminating potential EM.
  134. This expertise can be obtained by sending staff members to a regional or national infor-
  135. mation security conference with a digital forensics track or to dedicated digital forensics
  136. training, as mentioned in Chapter 11. The organization should use caution in selecting
  137. training for the team or a specialist, as many forensics training programs begin with the
  138. analysis process and promote a specific tool rather than teaching management of the
  139. process.
  140. 642 Chapter 12
  141. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  142. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  143. 12
  144. ‡ Affidavits and Search Warrants
  145. Key Terms
  146. affidavit Sworn testimony that certain facts are in the possession of an investigating officer; an
  147. affidavit can be used to request a search warrant.
  148. search warrant A document issued by an authorized authority that allows law enforcement
  149. agents to search for EM at a specified location and seize specific items for official examination.
  150. Most investigations begin with an allegation or an indication of an incident. Whether via the
  151. help desk, the organization’s sexual harassment reporting channels, or a direct report, some-
  152. one alleges that a worker is performing actions explicitly prohibited by the organization or
  153. that make another worker uncomfortable in the workplace. The organization’s forensics
  154. team or other authorized entity must then request permission to examine digital media for
  155. potential EM. In law enforcement, the investigating agent would create an affidavit request-
  156. ing a search warrant. The affidavit summarizes the facts of the case, items relevant to the
  157. investigation, and the location of the event. When an approving authority signs the affidavit
  158. or creates a synopsis form based on the document, it becomes a search warrant. In corporate
  159. environments, the names of these documents may change, and in many cases written authori-
  160. zation may not be needed, but the process should be the same. Formal permission is obtained
  161. before an investigation occurs.
  162. ‡ Digital Forensics Methodology
  163. Key Terms
  164. chain of custody See chain of evidence.
  165. chain of evidence The detailed documentation of the collection, storage, transfer, and
  166. ownership of evidence from the crime scene through its presentation in court.
  167. In digital forensics, all investigations follow the same basic methodology:
  168. 1. Identify relevant EM.
  169. 2. Acquire (seize) the evidence without alteration or damage.
  170. 3. Take steps to assure that the evidence is verifiably authentic at every step and is
  171. unchanged from the time it was seized.
  172. 4. Analyze the data without risking modification or unauthorized access.
  173. 5. Report the findings to the proper authority.
  174. This process is illustrated in Figure 12-10.
  175. To support the selection and implementation of a methodology for forensics, the organiza-
  176. tion may want to seek legal advice or consult with local or state law enforcement. Other
  177. references that should become part of the organization’s library are:
  178. Electronic Crime Scene Investigation: A Guide for First Responders, July 2001 (www
  179. .ncjrs.gov/pdffiles1/nij/187736.pdf)
  180. Digital Forensics 643
  181. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  182. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  183. First Responders Guide to Computer Forensics (resources.sei.cmu.edu/library/asset-
  184. view.cfm?assetid=7251)
  185. First Responders Guide to Computer Forensics: Advanced Topics (resources.sei.cmu
  186. .edu/library/asset-view.cfm?assetid=7261)
  187. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal
  188. Investigations (www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf)
  189. Scientific Working Group on Digital Evidence: Best Practices for Computer Forensics
  190. (www.oas.org/juridico/spanish/cyb_best_pract.pdf).
  191. Identifying Relevant Items The affidavit or warrant that authorizes a search must
  192. identify what items of evidence can be seized and where they are located. Only EM that fits
  193. the description on the authorization can be seized. These seizures often occur under stressful
  194. circumstances and strict time constraints, so thorough item descriptions help the process
  195. function smoothly and ensure that critical evidence is not overlooked. Thorough descrip-
  196. tions also ensure that items are not wrongly included as EM, which could jeopardize the
  197. investigation.
  198. Because users have access to many online server locations via free e-mail archives, FTP ser-
  199. vers, and video archives, and could have terabytes of information stored in offsite locations
  200. across the Web or on their local systems, investigators must have an idea of what to look
  201. for or they may never find it.
  202. Acquiring the Evidence The principal responsibility of the response team is to
  203. acquire the information without altering it. Computers and users modify data constantly.
  204. Every time someone opens, modifies, or saves a file, or even opens a directory index to
  205. view the available files, the state of the system is changed. Normal system file changes may
  206. Prepare affidavit
  207. seeking
  208. authorization
  209. to investigate
  210. Policy violation or
  211. crime detected
  212. Investigation
  213. authorized?
  214. Collect evidence
  215. Security incident
  216. Triggers incident
  217. response process
  218. Archive
  219. Archive
  220. Produce report
  221. and submit
  222. for disposition
  223. Analyze evidence
  224. Either internal or external to the organization
  225. No
  226. Yes
  227. Figure 12-10 The digital forensics process
  228. © Cengage Learning
  229. 644 Chapter 12
  230. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  231. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  232. 12
  233. be difficult to explain to a layperson—for example, a jury member with little or no technical
  234. knowledge. A normal system consequence of the search for EM could be portrayed by a
  235. defense attorney as harmful to the EM’s authenticity or integrity, which could lead a jury
  236. to suspect it was planted or is otherwise suspect.
  237. Online Versus Offline Data Acquisition There are generally two methods of acquiring
  238. evidence from a system. The first is the offline model, in which the investigator removes the
  239. power source and then uses a utility or special device to make a bitstream, sector-by-sector
  240. copy of the hard drives on the system. By copying the drives at the sector level, you can
  241. ensure that any hidden or erased files are also captured. The copied drive then becomes the
  242. image that can be used for analysis, and the original drive is stored for safekeeping as true
  243. EM or possibly returned to service. For the purposes of this discussion, the term copy refers
  244. to a drive duplication technique, whereas an image is the file that contains all the information
  245. from the source drive.
  246. This approach requires the use of sound processes and techniques or read-only hardware
  247. known as write-blockers to prevent the accidental overwriting of data on the source drive.
  248. The use of these tools also allows investigators to assert that the EM was not modified dur-
  249. ing acquisition. In another offline approach, the investigator can reboot the system with an
  250. alternate operating system or a specialty boot disk like Helix or Knoppix. Still another
  251. approach involves specialty hardware that connects directly to a powered-down hard drive
  252. and provides direct power and data connections to copy data to an internal drive.
  253. In online or “live” data acquisition, investigators use network-based tools to acquire a
  254. protected copy of the information. The only real difference between the two methods is
  255. that the source system cannot be taken offline, and the tools must be sophisticated enough
  256. to avoid altering the system during data acquisition. Table 12-10 lists common methods of
  257. acquiring data.
  258. The creation of a copy or image can take a substantial amount of time. Users who have
  259. made USB copies of their data know how much time it takes to back up several gigabytes of
  260. data. When dealing with networked server drives, the data acquisition phase can take many
  261. hours to complete, which is one reason investigators prefer to seize drives and take them
  262. back to the lab to be imaged or copied.
  263. Other Potential Evidence Not all EM is on a suspect’s computer hard drive. A techni-
  264. cally savvy attacker is more likely to store incriminating evidence on other digital media,
  265. such as smart phones, removable drives, CDs, DVDs, flash drives, memory chips or sticks,
  266. or on other computers accessed across the organization’s networks or via the Internet. EM
  267. located outside the organization is particularly problematic because the organization cannot
  268. legally search systems it doesn’t own. However, the simple act of viewing EM on a system
  269. leaves clues about the location of the source material, and a skilled investigator can at least
  270. provide some assistance to law enforcement when conducting a preliminary investigation.
  271. Log files are another source of information about the access and location of EM, as well as
  272. what happened and when.
  273. Some evidence isn’t electronic or digital. Many suspects have been further incriminated when
  274. passwords to their digital media were discovered in the margins of user manuals, in calendars
  275. and day planners, and even on notes attached to their systems.
  276. Digital Forensics 645
  277. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  278. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  279. EM Handling Once the evidence is acquired, both the copy image and the original drive
  280. should be handled properly to avoid legal challenges based on authenticity and preserva-
  281. tion of integrity. If the organization or law enforcement cannot demonstrate that no one
  282. had access to the evidence, they cannot provide strong assurances that it has not been
  283. altered. Such access can be physical or logical if the device is connected to a network.
  284. Once the evidence is in the possession of investigators, they must track its movement,
  285. storage, and access until the resolution of the event or case. This is typically accom-
  286. plished through chain of evidence or chain of custody procedures. The evidence is then
  287. tracked wherever it is located. When the evidence changes hands or is stored, the docu-
  288. mentation is updated.
  289. Not all evidence-handling requirements are met through the chain of custody process. Digital
  290. media must be stored in a specially designed environment that can be secured to prevent
  291. unauthorized access. For example, individual items might need to be stored in containers or
  292. bags that protect them from electrostatic discharge or magnetic fields. Additional details are
  293. provided in the nearby Technical Details feature.
  294. Method Advantages Disadvantages
  295. Use a dedicated forensic
  296. workstation to examine a write-
  297. protected hard drive or image of the
  298. suspect hard drive.
  299. No concern about the validity of
  300. software or hardware on the suspect
  301. host. Produces evidence most easily
  302. defended in court.
  303. Inconvenient, time-consuming. May
  304. result in loss of volatile information.
  305. Boot the system using a verified,
  306. write-protected CD or other media
  307. with kernel and tools.
  308. Convenient, quick. Evidence is
  309. defensible if suspect drives are
  310. mounted as read-only.
  311. Assumes that hardware has not
  312. been compromised because it is
  313. much less likely than compromised
  314. software. May result in loss of
  315. volatile information.
  316. Build a new system that contains an
  317. image of the suspect system and
  318. examine it.
  319. Completely replicates operating
  320. environment of suspect computer
  321. without running the risk of
  322. changing its information.
  323. Requires availability of hardware
  324. that is identical to that on the
  325. suspect computer. May result in loss
  326. of volatile information.
  327. Examine the system using external
  328. media with verified software.
  329. Convenient, quick. Allows
  330. examination of volatile information.
  331. If a kernel is compromised, results
  332. may be misleading. External media
  333. may not contain every necessary
  334. utility.
  335. Verify the software on the suspect
  336. system, and then use the verified
  337. local software to conduct the
  338. examination.
  339. Requires minimal preparation.
  340. Allows examination of volatile
  341. information. Can be performed
  342. remotely.
  343. Lack of write protection for suspect
  344. drives makes evidence difficult to
  345. defend in court. Finding sources for
  346. hash values and verifying the local
  347. software requires at least several
  348. hours, unless Tripwire was used
  349. ahead of time.
  350. Examine the suspect system using
  351. the software on it, without verifying
  352. the software.
  353. Requires least amount of
  354. preparation. Allows examination of
  355. volatile information. Can be
  356. performed remotely.
  357. Least reliable method. This is exactly
  358. what cyberattackers are hoping you
  359. will do. Often a complete waste of
  360. time.
  361. Table 12-10 Summary of Methods Employed to Acquire Forensic Data
  362. © Cengage Learning 2015
  363. 646 Chapter 12
  364. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  365. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  366. 12
  367. Authenticating the Recovered Evidence The copy or image is typically transferred to
  368. the laboratory for the next stage of authentication. Using cryptographic hash tools, the team
  369. must be able to demonstrate that any analyzed copy or image is a true and accurate replica
  370. of the source EM. As you learned in Chapter 8, the hash tool takes a variable-length file
  371. and creates a single numerical value, usually represented in hexadecimal notation, that func-
  372. tions like a digital fingerprint. By hashing the source file and the copy, the investigator can
  373. assert that the copy is a true and accurate duplicate of the source.
  374. Analyzing the Data The most complex part of an investigation is analyzing the copy or
  375. image for potential EM. While the process can be performed manually using simple utilities,
  376. two industry-leading applications dominate the market for digital forensics:
  377. Guidance Software’s EnCase (www.guidancesoftware.com)
  378. AccessData Forensics Tool Kit (FTK, at www.accessdata.com)
  379. Open source alternatives to these rather expensive tools include Autopsy and The Sleuth Kit,
  380. which are available from www.sleuthkit.org. Autopsy is a stand-alone GUI interface for The
  381. Sleuth Kit, which uses a command line. Each tool is designed to support an investigation and
  382. assist in the management of the entire case.
  383. General Procedures for Evidence Search and Seizure
  384. At the crime scene, complete the following tasks:
  385. 1. Secure the crime scene by clearing all unauthorized personnel, delimit the scene
  386. with tape or other markers, and post a guard or other person at the entrance.
  387. 2. Log into the crime scene by signing the entry/exit log.
  388. 3. Photograph the scene beginning at the doorway and covering the entire room
  389. in 360 degrees. Include specific photos of potential evidentiary material.
  390. 4. Sketch the layout for the room, including furniture and equipment.
  391. 5. Following proper procedure, begin searching for physical, documentary evi-
  392. dence to support your case, including papers, media such as CDs or flash mem-
  393. ory devices, or other artifacts. Identify the location of each piece of evidence
  394. with a marker or other designator and cross-reference it on the sketch. Photo-
  395. graph the item in situ to establish its location and state.
  396. 6. For each computer, first check for the presence of a screen saver by moving
  397. the mouse. Do not click the mouse or use the keyboard. If the screen is active,
  398. photograph the screen. Pull the power on permitted systems. Document each
  399. computer by taking a photograph and providing a detailed written description
  400. of the manufacturer, model number, serial number, and other details. Using
  401. (continues)
  402. OFFLINE
  403. Digital Forensics 647
  404. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  405. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  406. The first component of the analysis phase is indexing. During indexing, many investigatory
  407. tools create an index of all text found on the drive, including data found in deleted files and in
  408. file slack space. This indexing is similar to that performed by Google Desktop or Windows
  409. Desktop Search tools. The index can then be used by the investigator to locate specific
  410. documents or document fragments. While indexing, the tools typically organize files into
  411. categories,suchasdocuments,images,andexecutables.Unfortunately,likeimaging,indexing
  412. is a time- and processor-consuming operation, and it could take days on images that are larger
  413. than 20 gigabytes.
  414. In some cases, the investigator may find password-protected files that the suspect used to
  415. protect the data. Several commercial password cracking tools can assist the investigator.
  416. Some are sold in conjunction with forensics tools, like the AccessData Password Recovery
  417. Tool Kit.
  418. sound processes, remove each disk drive and image it using the appropriate
  419. process and equipment. Document each source drive by photographing it and
  420. providing a detailed description of the manufacturer, serial number, and
  421. other details. Package and secure the image.
  422. 7. For each object found, complete the necessary evidence or chain of custody labels.
  423. 8. Log out of the crime scene by signing the entry/exit log.
  424. 9. Transfer all evidence to the lab for investigation or to a suitable evidence locker
  425. for storage. Store and transport all evidence, documentation, and photographic
  426. materials in a locked field evidence locker.
  427. Analyze the image:
  428. 1. Build the case file by entering background information, including investigator,
  429. suspect, date, time, and system analyzed.
  430. 2. Load the image file into the case file. Typical image files have .img, .e01, or .001
  431. extensions.
  432. 3. Index the image. Note that some systems use a database of known files to filter
  433. out files that are known to be applications, system files, or utilities. The use of
  434. this filter improves the quality and effectiveness of the indexing process.
  435. 4. Identify, export, and bookmark related text files by searching the index.
  436. 5. Identify, export, and bookmark related graphics by reviewing the images folder.
  437. If the suspect is accused of viewing child pornography, do not directly view the
  438. images. Some things you can’t “un-see.” Use the database of known images to
  439. compare hash values and tag them as suspect.
  440. 6. Identify, export, and bookmark other evidence files.
  441. 7. Integrate all exported and bookmarked material into the case report.
  442. 648 Chapter 12
  443. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  444. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  445. 12
  446. Reporting the Findings As investigators examine the analyzed copies or images and
  447. identify potential EM, they can tag it and add it to their case files. Once they have found a
  448. suitable amount of information, they can summarize their findings with a synopsis of their
  449. investigatory procedures in a report and submit it to the appropriate authority. This author-
  450. ity could be law enforcement or management. The suitable amount of EM is a flexible deter-
  451. mination made by the investigator. In certain cases, like child pornography, one file is suffi-
  452. cient to warrant turning over the entire investigation to law enforcement. On the other
  453. hand, dismissing an employee for the unauthorized sale of intellectual property may require
  454. a substantial amount of information to support the organization’s assertion. Reporting meth-
  455. ods and formats vary among organizations and should be specified in the digital forensics
  456. policy. A general guideline is that the report should be sufficiently detailed to allow a simi-
  457. larly trained person to repeat the analysis and achieve similar results.
  458. ‡ Evidentiary Procedures
  459. In information security, most operations focus on policies—documents that provide manage-
  460. rial guidance for ongoing implementation and operations. In digital forensics, however, the
  461. focus is on procedures. When investigating digital malfeasance or performing root-cause
  462. analysis, keep in mind that the results and methods of the investigation may end up in crimi-
  463. nal or civil court. For example, during a routine systems update, assume that a technician
  464. finds objectionable material on an employee’s computer. The employee is fired and promptly
  465. sues the organization for wrongful termination, so the investigation of the objectionable
  466. material comes under scrutiny by the plaintiff’s attorney, who will attempt to cast doubt on
  467. the ability of the investigator. While technically not illegal, the presence of the material may
  468. have been a clear violation of policy, prompting the dismissal of the employee. However, if
  469. an attorney can convince a jury or judge that someone else could have placed the material
  470. on the plaintiff’s system, the employee could win the case and potentially a large financial
  471. settlement.
  472. When the scenario involves criminal issues in which an employee discovers evidence of a
  473. crime, the situation changes somewhat. The investigation, analysis, and report are typically
  474. performed by law enforcement personnel. However, if the defense attorney can cast reason-
  475. able doubt on whether the organization’s information security professionals compromised
  476. the digital evidentiary material, the employee might win the case.
  477. How do you avoid these legal pitfalls? Strong procedures for handling potential evidentiary
  478. material can minimize the probability that an organization will lose a legal challenge.
  479. Organizations should develop specific procedures, along with guidance for their effective use.
  480. The policy document should specify the following:
  481. Who may conduct an investigation
  482. Who may authorize an investigation
  483. What affidavits and related documents are required
  484. What search warrants and related documents are required
  485. What digital media may be seized or taken offline
  486. What methodology should be followed
  487. What methods are required for chain of custody or chain of evidence
  488. What format the final report should take and to whom it should be given
  489. Digital Forensics 649
  490. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  491. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  492. The policy document should be supported by a procedures manual and developed based on
  493. the documents discussed earlier, along with guidance from law enforcement or consultants.
  494. By creating and using these policies and procedures, an organization can best protect itself
  495. from challenges by employees who have been subject to unfavorable action from an
  496. investigation.
  497. Selected Readings
  498. Fighting Computer Crime: A New Framework for Protecting Information, by Donn B.
  499. Parker. 1998. John Wiley and Sons.
  500. Digital Evidence and Computer Crime, Third Edition, by Eoghan Casey. 2011.
  501. Academic Press.
  502. Guide to Computer Forensics and Investigations, Fourth Edition, by Amelia Phillips
  503. and Christopher Steuart. 2010. Course Technology.
  504. Chapter Summary
  505. ■ Change is inevitable, so organizations should have procedures to deal with changes in
  506. the operation and maintenance of the information security program.
  507. ■ The CISO decides whether the information security program can adapt to change as it
  508. is implemented or whether the macroscopic process of the SecSDLC must be started
  509. anew.
  510. ■ The maintenance model recommended in this chapter is made up of five subject areas
  511. or domains: external monitoring, internal monitoring, planning and risk assessment,
  512. vulnerability assessment and remediation, and readiness and review.
  513. ■ To stay current, the information security community of interest and the CISO must
  514. constantly monitor the three components of the security triple—threats, assets, and
  515. vulnerabilities.
  516. ■ To assist the information security community in managing and operating the ongoing
  517. security program, the organization should adopt a security management maintenance
  518. model. These models are frameworks that are structured by the tasks of managing a
  519. particular set of activities or business functions.
  520. ■ NIST SP 800-100, Information Security Handbook: A Guide for Managers, outlines
  521. managerial tasks performed after the program is operational. For each of the 13 areas
  522. of information security management presented in SP 800-100, there are specific moni-
  523. toring activities:
  524. 1. Information security governance
  525. 2. Systems development life cycle
  526. 3. Awareness and training
  527. 4. Capital planning and investment control
  528. 5. Interconnecting systems
  529. 650 Chapter 12
  530. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  531. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  532. 12
  533. 6. Performance measures
  534. 7. Security planning
  535. 8. Information technology contingency planning
  536. 9. Risk management
  537. 10. Certification, accreditation, and security assessments
  538. 11. Security services and products acquisition
  539. 12. Incident response
  540. 13. Configuration and change management
  541. ■ The objective of the external monitoring domain in the maintenance model is to pro-
  542. vide early awareness of new and emerging threats, threat agents, vulnerabilities, and
  543. attacks so that an effective and timely defense can be mounted.
  544. ■ The objective of the internal monitoring domain is an informed awareness of the state
  545. of the organization’s networks, information systems, and information security
  546. defenses. The security team documents and communicates this awareness, particularly
  547. when it concerns system components that face the external network.
  548. ■ The primary objective of the planning and risk assessment domain is to keep an eye on
  549. the entire information security program.
  550. ■ The primary objectives of the vulnerability assessment and remediation domain are to
  551. identify specific, documented vulnerabilities and remediate them in a timely fashion.
  552. ■ The primary objectives of the readiness and review domain are to keep the informa-
  553. tion security program functioning as designed and keep improving it over time.
  554. ■ Digital forensics is the investigation of wrongdoing in the arena of information secu-
  555. rity. Digital forensics requires the preservation, identification, extraction, documenta-
  556. tion, and interpretation of computer media for evidentiary and/or root-cause analysis.
  557. Review Questions
  558. 1. List and define the factors that are likely to shift in an organization’s information secu-
  559. rity environment.
  560. 2. Who decides if the information security program can adapt to change adequately?
  561. 3. List and briefly describe the five domains of the general security maintenance model, as
  562. identified in the text.
  563. 4. What are the three primary aspects of information security risk management? Why is
  564. each important?
  565. 5. What is a management maintenance model? What does it accomplish?
  566. 6. What changes need to be made to the model in SP 800-100 to adapt it for use in secu-
  567. rity management maintenance?
  568. 7. What ongoing responsibilities do security managers have in securing the SDLC?
  569. Review Questions 651
  570. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  571. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  572. 8. What is vulnerability assessment?
  573. 9. What is penetration testing?
  574. 10. What is the difference between configuration management and change management?
  575. 11. What is a performance baseline?
  576. 12. What is the difference between vulnerability assessment and penetration testing?
  577. 13. What is the objective of the external monitoring domain of the maintenance model?
  578. 14. List and describe four vulnerability intelligence sources. Which seems the most effec-
  579. tive? Why?
  580. 15. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT?
  581. 16. What is the primary objective of the internal monitoring domain?
  582. 17. What is the objective of the planning and risk assessment domain of the maintenance
  583. model? Why is this important?
  584. 18. What is the primary goal of the vulnerability assessment and remediation domain of
  585. the maintenance model? Is this important to an organization with an Internet pres-
  586. ence? Why?
  587. 19. List and describe the five vulnerability assessments described in the text. Can you think
  588. of other assessment processes that might exist?
  589. 20. What is digital forensics, and when is it used in a business setting?
  590. Exercises
  591. 1. Search the Web for the Forum of Incident Response and Security Teams (FIRST). In
  592. your own words, what is the forum’s mission?
  593. 2. Search the Web for two or more sites that discuss the ongoing responsibilities of the
  594. security manager. What other components of security management can be adapted for
  595. use in the security management model?
  596. 3. This chapter lists five tools that can be used by security administrators, network
  597. administrators, and attackers alike. Search the Web for three to five other tools that
  598. fit this description.
  599. 4. Using a Web browser and the names of the tools you found in Exercise 3, find a site
  600. that claims to be dedicated to supporting hackers. Do you find any references to other
  601. hacker tools? If you do, create a list of the tools along with a short description of what
  602. they do and how they work.
  603. 5. Using the components of risk assessment documentation presented in the chapter, draft
  604. a tentative risk assessment of a lab, department, or office at your university. Outline
  605. the critical risks you found and discuss them with your class.
  606. 652 Chapter 12
  607. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  608. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  609. 12
  610. Case Exercises
  611. Remember from the beginning of this book how Amy’s day started? Now imagine how it
  612. could have gone with better planning:
  613. For Amy, the day began like any other at the Sequential Label and Supply Company (SLS)
  614. help desk. Taking calls and helping office workers with computer problems was not glamor-
  615. ous, but she enjoyed the work; it was challenging and paid well enough. Some of her friends
  616. in the industry worked at bigger companies, some at cutting-edge tech companies, but they all
  617. agreed that technology jobs were a good way to pay the bills.
  618. The phone rang, as it did about four times an hour and 28 times a day. The first call of the
  619. day, from a user hoping Amy could help him out of a jam, seemed typical. The call display
  620. on her monitor showed some of the facts: the user’s name, his phone number and department,
  621. where his office was on the company campus, and a list of his past calls to the help desk.
  622. “Hi, Bob,” Amy said. “Did you get that document formatting problem squared away?”
  623. “Sure did, Amy. Hope we can figure out what’s going on this time.”
  624. “We’ll try, Bob. Tell me about it.”
  625. “Well, I need help setting a page break in this new spreadsheet template I’m working on,”
  626. Bob said.
  627. Amy smiled to herself. She knew spreadsheets well, so she would probably be able to close
  628. this call on the first contact. That would help her call statistics, which was one method of
  629. measuring her job performance.
  630. Little did Amy know that roughly four minutes before Bob’s phone call, a specially pro-
  631. grammed computer at the edge of the SLS network had made a programmed decision. This
  632. computer was generally known as postoffice.seqlbl.com, but it was called the “e-mail gate-
  633. way” by the networking, messaging, and information security teams at SLS. The decision
  634. was just like many thousands of other decisions it made in a typical day—that is, to block
  635. the transmission of a file that was attached to an e-mail addressed to
  636. Bob.Hulme@seqlbl.com. The gateway had determined that Bob didn’t need an executable pro-
  637. gram that had been attached to the e-mail message. The gateway had also determined that the
  638. message originated from somewhere on the Internet but contained a forged reply-to address
  639. from Davey Martinez at SLS. In other words, the gateway had delivered the e-mail to Bob
  640. Hulme, but not the attachment.
  641. When Bob got the e-mail, all he saw was another unsolicited commercial e-mail with an
  642. unwanted executable that had been blocked. He had deleted the nuisance message without a
  643. second thought. While she was talking to Bob, Amy looked up to see Charles Moody walking
  644. calmly down the hall. Charlie, as he liked to be called, was the senior manager of the server
  645. administration team and the company’s chief information security officer. Kelvin Urich and
  646. Iris Majwubu were trailing behind Charlie as he headed from his office to the door of the con-
  647. ference room. Amy thought, “It must be time for the weekly security status meeting.”
  648. She was the user representative on the company information security oversight committee, so
  649. she was due to attend this meeting. Amy continued talking Bob through the procedure for set-
  650. ting up a page break, and decided she would join the information security team for coffee and
  651. bagels as soon as she was finished.
  652. Case Exercises 653
  653. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  654. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  655. Discussion Questions
  656. 1. What area of the SP 800-100 management maintenance model addresses the actions of
  657. the content filter described here?
  658. 2. What recommendations would you give SLS for how it might select a security manage-
  659. ment maintenance model?
  660. Ethical Decision Making
  661. Referring back to the opening case of this chapter, suppose Charlie had just finished a search for
  662. a new job and knew that he would soon be leaving the company. When Iris came in to talk
  663. about the tedious and time-consuming review process, he put her off and asked her to schedule
  664. a meeting with him “in 2 or 3 weeks,” knowing full well that he would be gone by then.
  665. Do you think this kind of action is unethical because Charlie knows he is leaving soon?
  666. Endnotes
  667. 1. “Configuration Management.” Wikipedia. Accessed 14 April 2014 from en.wikipedia
  668. .org/wiki/Configuration_management.
  669. 2. Bowen, R., Hash, J., and Wilson, M. National Institute of Standards and Technology.
  670. Information Security Handbook: A Guide for Managers. SP 800-100. Accessed 16
  671. April 2014 from csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007
  672. .pdf.
  673. 3. Ibid.
  674. 4. Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J., and Gulick, J. National
  675. Institute of Standards and Technology. Security Considerations in the Information
  676. System Development Life Cycle. SP 800-64, Rev. 2. October 2008. Accessed 14 April
  677. 2014 from csrc.nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf.
  678. 5. Bowen, P., Kissel, R., Scholl, M., Robinson W., Stansfield, J., and Vildish, L. National
  679. Institute of Standards and Technology. Recommendations for Integrating IT Security
  680. into the Capital Planning and Investment Control Process (Draft). SP 800-65, Rev. 1
  681. (DRAFT). July 2009. Accessed 5 August 2014 from csrc.nist.gov/publications/drafts
  682. /800-65-rev1/draft-sp800-65rev1.pdf.
  683. 6. Grance, T., Hash, J., Peck, S., Smith, J., and Karow-Diks, K. National Institute of
  684. Standards and Technology. Security Guide for Interconnecting Information
  685. Technology Systems. SP 800-47. August 2002. Accessed 5 August 2014 from
  686. csrc.nist.gov/publications/nistpubs/800-47/sp800-47.pdf.
  687. 7. Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A., and Robinson, W. National
  688. Institute of Standards and Technology. Performance Measurement Guide for
  689. Information Security. SP 800-55, Rev. 1. July 2008. Accessed 14 April 2014 from
  690. csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf.
  691. 8. Bowen, R., Hash, J., and Wilson, M. National Institute of Standards and Technology.
  692. Information Security Handbook: A Guide for Managers. SP 800-100. Accessed 16 April
  693. 2014 from csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf.
  694. 654 Chapter 12
  695. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  696. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  697. 12
  698. 9. Grance, T., Hash, J., Stevens, M., O’Neal, K., and Bartol, N. National Institute of
  699. Standards and Technology. Guide to Information Technology Security Services. SP
  700. 800-35. October 2003. Accessed 14 April 2014 from csrc.nist.gov/publications/nist-
  701. pubs/800-35/NIST-SP800-35.pdf.
  702. 10. Grance, T., Stevens, M., and Myers, M. National Institute of Standards and
  703. Technology. Guide to Selecting Information Technology Security Products. SP 800-
  704. 36. October 2003. Accessed 14 April 2014 from csrc.nist.gov/publications/nistpubs
  705. /800-36/NIST-SP800-36.pdf.
  706. 11. Cuff, Jeanne. “Grow Up: How Mature Is Your Help Desk?” Compass America, Inc.
  707. Accessed 14 April 2014 from fsz.ifas.ufl.edu/HD/GrowUpWP.pdf.
  708. 12. Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J., and Gulick, J. National
  709. Institute of Standards and Technology. Security Considerations in the System Develop-
  710. ment Life Cycle. SP 800-64, Rev. 2. October 2008. Accessed 14 April 2014 from csrc
  711. .nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf.
  712. 13. Join Task Force Transformation Initiative. National Institute of Standards and
  713. Technology. Security and Privacy Controls for Federal Information Systems and Orga-
  714. nizations. SP 800-53, Rev. 4. April 2013. Accessed 14 April 2014 from nvlpubs.nist
  715. .gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf.
  716. 14. Readings and Cases in the Management of Information Security: Legal and Ethical
  717. Issues. 2010. Course Technology.
  718. 15. “Canon.” Accessed 14 April 2014 from dictionary.reference.com/browse/canon.
  719. 16. “Ethical.” Accessed 14 April 2014 from dictionary.reference.com/browse/ethical.
  720. 17. Multiple references, including www.edu-cyberpg.com/Technology/ethics.html. Accessed
  721. 14 April 2014.
  722. 18. “Hacking.” Accessed 14 April 2014 from dictionary.reference.com/search?q=hacking.
  723. 19. © 1986 Paramount Pictures.
  724. 20. © 1983 Metro-Goldwyn-Mayer Studios Inc./United Artists.
  725. 21. © 1995 Metro-Goldwyn-Mayer Studios Inc.
  726. 22. “Oxymoron.” Accessed 14 April 2014 from dictionary.reference.com/browse
  727. /oxymoron.
  728. 23. Levy, S. Hackers: Heroes of the Computer Revolution. 1984. Putnam, NY: Penguin.
  729. 24. “Authorization.” Accessed 14 April 2014 from dictionary.reference.com/browse
  730. /authorization.
  731. 25. “Hippocratic Oath.” Accessed 14 April 2014 from en.wikipedia.org/wiki/Hippocratic_
  732. Oath.
  733. 26. (ISC) 2 Code of Ethics. Accessed 14 April 2014 from www.isc2.org/ethics/default.aspx?
  734. terms=code%20of%20ethics.
  735. 27. “Professional.” Accessed 14 April 2014 from dictionary.reference.com/browse/professional.
  736. Endnotes 655
  737. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  738. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  739. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  740. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  741. Glossary
  742. 10.3 password rule An industry recommendation for pass-
  743. word structure and strength that specifies passwords should
  744. be at least 10 characters long and contain at least one
  745. uppercase letter, one lowercase letter, one number, and one
  746. special character.
  747. acceptance control strategy The risk control strategy that
  748. indicates an organization is willing to accept the current level
  749. of residual risk.
  750. access A subject or object’s ability to use, manipulate, mod-
  751. ify, or affect another subject or object.
  752. access control The selective method by which systems specify
  753. who may use a particular resource and how they may use it.
  754. access control list (ACL) A specification of an organization’s
  755. information asset, the users who may access and use it, and
  756. their rights and privileges for using the asset.
  757. access control matrix An integration of access control lists
  758. (focusing on assets) and capability tables (focusing on users)
  759. that results in a matrix with organizational assets listed in the
  760. column headings and users listed in the row headings. The
  761. matrix contains ACLs in columns for a particular device or
  762. asset and capability tables in rows for a particular user.
  763. accountability The access control mechanism that ensures all
  764. actions on a system—authorized or unauthorized—can be
  765. attributed to an authenticated identity. Also known as
  766. auditability.
  767. accreditation The process that authorizes an IT system to
  768. process, store, or transmit information.
  769. accuracy An attribute of information that describes how data
  770. is free of errors and has the value that the user expects.
  771. active vulnerability scanner An application that scans
  772. networks to identify exposed usernames and groups, open
  773. network shares, configuration problems, and other vulner-
  774. abilities in servers.
  775. address restrictions Firewall rules designed to prohibit
  776. packets with certain addresses or partial addresses from
  777. passing through the device.
  778. Advanced Encryption Standard (AES) The current federal
  779. standard for the encryption of data, as specified by NIST.
  780. AES is based on the Rijndael algorithm, which was developed
  781. by Vincent Rijmen and Joan Daemen.
  782. advance-fee fraud (AFF) A form of social engineering, typi-
  783. cally conducted via e-mail, in which an organization or some
  784. third party indicates that the recipient is due an exorbitant
  785. amount of money and needs only a small advance fee or
  786. personal banking information to facilitate the transfer.
  787. adverse event An event with negative consequences that
  788. could threaten the organization’s information assets or
  789. operations.
  790. adware Malware intended to provide undesired marketing
  791. and advertising, including popups and banners on a user’s
  792. screens.
  793. affidavit Sworn testimony that certain facts are in the pos-
  794. session of an investigating officer; an affidavit can be used to
  795. request a search warrant.
  796. after-action review A detailed examination and discussion
  797. of the events that occurred, from first detection to final
  798. recovery.
  799. aggregate information Collective data that relates to a
  800. group or category of people and that has been altered to
  801. remove characteristics or components that make it possible to
  802. identify individuals within the group. Not to be confused
  803. with information aggregation.
  804. air-aspirating detector A fire detection sensor used in high-
  805. sensitivity areas that works by taking in air, filtering it, and
  806. passing it through a chamber that contains a laser beam. The
  807. alarm triggers if the beam is broken.
  808. alarm clustering and compaction A process of grouping
  809. almost identical alarms that occur nearly at the same time
  810. into a single higher-level alarm.
  811. alarm filtering The process of classifying IDPS alerts so they
  812. can be more effectively managed.
  813. alert or alarm An indication that a system has just been
  814. attacked or is under attack. IDPS alerts and alarms take the
  815. form of audible signals, e-mail messages, pager notifications,
  816. or pop-up windows.
  817. alert message A scripted description of the incident that
  818. usually contains just enough information so that each person
  819. knows what portion of the IR plan to implement without
  820. slowing down the notification process.
  821. alert roster A document that contains contact information
  822. for people to be notified in the event of an incident.
  823. algorithm The steps used to convert an unencrypted message
  824. into an encrypted sequence of bits that represent the message;
  825. sometimes refers to the programs that enable the crypto-
  826. graphic processes.
  827. annualized cost of a safeguard (ACS) In a cost-benefit
  828. analysis, the total cost of a control or safeguard, including
  829. all purchase, maintenance, subscription, personnel, and
  830. support fees, divided by the total number of expected years
  831. of use.
  832. 657
  833. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  834. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  835. annualized loss expectancy (ALE) In a cost-benefit analysis,
  836. the product of the annualized rate of occurrence and single
  837. loss expectancy.
  838. annualized rate of occurrence (ARO) In a cost-benefit anal-
  839. ysis, the expected frequency of an attack, expressed on a per-
  840. year basis.
  841. anomaly-based detection Also known as behavior-based
  842. detection, an IDPS detection method that compares current
  843. data and traffic patterns to an established baseline of
  844. normalcy.
  845. application firewall See application layer firewall.
  846. application header (AH) protocol In IPSec, a protocol that
  847. provides system-to-system authentication and data integrity
  848. verification, but does not provide secrecy for the content of a
  849. network communication.
  850. application layer firewall A firewall type capable of per-
  851. forming filtering at the application layer of the OSI model,
  852. most commonly based on the type of service (for example,
  853. HTTP, SMTP, or FTP). Also known as an application fire-
  854. wall. See also proxy server.
  855. application protocol verification The process of examining
  856. and verifying the higher-order protocols (HTTP, FTP, and
  857. Telnet) in network traffic for unexpected packet behavior or
  858. improper use.
  859. asset The organizational resource that is being protected.
  860. asset exposure See loss magnitude.
  861. asset valuation The process of assigning financial value or
  862. worth to each information asset.
  863. asymmetric encryption An encryption method that incor-
  864. porates mathematical operations involving both a public key
  865. and a private key to encipher or decipher a message. Either
  866. key can be used to encrypt a message, but then the other key
  867. is required to decrypt it.
  868. asynchronous token An authentication component in the
  869. form of a token—a card or key fob that contains a computer
  870. chip and a liquid crystal display and shows a computer-
  871. generated number used to support remote login authentica-
  872. tion. This token does not require calibration of the central
  873. authentication server; instead, it uses a challenge/response
  874. system.
  875. attack An intentional or unintentional act against an asset
  876. that can damage or otherwise compromise information and
  877. the systems that support it.
  878. attack protocol A logical sequence of steps or processes used
  879. by an attacker to launch an attack against a target system or
  880. network.
  881. attack success probability The number of successful attacks
  882. that are expected to occur within a specified time period.
  883. attack surface The functions and features that a system
  884. exposes to unauthenticated users.
  885. attribute A characteristic of a subject (user or system) that
  886. can be used to restrict access to an object. Also known as a
  887. subject attribute.
  888. attribute-based access control (ABAC) An access control
  889. approach whereby the organization specifies the use of
  890. objects based on some attribute of the user or system.
  891. auditability See accountability.
  892. auditing The review of a system’s use to determine if misuse
  893. or malfeasance has occurred.
  894. authentication The access control mechanism that requires
  895. the validation and verification of a supplicant’s purported
  896. identity.
  897. authentication factors Three mechanisms that provide
  898. authentication based on something a supplicant knows,
  899. something a supplicant has, and something a supplicant is.
  900. authenticity An attribute of information that describes how
  901. data is genuine or original rather than reproduced or
  902. fabricated.
  903. authorization The access control mechanism that represents
  904. the matching of an authenticated entity to a list of informa-
  905. tion assets and corresponding access levels.
  906. availability An attribute of information that describes how
  907. data is accessible and correctly formatted for use without
  908. interference or obstruction.
  909. availability disruption An interruption in service, usually
  910. from a service provider, which causes an adverse event within
  911. an organization.
  912. avoidance of competitive disadvantage The adoption and
  913. implementation of a business model, method, technique,
  914. resource, or technology to prevent being outperformed by a
  915. competing organization; working to keep pace with the com-
  916. petition through innovation, rather than falling behind.
  917. back door A malware payload that provides access to a sys-
  918. tem by bypassing normal access controls. A back door is also
  919. an intentional access control bypass left by a system designer
  920. to facilitate development.
  921. back hack The process of illegally attempting to determine
  922. the source of an intrusion by tracing it and trying to gain
  923. access to the originating system.
  924. baseline A performance value or metric used to compare
  925. changes in the object being measured.
  926. baselining The comparison of past security activities and
  927. events against the organization’s current performance.
  928. bastion host A firewall implementation strategy in which the
  929. device is connected directly to the untrusted area of the
  930. 658 Glossary
  931. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  932. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  933. organization’s network rather than being placed in a screened
  934. area. Also known as a sacrificial host.
  935. behavioral feasibility See operational feasibility.
  936. behavior-based detection See anomaly-based detection.
  937. benchmarking The process of comparing other organiza-
  938. tions’ activities against the practices used in one’s own orga-
  939. nization to produce results it would like to duplicate.
  940. best business practices Security efforts that seek to
  941. provide a superior level of performance in the protection of
  942. information. Also known as best practices or recommended
  943. practices.
  944. biometric access control An access control approach based
  945. on the use of a measurable human characteristic or trait to
  946. authenticate the identity of a proposed systems user (a
  947. supplicant).
  948. biometric lock A lock that reads a unique biological attribute
  949. such as a fingerprint, iris, retina, or palm and then uses that
  950. input as a key.
  951. bit stream cipher An encryption method that involves con-
  952. verting plaintext to ciphertext one bit at a time.
  953. blackout A long-term interruption (outage) in electrical
  954. power availability.
  955. block cipher An encryption method that involves dividing
  956. the plaintext into blocks or sets of bits and then converting
  957. the plaintext to ciphertext one block at a time.
  958. boot virus Also known as a boot sector virus, a type of virus
  959. that targets the boot sector or Master Boot Record (MBR) of
  960. a computer system’s hard drive or removable storage media.
  961. bot An abbreviation of robot, an automated software pro-
  962. gram that executes certain commands when it receives a spe-
  963. cific input. See also zombie.
  964. bottom-up approach A method of establishing security poli-
  965. cies that begins as a grassroots effort in which systems
  966. administrators attempt to improve the security of their
  967. systems.
  968. brownout A long-term decrease in electrical power
  969. availability.
  970. brute force password attack An attempt to guess a pass-
  971. word by attempting every possible combination of characters
  972. and numbers in it.
  973. buffer overrun (or buffer overflow) An application error
  974. that occurs when more data is sent to a program buffer than
  975. it is designed to handle.
  976. build A snapshot of a particular version of software assem-
  977. bled or linked from its component modules.
  978. build list A list of the versions of components that make up a
  979. build.
  980. bull’s-eye model A method for prioritizing a program of
  981. complex change; it requires that issues be addressed from the
  982. general to the specific and focuses on systematic solutions
  983. instead of individual problems.
  984. business continuity plan (BC plan) The documented product
  985. of business continuity planning; a plan that shows the orga-
  986. nization’s intended efforts if a disaster renders the organiza-
  987. tion’s primary operating location unusable.
  988. business continuity planning (BCP) The actions taken by
  989. senior management to specify the organization’s efforts if a
  990. disaster renders the organization’s primary operating location
  991. unusable.
  992. business impact analysis (BIA) An investigation and assess-
  993. ment of the various adverse events that can affect the organi-
  994. zation, conducted as a preliminary phase of the contingency
  995. planning process, which includes a determination of how
  996. critical a system or set of information is to the organization’s
  997. core processes and recovery priorities.
  998. business resumption planning (BRP) In some organizations,
  999. the combined functions of DRP and BCP.
  1000. capability table A specification of an organization’s users,
  1001. the information assets that users may access, and their rights
  1002. and privileges for using the assets. Also known as user pro-
  1003. files or user policies.
  1004. centralized IDPS control strategy An IDPS implementation
  1005. approach in which all control functions are implemented and
  1006. managed in a central location.
  1007. certificate authority (CA) In PKI, a third party that manages
  1008. users’ digital certificates.
  1009. certificate revocation list (CRL) In PKI, a published list of
  1010. revoked or terminated digital certificates.
  1011. certification In information security, the comprehensive
  1012. evaluation of an IT system’s technical and nontechnical secu-
  1013. rity controls that establishes the extent to which a particular
  1014. design and implementation meets a set of predefined security
  1015. requirements, usually in support of an accreditation process.
  1016. chain of custody See chain of evidence.
  1017. chain of evidence The detailed documentation of the collec-
  1018. tion, storage, transfer, and ownership of evidence from the
  1019. crime scene through its presentation in court.
  1020. change control A method of regulating the modification of
  1021. systems within the organization by requiring formal review
  1022. and approval for each change.
  1023. chief information officer (CIO) An executive-level position
  1024. that oversees the organization’s computing technology and
  1025. strives to create efficiency in the processing and access of the
  1026. organization’s information.
  1027. chief information security officer (CISO) Typically consid-
  1028. ered the top information security officer in an organization.
  1029. Glossary 659
  1030. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1031. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1032. The CISO is usually not an executive-level position, and fre-
  1033. quently the person in this role reports to the CIO.
  1034. C.I.A. triangle The industry standard for computer
  1035. security since the development of the mainframe. The
  1036. standard is based on three characteristics that describe
  1037. the utility of information: confidentiality, integrity, and
  1038. availability.
  1039. cipher or cryptosystem An encryption method or process
  1040. encompassing the algorithm, key(s) or cryptovariable(s), and
  1041. procedures used to perform encryption and decryption.
  1042. ciphertext or cryptogram The encoded message resulting
  1043. from an encryption.
  1044. civil law A wide variety of laws that govern a nation or state
  1045. and deal with the relationships and conflicts between organi-
  1046. zations and people.
  1047. clean agent A fire suppression agent that does not leave any
  1048. residue after use or interfere with the operation of electrical
  1049. or electronic equipment.
  1050. clean desk policy An organizational policy that specifies
  1051. employees must inspect their work areas and ensure that all
  1052. classified information, documents, and materials are secured
  1053. at the end of every work day.
  1054. clipping level A predefined assessment level that triggers a
  1055. predetermined response when surpassed. Typically, the
  1056. response is to notify an administrator.
  1057. closed-circuit television (CCT) A video capture and record-
  1058. ing system used to monitor a facility.
  1059. code The process of converting components (words or
  1060. phrases) of an unencrypted message into encrypted
  1061. components.
  1062. cold site An exclusive-use contingency strategy in which an
  1063. organization leases a redundant facility without any systems,
  1064. services, or equipment, requiring substantial purchases and
  1065. effort to resume operations. Essentially, a cold site is an
  1066. empty set of offices or rooms.
  1067. command injection An application error that occurs when
  1068. user input is passed directly to a compiler or interpreter
  1069. without screening for content that may disrupt or compro-
  1070. mise the intended function.
  1071. communications security The protection of all communica-
  1072. tions media, technology, and content.
  1073. community of interest A group of people who are united by
  1074. similar interests or values within an organization and who
  1075. share a common goal of helping the organization to meet its
  1076. objectives.
  1077. competitive advantage The adoption and implementation
  1078. of an innovative business model, method, technique,
  1079. resource, or technology in order to outperform the
  1080. competition.
  1081. competitive intelligence The collection and analysis of
  1082. information about an organization’s business competitors
  1083. through legal and ethical means to gain business intelligence
  1084. and competitive advantage.
  1085. computer forensics The process of collecting, analyzing, and
  1086. preserving computer-related evidence.
  1087. computer security In the early days of computers, this term
  1088. specified the need to secure the physical location of computer
  1089. technology from outside threats. This term later came to rep-
  1090. resent all actions taken to preserve computer systems from
  1091. losses. It has evolved into the current concept of information
  1092. security as the scope of protecting information in an organi-
  1093. zation has expanded.
  1094. confidence value The measure of an IDPS’s ability to cor-
  1095. rectly detect and identify certain types of attacks.
  1096. confidentiality An attribute of information that describes
  1097. how data is protected from disclosure or exposure to unau-
  1098. thorized individuals or systems.
  1099. configuration A collection of components that make up a
  1100. configuration item.
  1101. configuration and change management (CCM) An
  1102. approach to implementing system change that uses policies,
  1103. procedures, techniques, and tools to manage and evaluate
  1104. proposed changes, track changes through completion, and
  1105. maintain systems inventory and supporting documentation.
  1106. configuration item A hardware or software item that will be
  1107. modified and revised throughout its life cycle.
  1108. configuration management (CM) See configuration and
  1109. change management (CCM).
  1110. configuration rules The instructions a system administrator
  1111. codes into a server, networking device, or security device to
  1112. specify how it operates.
  1113. contact and weight sensor An alarm sensor designed to
  1114. detect increased pressure or contact at a specific location,
  1115. such as a floor pad or a window.
  1116. content filter A network filter that allows administrators to
  1117. restrict access to external content from within a network.
  1118. Also known as a reverse firewall.
  1119. contingency plan The documented product of contingency
  1120. planning; a plan that shows the organization’s intended
  1121. efforts in reaction to adverse events.
  1122. contingency planning (CP) The actions taken by senior man-
  1123. agement to specify the organization’s efforts and actions if an
  1124. adverse event becomes an incident or disaster. This planning
  1125. includes incident response, disaster recovery, and business con-
  1126. tinuity efforts, as well as preparatory business impact analysis.
  1127. contingency planning management team (CPMT) The
  1128. group of senior managers and project members organized to
  1129. conduct and lead all CP efforts.
  1130. 660 Glossary
  1131. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1132. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1133. control, safeguard, or countermeasure A security mecha-
  1134. nism, policy, or procedure that can successfully counter
  1135. attacks, reduce risk, resolve vulnerabilities, and otherwise
  1136. improve security within an organization.
  1137. corporate governance Executive management’s responsibil-
  1138. ity to provide strategic direction, ensure the accomplishment
  1139. of objectives, oversee that risks are appropriately managed,
  1140. and validate responsible resource use.
  1141. cost avoidance The process of preventing the financial
  1142. impact of an incident by implementing a control.
  1143. cost-benefit analysis (CBA) Also known as an economic
  1144. feasibility study, the formal assessment and presentation of
  1145. the economic expenditures needed for a particular security
  1146. control, contrasted with its projected value to the
  1147. organization.
  1148. covert channel Unauthorized or unintended methods of
  1149. communications hidden inside a computer system.
  1150. cracker A hacker who intentionally removes or bypasses
  1151. software copyright protection designed to prevent unautho-
  1152. rized duplication or use.
  1153. cracking Attempting to reverse-engineer, remove, or bypass a
  1154. password or other access control protection, such as the
  1155. copyright protection on software. See cracker.
  1156. criminal law Law that addresses activities and conduct
  1157. harmful to society, and is actively enforced by the state. Law
  1158. can also be categorized as private or public.
  1159. crisis management The set of actions taken by an organiza-
  1160. tion in response to an emergency to minimize injury or loss of
  1161. life, preserve the organization’s image and market share, and
  1162. complement its disaster recovery and business continuity
  1163. processes.
  1164. crossover error rate (CER) In biometric access controls, the
  1165. level at which the number of false rejections equals the false
  1166. acceptances. Also known as the equal error rate.
  1167. cross-site scripting (XSS) A Web application fault that
  1168. occurs when an application running on a Web server inserts
  1169. commands into a user’s browser session and causes informa-
  1170. tion to be sent to a hostile server.
  1171. cryptanalysis The process of obtaining the plaintext message
  1172. from a ciphertext message without knowing the keys used to
  1173. perform the encryption.
  1174. cryptography The process of making and using codes to
  1175. secure the transmission of information.
  1176. cryptology The science of encryption, which encompasses
  1177. cryptography and cryptanalysis.
  1178. cultural mores The fixed moral attitudes or customs of a
  1179. particular group.
  1180. cyberactivist See hacktivist.
  1181. cyberterrorist A hacker who attacks systems to conduct ter-
  1182. rorist activities via networks or Internet pathways.
  1183. cyberwarfare Formally sanctioned offensive operations con-
  1184. ducted by a government or state against information or sys-
  1185. tems of another government or state.
  1186. data Items of fact collected by an organization. Data includes
  1187. raw numbers, facts, and words. Student quiz scores are a
  1188. simple example of data.
  1189. data classification scheme A formal access control method-
  1190. ology used to assign a level of confidentiality to an informa-
  1191. tion asset and thus restrict the number of people who can
  1192. access it.
  1193. data custodians People who are responsible for the storage,
  1194. maintenance, and protection of information.
  1195. data owners People who own the information and thus
  1196. determine the level of classification for their data and approve
  1197. its access authorization.
  1198. data security Commonly used as a surrogate for information
  1199. security, data security is the focus of protecting data or
  1200. information in its various states—at rest (in storage), in pro-
  1201. cessing, and in transmission (over networks).
  1202. data users People who work with the information to per-
  1203. form their daily jobs and support the mission of the
  1204. organization.
  1205. database security A subset of information security that
  1206. focuses on the assessment and protection of information
  1207. stored in data repositories like database management systems
  1208. and storage media.
  1209. database shadowing An improvement to the process of
  1210. remote journaling, in which databases are backed up in near-
  1211. real time to multiple servers at both local and remote sites.
  1212. de facto standard A standard that has been widely adopted
  1213. or accepted by a public group rather than a formal standards
  1214. organization. Contrast with a de jure standard.
  1215. de jure standard A standard that has been formally evalu-
  1216. ated, approved, and ratified by a formal standards organiza-
  1217. tion. Contrast with a de facto standard.
  1218. decipher To decrypt, decode, or convert ciphertext into the
  1219. equivalent plaintext.
  1220. decrypt See decipher.
  1221. defense control strategy The risk control strategy that
  1222. attempts to eliminate or reduce any remaining uncontrolled
  1223. risk through the application of additional controls and
  1224. safeguards.
  1225. defense in depth A strategy for the protection of informa-
  1226. tion assets that uses multiple layers and different types of
  1227. controls (managerial, operational, and technical) to provide
  1228. optimal protection.
  1229. Glossary 661
  1230. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1231. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1232. deliverable A completed document or program module that
  1233. can either serve as the beginning point for a later task or
  1234. become an element in the finished project.
  1235. delta conversion online UPS An uninterruptible power sup-
  1236. ply (UPS) that is similar to a double conversion online UPS
  1237. except that it incorporates a delta transformer, which assists
  1238. in powering the inverter while outside power is available.
  1239. deluge system A fire suppression sprinkler system that keeps
  1240. all individual sprinkler heads open and applies water to all
  1241. areas when activated.
  1242. demilitarized zone (DMZ) An intermediate area between two
  1243. networks designed to provide servers and firewall filtering
  1244. between a trusted internal network and the outside, untrusted
  1245. network. Traffic on the outside network carries a higher level
  1246. of risk.
  1247. denial-of-service (DoS) attack An attack that attempts to
  1248. overwhelm a computer target’s ability to handle incoming
  1249. communications, prohibiting legitimate users from accessing
  1250. those systems.
  1251. dictionary password attack A variation of the brute force
  1252. password attack that attempts to narrow the range of possi-
  1253. ble passwords guessed by using a list of common passwords
  1254. and possibly including attempts based on the target’s per-
  1255. sonal information.
  1256. difference analysis A procedure that compares the current
  1257. state of a network segment against a known previous state of
  1258. the same network segment (the baseline of systems and
  1259. services).
  1260. differential backup The archival of all files that have chan-
  1261. ged or been added since the last full backup.
  1262. Diffie-Hellman key exchange A hybrid cryptosystem that
  1263. facilitates exchanging private keys using public-key
  1264. encryption.
  1265. digital certificates Public-key container files that allow PKI
  1266. system components and end users to validate a public key
  1267. and identify its owner.
  1268. digital forensics The application of forensics techniques and
  1269. methodologies to the preservation, identification, extraction,
  1270. documentation, and interpretation of digital media for evi-
  1271. dentiary and/or root-cause analysis.
  1272. digital malfeasance A crime against or using digital media,
  1273. computer technology, or related components.
  1274. Digital Signature Standard (DSS) The NIST standard for
  1275. digital signature algorithm usage by federal information sys-
  1276. tems. DSS is based on a variant of the ElGamal signature
  1277. scheme.
  1278. digital signatures Encrypted message components that can
  1279. be mathematically proven as authentic.
  1280. direct changeover The conversion strategy that involves
  1281. stopping the old system and starting the new one without any
  1282. overlap.
  1283. disaster An adverse event that could threaten the viability of
  1284. the entire organization. A disaster may either escalate from an
  1285. incident or be initially classified as a disaster.
  1286. disaster recovery plan (DR plan) The documented product
  1287. of disaster recovery planning; a plan that shows the organi-
  1288. zation’s intended efforts in the event of a disaster.
  1289. disaster recovery planning (DRP) The actions taken by
  1290. senior management to specify the organization’s efforts in
  1291. preparation for and recovery from a disaster.
  1292. discretionary access controls (DACs) Controls that are
  1293. implemented at the discretion or option of the data user.
  1294. disk duplexing Disk mirroring in which each drive has its
  1295. own controller to provide additional redundancy.
  1296. disk mirroring A RAID implementation (typically referred to
  1297. as RAID Level 1) in which the computer records all data to
  1298. twin drives simultaneously, providing a backup if the primary
  1299. drive fails.
  1300. disk striping A RAID implementation (typically referred to
  1301. as RAID Level 0) in which one logical volume is created by
  1302. storing data across several available hard drives in segments
  1303. called stripes.
  1304. distributed denial-of-service (DDoS) attack A DoS attack in
  1305. which a coordinated stream of requests is launched against a
  1306. target from many locations at the same time using bots or
  1307. zombies.
  1308. Domain Name System (DNS) cache poisoning The inten-
  1309. tional hacking and modification of a DNS database to redi-
  1310. rect legitimate traffic to illegitimate Internet locations. Also
  1311. known as DNS spoofing.
  1312. double conversion online UPS A UPS in which the protected
  1313. device draws power from an output inverter. The inverter is
  1314. powered by the UPS battery, which is constantly recharged
  1315. from the outside power.
  1316. downtime The percentage of time a particular service is not
  1317. available; the opposite of uptime.
  1318. dry-pipe system A fire suppression sprinkler system that has
  1319. pressurized air in all pipes. The air is released in the event of a
  1320. fire, allowing water to flow from a central area.
  1321. due care The legal standard that requires a prudent organi-
  1322. zation and its employees to act legally and ethically and know
  1323. the consequences of their actions. Also referred to as the
  1324. standard of due care.
  1325. due diligence Considered a subset of the standard of due
  1326. care, the legal standard that requires a prudent organization
  1327. and its employees to maintain the standard of due care and
  1328. 662 Glossary
  1329. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1330. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1331. ensure that their actions are effective. Also referred to as the
  1332. standard of due diligence.
  1333. dumb card An authentication card that contains digital user
  1334. data, such as a personal identification number (PIN), against
  1335. which user input is compared.
  1336. dumpster diving An information attack that involves
  1337. searching through a target organization’s trash and recycling
  1338. bins for sensitive information.
  1339. dynamic filtering A firewall type that can react to an adverse
  1340. event and update or create its configuration rules to deal with
  1341. that event.
  1342. electromagnetic radiation (EMR) The transmission of radi-
  1343. ant energy through space, commonly referred to as radio
  1344. waves.
  1345. electromechanical lock A lock that can accept a variety of
  1346. inputs as keys, including magnetic strips on ID cards, radio
  1347. signals from name badges, personal identification numbers
  1348. (PINs) typed into a keypad, or some combination of these to
  1349. activate an electrically powered locking mechanism.
  1350. electronic vaulting The transfer of large batches of data to
  1351. an off-site facility, typically during off-peak hours.
  1352. electrostatic discharge (ESD) The release of ambient static
  1353. electricity into a ground.
  1354. encapsulating security payload (ESP) protocol In IPSec, a
  1355. protocol that provides secrecy for the contents of network
  1356. communications as well as system-to-system authentication
  1357. and data integrity verification.
  1358. encipher To encrypt, encode, or convert plaintext into the
  1359. equivalent ciphertext.
  1360. encrypt See encipher.
  1361. enterprise information security policy (EISP) The high-level
  1362. security policy that is based on and directly supports the
  1363. mission, vision, and direction of the organization and sets the
  1364. strategic direction, scope, and tone for all security efforts.
  1365. enticement The act of attracting attention to a system by
  1366. placing tantalizing information in key locations.
  1367. entrapment The act of luring a person into committing a
  1368. crime in order to get a conviction.
  1369. ethics Codes or principles of an individual or group that
  1370. regulate and define acceptable behavior.
  1371. evasion The process by which attackers change the format and/
  1372. or timing of their activities to avoid being detected by an IDPS.
  1373. event Any occurrence within the organization’s operational
  1374. environment.
  1375. evidence A physical object or documented information that
  1376. proves an action occurred or identifies the intent of a
  1377. perpetrator.
  1378. evidentiary material (EM) Any item or information that
  1379. applies to an organization’s legal or policy-based case; also
  1380. known as an item of potential evidentiary value.
  1381. exclusive OR operation (XOR) A function within Boolean
  1382. algebra used as an encryption function in which two bits are
  1383. compared. If the two bits are identical, the result is a binary
  1384. 0; otherwise, the result is a binary 1.
  1385. exit interview A meeting with an employee who is leaving
  1386. the organization to remind the employee of contractual obli-
  1387. gations, such as nondisclosure agreements, and to obtain
  1388. feedback about the employee’s tenure.
  1389. expert hacker A hacker who uses extensive knowledge of the
  1390. inner workings of computer hardware and software to gain
  1391. unauthorized access to systems and information. Also known
  1392. as elite hackers, expert hackers often create automated
  1393. exploits, scripts, and tools used by other hackers.
  1394. exploit A technique used to compromise a system; a vulner-
  1395. ability that can be used to cause a loss to an asset.
  1396. exposure A condition or state of being exposed; in informa-
  1397. tion security, exposure exists when a vulnerability is known
  1398. to an attacker.
  1399. exposure factor (EF) In a cost-benefit analysis, the expected
  1400. percentage of loss that would occur from a particular attack.
  1401. external monitoring domain The component of the mainte-
  1402. nance model that focuses on evaluating external threats to the
  1403. organization’s information assets.
  1404. extranet A segment of the DMZ where additional authenti-
  1405. cation and authorization controls are put into place to pro-
  1406. vide services that are not available to the general public.
  1407. facilities management The aspect of organizational man-
  1408. agement focused on the development and maintenance of its
  1409. buildings and physical infrastructure.
  1410. fail-safe lock An electromechanical device that automatically
  1411. releases the lock protecting a control point if a power outage
  1412. occurs. This type of lock is used for fire safety locations.
  1413. fail-secure lock An electromechanical device that stays
  1414. locked and maintains the security of the control point if a
  1415. power outage occurs.
  1416. false accept rate In biometric access controls, the percentage
  1417. of identification instances in which unauthorized users are
  1418. allowed access. Also known as a Type II error.
  1419. false attack stimulus An event that triggers an alarm when
  1420. no actual attack is in progress. Scenarios that test the config-
  1421. uration of IDPSs may use false attack stimuli to determine if
  1422. the IDPSs can distinguish between these stimuli and real
  1423. attacks.
  1424. false negative The failure of an IDPS to react to an actual
  1425. attack event. This is the most grievous IDPS failure, given
  1426. that its purpose is to detect and respond to attacks.
  1427. Glossary 663
  1428. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1429. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1430. false positive An alert or alarm that occurs in the absence of
  1431. an actual attack. A false positive can sometimes be produced
  1432. when an IDPS mistakes normal system activity for an attack.
  1433. False positives tend to make users insensitive to alarms and
  1434. thus reduce their reactions to actual intrusion events.
  1435. false reject rate In biometric access controls, the percentage
  1436. of identification instances in which authorized users are
  1437. denied access. Also known as a Type I error.
  1438. fault A short-term interruption in electrical power
  1439. availability.
  1440. fingerprinting The systematic survey of a targeted organiza-
  1441. tion’s Internet addresses collected during the footprinting
  1442. phase to identify the network services offered by the hosts in
  1443. that range.
  1444. fire suppression systems Devices that are installed and
  1445. maintained to detect and respond to a fire, potential fire, or
  1446. combustion danger.
  1447. firewall In information security, a combination of hardware
  1448. and software that filters or prevents specific information from
  1449. moving between the outside network and the inside network.
  1450. Each organization defines its own firewall.
  1451. fixed-temperature sensor A fire detection sensor that works
  1452. by detecting the point at which the ambient temperature in an
  1453. area reaches a predetermined level.
  1454. flame detector A fire detection system that works by detect-
  1455. ing the infrared or ultraviolet light produced by an open
  1456. flame.
  1457. footprinting The organized research of Internet addresses
  1458. owned or controlled by a target organization.
  1459. forensics The coherent application of methodical investiga-
  1460. tory techniques to present evidence of crimes in a court or
  1461. similar setting.
  1462. full backup A complete backup of the entire system, includ-
  1463. ing all applications, operating systems components, and data.
  1464. fully distributed IDPS control strategy An IDPS implemen-
  1465. tation approach in which all control functions are applied at
  1466. the physical location of each IDPS component.
  1467. gap analysis The process of comparing measured results
  1468. against expected results, then using the resulting “gap” as a
  1469. measure of project success and as feedback for project
  1470. management.
  1471. gaseous (or chemical gas) emission systems Fire suppres-
  1472. sion systems that operate through the delivery of gases rather
  1473. than water.
  1474. goals Sometimes used synonymously with objectives; the
  1475. desired end of a planning cycle.
  1476. governance The set of responsibilities and practices exercised
  1477. by the board and executive management with the goal of
  1478. providing strategic direction, ensuring that objectives are
  1479. achieved, ascertaining that risks are managed appropriately
  1480. and verifying that the enterprise’s resources are used
  1481. responsibly.
  1482. ground fault circuit interruption A special circuit device
  1483. designed to immediately disconnect a power supply when a
  1484. sudden discharge (ground fault) is detected.
  1485. guidelines Within the context of information security, a set
  1486. of recommended actions to assist an organizational stake-
  1487. holder in complying with policy.
  1488. hacker A person who accesses systems and information
  1489. without authorization and often illegally.
  1490. hacktivist A hacker who seeks to interfere with or disrupt
  1491. systems to protest the operations, policies, or actions of an
  1492. organization or government agency.
  1493. hash algorithms Public functions that create a hash value,
  1494. also known as a message digest, by converting variable-length
  1495. messages into a single fixed-length value.
  1496. hash functions Mathematical algorithms that generate a
  1497. message summary or digest (sometimes called a fingerprint)
  1498. to confirm message identity and integrity.
  1499. hash value See message digest.
  1500. hierarchical roster An alert roster in which the first person
  1501. calls a few other people on the roster, who in turn call others.
  1502. This method typically uses the organizational chart as a
  1503. structure.
  1504. honeynet A collection of honeypot systems on a subnet.
  1505. honeypots Decoy systems designed to lure potential attack-
  1506. ers away from critical systems. Also known as decoys, lures,
  1507. and flytraps.
  1508. host-based IDPS (HIDPS) An IDPS that resides on a particu-
  1509. lar computer or server, known as the host, and monitors
  1510. activity only on that system. Also known as a system integrity
  1511. verifier.
  1512. hot site An exclusive-use contingency strategy in which an
  1513. organization leases a redundant facility complete with all
  1514. systems, services, and equipment needed to resume operations
  1515. with minimal delay.
  1516. hot swap A hard drive feature that allows individual drives
  1517. to be replaced without fault and without powering down the
  1518. entire system.
  1519. humidity The amount of moisture in the air.
  1520. hybrid VPN A combination of trusted and secure VPN
  1521. implementations.
  1522. identification The access control mechanism whereby unver-
  1523. ified entities or supplicants who seek access to a resource pro-
  1524. vide a label by which they are known to the system.
  1525. 664 Glossary
  1526. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1527. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1528. identification (ID) card A document used to verify the iden-
  1529. tity of a member of an organization, group, or domain.
  1530. identity theft The unauthorized taking of personally identi-
  1531. fiable information with the intent of committing fraud and
  1532. abuse of a person’s financial and personal reputation, pur-
  1533. chasing goods and services without authorization, and gen-
  1534. erally impersonating the victim for illegal or unethical
  1535. purposes.
  1536. incident An adverse event that could result in loss of an
  1537. information asset or assets, but does not currently threaten
  1538. the viability of the entire organization.
  1539. incident candidate An adverse event that has strong poten-
  1540. tial to meet the criteria to become an incident.
  1541. incident classification The process of examining an incident
  1542. candidate and determining whether it constitutes an actual
  1543. incident.
  1544. incident damage assessment The rapid determination of
  1545. how seriously a breach of confidentiality, integrity, and
  1546. availability affected information and information assets dur-
  1547. ing an incident or just following one.
  1548. incident response plan (IR plan) The documented product
  1549. of incident response planning; a plan that shows the organi-
  1550. zation’s intended efforts in the event of an incident.
  1551. incident response planning (IRP) The actions taken by
  1552. senior management to specify the organization’s processes
  1553. and procedures to anticipate, detect, and mitigate the effects
  1554. of an incident.
  1555. incremental backup A backup that archives only the files
  1556. that have been modified since the previous incremental
  1557. backup.
  1558. industrial espionage The collection and analysis of infor-
  1559. mation about an organization’s business competitors, often
  1560. through illegal or unethical means, to gain an unfair compet-
  1561. itive advantage. Also known as corporate spying, which is
  1562. distinguished from espionage for national security reasons.
  1563. information Data that has been organized, structured, and
  1564. presented to provide additional insight into its context,
  1565. worth, and usefulness. For example, a student’s class average
  1566. can be presented in the context of its value, as in “90 ¼ A.”
  1567. information aggregation Pieces of nonprivate data that,
  1568. when combined, may create information that violates pri-
  1569. vacy. Not to be confused with aggregate information.
  1570. information asset The focus of information security; infor-
  1571. mation that has value to the organization, and the systems
  1572. that store, process, and transmit the information.
  1573. information assurance The affirmation or guarantee of the
  1574. confidentiality, integrity, and availability of information in
  1575. storage, processing, and transmission. This term is often used
  1576. synonymously with information security.
  1577. information extortion The act of an attacker or trusted
  1578. insider who steals information from a computer system and
  1579. demands compensation for its return or for an agreement not
  1580. to disclose the information. Also known as cyberextortion.
  1581. information security Protection of the confidentiality, integ-
  1582. rity, and availability of information assets, whether in stor-
  1583. age, processing, or transmission, via the application of policy,
  1584. education, training and awareness, and technology.
  1585. information security blueprint The basis for all security
  1586. program elements; a scalable, upgradeable, comprehensive
  1587. plan to meet the organization’s current and future informa-
  1588. tion security needs.
  1589. information security framework An outline or structure of
  1590. the organization’s overall information security strategy that is
  1591. used as a road map for planned changes to its information
  1592. security environment; often developed as an adaptation or
  1593. adoption of a popular methodology, like NIST’s security
  1594. approach or the ISO 27000 series.
  1595. information security governance The application of the
  1596. principles of corporate governance to the information secu-
  1597. rity function.
  1598. information security model An established information
  1599. security framework, often popular among other organizations
  1600. and backed by a recognized security agency, with exemplar
  1601. details an organization may want to emulate in creating its
  1602. own framework and blueprint.
  1603. information security policy A set of rules that protects an
  1604. organization’s information assets.
  1605. information system (IS) The entire set of software, hard-
  1606. ware, data, people, procedures, and networks that enable the
  1607. use of information resources in the organization.
  1608. inline sensor An IDPS sensor intended for network perimeter
  1609. use and deployed in close proximity to a perimeter firewall to
  1610. detect incoming attacks that could overwhelm the firewall.
  1611. integer bug A class of computational error caused by meth-
  1612. ods that computers use to store and manipulate integer num-
  1613. bers; this bug can be exploited by attackers.
  1614. integrity An attribute of information that describes how data
  1615. is whole, complete, and uncorrupted.
  1616. intellectual property (IP) The creation, ownership, and con-
  1617. trol of original ideas as well as the representation of those
  1618. ideas.
  1619. internal monitoring domain The component of the mainte-
  1620. nance model that focuses on identifying, assessing, and man-
  1621. aging the configuration and status of information assets in an
  1622. organization.
  1623. Internet Protocol Security (IPSec) An open-source protocol
  1624. framework for security development within the TCP/IP family
  1625. of protocol standards.
  1626. Glossary 665
  1627. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1628. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1629. Internet vulnerability assessment An assessment approach
  1630. designed to find and document vulnerabilities that may be
  1631. present in the organization’s public network.
  1632. intranet vulnerability assessment An assessment approach
  1633. designed to find and document selected vulnerabilities that are
  1634. likely to be present on the organization’s internal network.
  1635. intrusion An adverse event in which an attacker attempts to
  1636. gain entry into an information system or disrupt its normal
  1637. operations, almost always with the intent to do harm.
  1638. intrusion detection and prevention system (IDPS) The
  1639. general term for both intrusion detection systems and intru-
  1640. sion prevention systems.
  1641. intrusion detection system (IDS) A system capable of auto-
  1642. matically detecting an intrusion into an organization’s net-
  1643. works or host systems and notifying a designated authority.
  1644. intrusion prevention system (IPS) An IDS system capable of
  1645. automatically responding to a detected intrusion and pre-
  1646. venting it from successfully attacking the organization by
  1647. means of an active response.
  1648. ionization sensor A fire detection sensor that works by
  1649. exposing the ambient air to a small amount of a harmless
  1650. radioactive material within a detection chamber; an alarm is
  1651. triggered when the level of electrical conductivity changes
  1652. within the chamber.
  1653. issue-specific security policy (ISSP) Commonly referred to
  1654. as a fair and responsible use policy; a policy designed to
  1655. control constituents’ use of a particular resource, asset, or
  1656. activity, and provided to support the organization’s goals and
  1657. objectives.
  1658. jailbreaking Escalating privileges to gain administrator-level
  1659. control over a smartphone operating system (typically asso-
  1660. ciated with Apple iOS smartphones). See also rooting.
  1661. job rotation The requirement that every employee be able to
  1662. perform the work of another employee. Also known as task
  1663. rotation.
  1664. jurisdiction A court’s right to hear a case if a wrong is com-
  1665. mitted in its territory or involves its citizenry.
  1666. Kerberos A remote authentication system that uses symmetric
  1667. key encryption-based tickets managed in a central database to
  1668. validate an individual user to various network resources.
  1669. key or cryptovariable The information used in conjunction
  1670. with an algorithm to create the ciphertext from the plaintext
  1671. or derive the plaintext from the ciphertext. The key can be a
  1672. series of bits used by a computer program, or it can be a
  1673. passphrase used by people that is then converted into a series
  1674. of bits used by a computer program.
  1675. keyspace The entire range of values that can be used to con-
  1676. struct an individual key.
  1677. knowledge-based detection See signature-based detection.
  1678. known vulnerability A published weakness or fault in an
  1679. information asset or its protective systems that may be
  1680. exploited and result in loss.
  1681. lattice-based access control (LBAC) An access control
  1682. approach that uses a matrix or lattice of subjects (users and
  1683. systems needing access) and objects (resources) to assign pri-
  1684. vileges. LBAC is an example of an NDAC.
  1685. laws Rules that mandate or prohibit certain behavior and are
  1686. enforced by the state.
  1687. least privilege The process of ensuring that no unnecessary
  1688. access to data exists; employees are able to perform only the
  1689. minimum operations necessary on a set of data.
  1690. liability The legal obligation of an entity that extends beyond
  1691. criminal or contract law.
  1692. likelihood The probability that a specific vulnerability within
  1693. an organization will be the target of an attack.
  1694. line-interactive UPS A UPS in which a pair of inverters and
  1695. converters draw power from the outside source both to
  1696. charge the battery and provide power to the internal pro-
  1697. tected device.
  1698. link encryption A series of encryptions and decryptions
  1699. between a number of systems, wherein each system in a net-
  1700. work decrypts the message sent to it and then reencrypts the
  1701. message using different keys and sends it to the next neigh-
  1702. bor. This process continues until the message reaches the final
  1703. destination.
  1704. log file monitor (LFM) An attack detection method that
  1705. reviews the log files generated by computer systems, looking
  1706. for patterns and signatures that may indicate an attack or
  1707. intrusion is in process or has already occurred.
  1708. long-arm jurisdiction The application of laws to people cur-
  1709. rently residing outside a court’s normal jurisdiction, usually
  1710. granted when a person performs an illegal action within the
  1711. court’s jurisdiction and then leaves.
  1712. loss A single instance of an information asset suffering dam-
  1713. age or destruction, unintended or unauthorized modification
  1714. or disclosure, or denial of use.
  1715. loss frequency The calculation of the likelihood of an attack
  1716. coupled with the attack frequency to determine the expected
  1717. number of losses within a specified time range.
  1718. loss magnitude Also known as event loss magnitude, the
  1719. combination of an asset’s value and the percentage of it that
  1720. might be lost in an attack.
  1721. MAC layer firewall A firewall designed to operate at the
  1722. media access control sublayer of the network’s data link layer
  1723. (Layer 2).
  1724. macro virus A type of virus written in a specific macro
  1725. language to target applications that use the language. The
  1726. virus is activated when the application’s product is opened.
  1727. 666 Glossary
  1728. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1729. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1730. A macro virus typically affects documents, slideshows,
  1731. e-mails, or spreadsheets created by office suite applications.
  1732. mail bomb An attack designed to overwhelm the receiver
  1733. with excessive quantities of e-mail.
  1734. maintenance hook See back door.
  1735. major release A significant revision of a version from its
  1736. previous state.
  1737. malicious code See malware.
  1738. malicious software See malware.
  1739. malware Computer software specifically designed to perform
  1740. malicious or unwanted actions.
  1741. managerial controls Information security safeguards that
  1742. focus on administrative planning, organizing, leading, and
  1743. controlling, and that are designed by strategic planners and
  1744. implemented by the organization’s security administration.
  1745. These safeguards include governance and risk management.
  1746. managerial guidance SysSP A systems-specific security pol-
  1747. icy that expresses management’s intent for the acquisition,
  1748. implementation, configuration, and management of a partic-
  1749. ular technology, written from a business perspective.
  1750. mandatory access control (MAC) An access control
  1751. approach whereby the organization specifies use of resources
  1752. based on the assignment of data classification schemes to
  1753. resources and clearance levels to users. MAC is an example of
  1754. an LBAC approach.
  1755. man-in-the-middle A group of attacks whereby a person
  1756. intercepts a communications stream and inserts himself in
  1757. the conversation to convince each of the legitimate parties
  1758. that he is the other communications partner. Some man-
  1759. in-the-middle attacks involve encryption functions.
  1760. mantrap A small room or enclosure with separate entry and
  1761. exit points, designed to restrain a person who fails an access
  1762. authorization attempt.
  1763. maximum tolerable downtime (MTD) The total amount of
  1764. time the system owner or authorizing official is willing to
  1765. accept for a mission/business process outage or disruption,
  1766. including all impact considerations.
  1767. McCumber Cube A graphical representation of the architec-
  1768. tural approach widely used in computer and information
  1769. security; commonly shown as a cube composed of 3 ? 3 ? 3
  1770. cells, similar to a Rubik’s Cube.
  1771. mean time between failure (MTBF) The average amount of
  1772. time between hardware failures, calculated as the total
  1773. amount of operation time for a specified number of units
  1774. divided by the total number of failures.
  1775. mean time to diagnose (MTTD) The average amount of time
  1776. a computer repair technician needs to determine the cause of
  1777. a failure.
  1778. mean time to failure (MTTF) The average amount of time
  1779. until the next hardware failure.
  1780. mean time to repair (MTTR) The average amount of time a
  1781. computer repair technician needs to resolve the cause of a
  1782. failure through replacement or repair of a faulty unit.
  1783. mechanical lock A physical lock that may rely on either a
  1784. key or numerical combination to rotate tumblers and release
  1785. the hasp. Also known as a manual lock.
  1786. memory-resident virus A virus that is capable of installing
  1787. itself in a computer’s operating system, starting when the
  1788. computer is activated, and residing in the system’s memory
  1789. even after the host application is terminated. Also known as a
  1790. resident virus.
  1791. message authentication code (MAC) A key-dependent, one-
  1792. way hash function that allows only specific recipients (sym-
  1793. metric key holders) to access the message digest.
  1794. message digest A value representing the application of a
  1795. hash algorithm on a message that is transmitted with the
  1796. message so it can be compared with the recipient’s locally
  1797. calculated hash of the same message. If both hashes are
  1798. identical after transmission, the message has arrived without
  1799. modification. Also known as a hash value.
  1800. methodology A formal approach to solving a problem based
  1801. on a structured sequence of procedures.
  1802. metrics-based measures Performance measures or metrics
  1803. based on observed numerical data.
  1804. milestone A specific point in the project plan when a task
  1805. that has a noticeable impact on the plan’s progress is
  1806. complete.
  1807. minor release (update or patch) A minor revision of a ver-
  1808. sion from its previous state.
  1809. minutiae In biometric access controls, unique points of ref-
  1810. erence that are digitized and stored in an encrypted format
  1811. when the user’s system access credentials are created.
  1812. misuse detection See signature-based detection.
  1813. mitigation control strategy The risk control strategy that
  1814. attempts to reduce the impact of a successful attack through
  1815. planning and preparation.
  1816. modem vulnerability assessment An assessment approach
  1817. designed to find and document any vulnerability on dial-up
  1818. modems connected to the organization’s networks.
  1819. monitoring port Also known as a switched port analysis
  1820. (SPAN) port or mirror port, a specially configured connection
  1821. on a network device that can view all the traffic that moves
  1822. through the device.
  1823. monoalphabetic substitution A substitution cipher
  1824. that only incorporates a single alphabet in the encryption
  1825. process.
  1826. Glossary 667
  1827. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1828. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1829. motion detector An alarm sensor designed to detect move-
  1830. ment within a defined space.
  1831. mutual agreement A contractual relationship between two
  1832. or more organizations that specifies how each will assist the
  1833. other in the event of a disaster; unaffected organizations are
  1834. required to provide any needed resources to maintain the
  1835. organization affected by the disaster.
  1836. name badge An identification card typically worn in a visi-
  1837. ble location to quickly verify an authorized member.
  1838. need to know The requirement that an employee only has
  1839. access to information necessary for performing his or her
  1840. own work.
  1841. Network Address Translation (NAT) A method of mapping
  1842. valid external IP addresses to special ranges of nonroutable
  1843. internal IP addresses, known as private addresses, on a one-
  1844. to-one basis.
  1845. network-based IDPS (NIDPS) An IDPS that resides on a
  1846. computer or appliance connected to a segment of an organi-
  1847. zation’s network and monitors traffic on that segment, look-
  1848. ing for indications of ongoing or successful attacks.
  1849. network security A subset of communications security; the
  1850. protection of voice and data networking components, con-
  1851. nections, and content.
  1852. noise The presence of additional and disruptive signals in
  1853. network communications or electrical power delivery. For an
  1854. IDPS, unsuccessful attacks and other alarm events that are
  1855. accurate and noteworthy but do not pose significant threats
  1856. to information security.
  1857. nondiscretionary access controls (NDACs) A strictly
  1858. enforced version of MACs that are managed by a central
  1859. authority in the organization and can be based on an indi-
  1860. vidual user’s role or a specified set of tasks.
  1861. non-memory-resident virus A virus that terminates after it
  1862. has been activated, infected its host system, and replicated
  1863. itself. NMR viruses do not reside in an operating system or
  1864. memory after executing. Also known as a non-resident virus.
  1865. nonrepudiation The process of reversing public-key encryp-
  1866. tion to verify that a message was sent by the sender and thus
  1867. cannot be refuted.
  1868. novice hacker A relatively unskilled hacker who uses the
  1869. work of expert hackers to perform attacks. Also known as a
  1870. neophyte, n00b, or newbie. This category of hackers includes
  1871. script kiddies and packet monkeys.
  1872. objectives Sometimes used synonymously with goals; the
  1873. intermediate states obtained to achieve progress toward a
  1874. goal or goals.
  1875. operational controls Information security safeguards focus-
  1876. ing on lower-level planning that deals with the functionality
  1877. of the organization’s security. These safeguards include
  1878. disaster recovery and incident response planning.
  1879. operational feasibility An assessment of user acceptance
  1880. and support, management acceptance and support, and the
  1881. overall requirements of the organization’s stakeholders.
  1882. operational plan The documented product of operational
  1883. planning; a plan for the organization’s intended operational
  1884. efforts on a day-to-day basis for the next several months.
  1885. operational planning The actions taken by management to
  1886. specify the short-term goals and objectives of the organization
  1887. in order to obtain specified tactical goals, followed by esti-
  1888. mates and schedules for the allocation of resources necessary
  1889. to achieve those goals and objectives.
  1890. organizational feasibility An assessment of how well the
  1891. proposed information security alternatives will contribute to
  1892. the efficiency, effectiveness, and overall operation of an
  1893. organization.
  1894. packet-filtering firewall Also referred to as a filtering fire-
  1895. wall, a networking device that examines the header informa-
  1896. tion of data packets that come into a network and determines
  1897. whether to drop them (deny) or forward them to the next
  1898. network connection (allow), based on its configuration rules.
  1899. packet monkey A script kiddie who uses automated exploits
  1900. to engage in denial-of-service attacks.
  1901. packet sniffer A software program or hardware appliance
  1902. that can intercept, copy, and interpret network traffic. Also
  1903. known as a network protocol analyzer.
  1904. padded cell system A protected honeypot that cannot be
  1905. easily compromised.
  1906. parallel operations The conversion strategy that involves
  1907. running the new system concurrently with the old system.
  1908. partially distributed IDPS control strategy An IDPS imple-
  1909. mentation approach that combines the best aspects of the
  1910. centralized and fully distributed strategies.
  1911. passive mode An IDPS sensor setting in which the device
  1912. simply monitors and analyzes observed network traffic.
  1913. passive vulnerability scanner A scanner that listens in on a
  1914. network and identifies vulnerable versions of both server and
  1915. client software.
  1916. passphrase An authentication component that consists of an
  1917. expression known only to the user, from which a virtual
  1918. password is derived. See also virtual password.
  1919. password An authentication component that consists of a
  1920. private word or combination of characters that only the user
  1921. should know.
  1922. pen register An application that records information about
  1923. outbound communications.
  1924. 668 Glossary
  1925. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  1926. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  1927. penetration tester An information security professional with
  1928. authorization to attempt to gain system access in an effort to
  1929. identify and recommend resolutions for vulnerabilities in
  1930. those systems.
  1931. penetration testing A set of security tests and evaluations
  1932. that simulate attacks by a hacker or other malicious external
  1933. source.
  1934. performance gap The difference between an organization’s
  1935. observed and desired performance.
  1936. permutation cipher See transposition cipher.
  1937. personally identifiable information (PII) Information about
  1938. a person’s history, background, and attributes that can be used
  1939. to commit identity theft. This information typically includes a
  1940. person’s name, address, Social Security number, family infor-
  1941. mation, employment history, and financial information.
  1942. pharming The redirection of legitimate user Web traffic to
  1943. illegitimate Web sites with the intent to collect personal
  1944. information.
  1945. phased implementation The conversion strategy that
  1946. involves a measured rollout of the planned system; only part
  1947. of the system is brought out and disseminated across an
  1948. organization before the next piece is implemented.
  1949. phishing A form of social engineering in which the attacker
  1950. provides what appears to be a legitimate communication
  1951. (usually e-mail), but it contains hidden or embedded code
  1952. that redirects the reply to a third-party site in an effort to
  1953. extract personal or confidential information.
  1954. photoelectric sensor A fire detection sensor that works by
  1955. projecting an infrared beam across an area. If the beam is
  1956. interrupted, presumably by smoke, the alarm or suppression
  1957. system is activated.
  1958. phreaker A hacker who manipulates the public telephone
  1959. system to make free calls or disrupt services.
  1960. physical security The protection of physical items, objects,
  1961. or areas from unauthorized access and misuse.
  1962. pilot implementation The conversion strategy that involves
  1963. implementing the entire system into a single office, depart-
  1964. ment, or division, and dealing with issues that arise before
  1965. expanding to the rest of the organization.
  1966. plaintext or cleartext The original unencrypted message, or
  1967. a message that has been successfully decrypted.
  1968. planning and risk assessment domain The component of
  1969. the maintenance model that focuses on identifying and plan-
  1970. ning ongoing information security activities and identifying
  1971. and managing risks introduced through IT information secu-
  1972. rity projects.
  1973. platform security validation (PSV) An assessment approach
  1974. designed to find and document vulnerabilities that may be
  1975. present because misconfigured systems are used within the
  1976. organization.
  1977. plenum A space between the ceiling in one level of a com-
  1978. mercial building and the floor of the level above. The plenum
  1979. is used for air return.
  1980. policy A set of principles or courses of action from an orga-
  1981. nization’s senior management intended to guide decisions,
  1982. actions, and duties of constituents.
  1983. policy administrator An employee responsible for the crea-
  1984. tion, revision, distribution, and storage of a policy in an
  1985. organization.
  1986. political feasibility An assessment of which controls can and
  1987. cannot occur based on the consensus and relationships
  1988. among communities of interest.
  1989. polyalphabetic substitution A substitution cipher that
  1990. incorporates two or more alphabets in the encryption
  1991. process.
  1992. polymorphic threat Malware (a virus or worm) that over
  1993. time changes the way it appears to antivirus software pro-
  1994. grams, making it undetectable by techniques that look for
  1995. preconfigured signatures.
  1996. Port Address Translation (PAT) A method of mapping a sin-
  1997. gle valid external IP address to special ranges of nonroutable
  1998. internal IP addresses, known as private addresses, on a one-
  1999. to-many basis, using port addresses to facilitate the mapping.
  2000. port scanners Tools used both by attackers and defenders to
  2001. identify or fingerprint active computers on a network, the
  2002. active ports and services on those computers, the functions
  2003. and roles of the machines, and other useful information. Port
  2004. scanners are also known as port scanning utilities.
  2005. possession An attribute of information that describes how
  2006. the data’s ownership or control is legitimate or authorized.
  2007. practices Within the context of information security, exem-
  2008. plary actions that an organization identifies as ideal and seeks
  2009. to emulate. These actions are typically employed by other
  2010. organizations.
  2011. pre-action system A fire suppression sprinkler system that
  2012. employs a two-phase response to a fire. When a fire is
  2013. detected anywhere in the facility, the system will first flood all
  2014. pipes, then activate only the sprinkler heads in the area of the
  2015. fire.
  2016. predecessors Tasks or action steps that come before the
  2017. specific task at hand.
  2018. pretexting A form of social engineering in which the
  2019. attacker pretends to be an authority figure who needs infor-
  2020. mation to confirm the target’s identity, but the real object is
  2021. to trick the target into revealing confidential information.
  2022. Pretexting is commonly performed by telephone.
  2023. Glossary 669
  2024. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2025. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2026. privacy In the context of information security, the right of
  2027. individuals or groups to protect themselves and their infor-
  2028. mation from unauthorized access, providing confidentiality.
  2029. Privacy-Enhanced Mail (PEM) A standard proposed by the
  2030. Internet Engineering Task Force (IETF) that uses 3DES sym-
  2031. metric key encryption and RSA for key exchanges and digital
  2032. signatures.
  2033. private-key encryption or symmetric encryption An
  2034. encryption method that incorporates mathematical opera-
  2035. tions involving the same secret key both to encipher and
  2036. decipher the message.
  2037. private law Law that encompasses family law, commercial
  2038. law, and labor law, and regulates the relationship between
  2039. individuals and organizations.
  2040. privilege escalation The unauthorized modification of an
  2041. authorized or unauthorized system user account to gain
  2042. advanced access and control over system resources.
  2043. procedures Within the context of information security, a set
  2044. of steps an organization’s stakeholders must follow to per-
  2045. form a specified action or accomplish a defined task.
  2046. process-based measures Performance measures or metrics
  2047. based on intangible activities.
  2048. professional hacker A hacker who conducts attacks for per-
  2049. sonal financial benefit or for a crime organization or foreign
  2050. government. Not to be confused with a penetration tester.
  2051. project plan The documented instructions for participants
  2052. and stakeholders of a project that provide details on goals,
  2053. objectives, tasks, scheduling, and resource management.
  2054. project scope A description of a project’s features, capabili-
  2055. ties, functions, and quality level, used as the basis of a project
  2056. plan.
  2057. project team A small functional team of people who are expe-
  2058. rienced in one or multiple facets of the required technical and
  2059. nontechnical areas for the project to which they are assigned.
  2060. project wrap-up A process of bringing a project to a conclu-
  2061. sion, addressing any pending issues and the overall project
  2062. effort, and identifying ways to improve the process in the
  2063. future.
  2064. projectitis A situation in project planning in which the proj-
  2065. ect manager spends more time documenting project tasks,
  2066. collecting performance measurements, recording project task
  2067. information, and updating project completion forecasts in the
  2068. project management software than accomplishing meaningful
  2069. project work.
  2070. protection profile or security posture The entire set of
  2071. controls and safeguards, including policy, education, training
  2072. and awareness, and technology, that the organization imple-
  2073. ments to protect the asset.
  2074. protocol stack verification The process of examining and
  2075. verifying network traffic for invalid data packets—that is,
  2076. packets that are malformed under the rules of the TCP/IP
  2077. protocol.
  2078. proximity reader An electronic signal receiver used with an
  2079. electromechanical lock that allows users to place their cards
  2080. within the reader’s range and release the locking mechanism.
  2081. proxy server A server or firewall device capable of serving as
  2082. an intermediary by retrieving information from one network
  2083. segment and providing it to a requesting user on another.
  2084. public-key encryption See asymmetric encryption.
  2085. public key infrastructure (PKI) An integrated system of soft-
  2086. ware, encryption methodologies, protocols, legal agreements,
  2087. and third-party services that enables users to communicate
  2088. securely through the use of digital certificates.
  2089. public law Law that regulates the structure and administra-
  2090. tion of government agencies and their relationships with citi-
  2091. zens, employees, and other governments. Public law includes
  2092. criminal, administrative, and constitutional law.
  2093. qualitative assessment An asset valuation approach that
  2094. uses categorical or non-numeric values rather than absolute
  2095. numerical measures.
  2096. quantitative assessment An asset valuation approach that
  2097. attempts to assign absolute numerical measures.
  2098. rainbow table A table of hash values and their correspond-
  2099. ing plaintext values that can be used to look up password
  2100. values if an attacker is able to steal a system’s encrypted
  2101. password file.
  2102. rate-of-rise sensor A fire detection sensor that works by
  2103. detecting an unusually rapid increase in the area temperature
  2104. within a relatively short period of time.
  2105. recovery point objective (RPO) The point in time prior to a
  2106. disruption or system outage to which mission/business pro-
  2107. cess data can be recovered after an outage (given the most
  2108. recent backup copy of the data).
  2109. recovery time objective (RTO) The maximum amount of
  2110. time that a system resource can remain unavailable before
  2111. there is an unacceptable impact on other system resources,
  2112. supported mission/business processes, and the MTD.
  2113. redundancy Multiple types of technology that prevent the
  2114. failure of one system from compromising the security of
  2115. information.
  2116. redundant array of independent disks (RAID) A system of
  2117. drives that stores information across multiple units to spread
  2118. out data and minimize the impact of a single drive failure.
  2119. reference monitor The piece of the system that mediates all
  2120. access to objects by subjects.
  2121. 670 Glossary
  2122. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2123. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2124. registration authority (RA) In PKI, a third party that oper-
  2125. ates under the trusted collaboration of the certificate author-
  2126. ity and handles day-to-day certification functions.
  2127. remediation The processes of removing or repairing flaws in
  2128. information assets that cause a vulnerability or removing the
  2129. risk associated with the vulnerability.
  2130. Remote Authentication Dial-In User Service (RADIUS)
  2131. A computer connection system that centralizes the manage-
  2132. ment of user authentication by placing the responsibility for
  2133. authenticating each user on a central authentication server.
  2134. remote journaling The transfer of live transactions rather
  2135. than archived data to an off-site facility in near-real time.
  2136. request for proposal (RFP) A document specifying the
  2137. requirements of a project, provided to solicit bids from inter-
  2138. nal or external contractors.
  2139. residual risk The amount of risk that remains to an infor-
  2140. mation asset even after the organization has applied its
  2141. desired level of controls.
  2142. resources Components required for the completion of a
  2143. project, which could include skills, personnel, time, money,
  2144. and material.
  2145. restitution The legal obligation to compensate an injured
  2146. party for wrongs committed.
  2147. reverse firewall See content filter.
  2148. reverse proxy A proxy server that most commonly retrieves
  2149. information from inside an organization and provides it to a
  2150. requesting user or system outside the organization.
  2151. revision date The date associated with a particular version
  2152. or build.
  2153. risk The probability of an unwanted occurrence, such as an
  2154. adverse event or loss.
  2155. risk appetite The amount of risk an organization is willing
  2156. to accept.
  2157. risk assessment A determination of the extent to which an
  2158. organization’s information assets are exposed to risk.
  2159. risk control The application of controls that reduce the risks
  2160. to an organization’s information assets to an acceptable level.
  2161. risk identification The enumeration and documentation of
  2162. risks to an organization’s information assets.
  2163. risk management The process of identifying risk, assessing
  2164. its relative magnitude, and taking steps to reduce it to an
  2165. acceptable level.
  2166. role-based access control (RBAC) An example of a nondis-
  2167. cretionary control where privileges are tied to the role a user
  2168. performs in an organization, and are inherited when a user is
  2169. assigned to that role. Roles are considered more persistent
  2170. than tasks. RBAC is an example of an LDAC.
  2171. rooting Escalating privileges to gain administrator-level
  2172. control over a computer system (including smartphones).
  2173. Typically associated with Android OS smartphones. See
  2174. also jailbreaking.
  2175. sacrificial host See bastion host.
  2176. sag A short-term decrease in electrical power availability.
  2177. screened host firewall A single firewall or system designed
  2178. to be externally accessible and protected by placement behind
  2179. a filtering firewall.
  2180. screened subnet An entire network segment that protects
  2181. externally accessible systems by placing them in a demilitar-
  2182. ized zone behind a filtering firewall and protects the internal
  2183. networks by limiting how external connections can gain
  2184. access to them.
  2185. script kiddie A hacker of limited skill who uses expertly
  2186. written software to attack a system. Also known as skids,
  2187. skiddies, or script bunnies.
  2188. search warrant A document issued by an authorized author-
  2189. ity that allows law enforcement agents to search for EM at a
  2190. specified location and seize specific items for official
  2191. examination.
  2192. secret key A key that can be used in symmetric encryption
  2193. both to encipher and decipher the message.
  2194. Secure Electronic Transactions (SET) A protocol developed
  2195. by credit card companies to protect against electronic pay-
  2196. ment fraud.
  2197. secure facility A physical location that has controls in place
  2198. to minimize the risk of attacks from physical threats.
  2199. Secure Hash Standard (SHS) A standard issued by the
  2200. National Institute of Standards and Technology (NIST)
  2201. that specifies secure algorithms, such as SHA-1, for
  2202. computing a condensed representation of a message or
  2203. data file.
  2204. Secure HTTP (S-HTTP) An extended version of Hypertext
  2205. Transfer Protocol that provides for the encryption of pro-
  2206. tected Web pages transmitted via the Internet between a client
  2207. and server.
  2208. Secure Multipurpose Internet Mail Extensions (S/MIME)
  2209. A security protocol that builds on the encoding format
  2210. of the Multipurpose Internet Mail Extensions (MIME)
  2211. protocol and uses digital signatures based on public-key
  2212. cryptosystems to secure e-mail.
  2213. Secure Sockets Layer (SSL) A security protocol developed by
  2214. Netscape to use public-key encryption to secure a channel
  2215. over the Internet.
  2216. secure VPN A VPN implementation that uses security proto-
  2217. cols to encrypt traffic transmitted across unsecured public
  2218. networks.
  2219. Glossary 671
  2220. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2221. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2222. security A state of being secure and free from danger or
  2223. harm. Also, the actions taken to make someone or something
  2224. secure.
  2225. security clearance A component of a data classification
  2226. scheme that assigns a status level to employees to designate
  2227. the maximum level of classified data they may access.
  2228. security domain An area of trust within which information
  2229. assets share the same level of protection. Each trusted net-
  2230. work within an organization is a security domain. Commu-
  2231. nication between security domains requires evaluation of
  2232. communications traffic.
  2233. security education, training, and awareness (SETA) A
  2234. managerial program designed to improve the security of
  2235. information assets by providing targeted knowledge, skills,
  2236. and guidance for organizations.
  2237. security perimeter The boundary between an organization’s
  2238. security efforts and the outside world or untrusted network
  2239. areas.
  2240. security systems development life cycle (SecSDLC) A
  2241. methodology for the design and implementation of security
  2242. systems based on the systems development life cycle. The two
  2243. life cycles contain the same general phases.
  2244. separation of duties The principle that the completion of a
  2245. significant task involving sensitive information requires at
  2246. least two people.
  2247. sequential roster An alert roster in which a single contact
  2248. person calls each person on the roster.
  2249. server fault tolerance A level of redundancy provided by
  2250. mirroring entire servers called redundant servers.
  2251. service bureau An agency that provides physical facilities in
  2252. a disaster for a fee.
  2253. service level agreement (SLA) A document or part of a
  2254. document that specifies the expected level of service from a
  2255. service provider. An SLA usually contains provisions for
  2256. minimum acceptable availability and penalties or remediation
  2257. procedures for downtime.
  2258. session hijacking See TCP hijacking.
  2259. session keys Limited-use symmetric keys for temporary
  2260. communications during an online session.
  2261. shoulder surfing The direct, covert observation of individual
  2262. information or system use.
  2263. signals intelligence The collection, analysis, and distribution
  2264. of information from foreign communications networks for
  2265. intelligence and counterintelligence purposes and in support
  2266. of military operations. In recent years, the debate around the
  2267. collection and use of signals intelligence has grappled with the
  2268. integration of domestic intelligence gathering.
  2269. signature-based detection Also known as knowledge-based
  2270. detection or misuse detection, the examination of system or
  2271. network data in search of patterns that match known attack
  2272. signatures.
  2273. signatures Patterns that correspond to a known attack.
  2274. single loss expectancy (SLE) In a cost-benefit analysis, the
  2275. calculated value associated with the most likely loss from an
  2276. attack. The SLE is the product of the asset’s value and the
  2277. exposure factor.
  2278. site policy The rules and configuration guidelines governing
  2279. the implementation and operation of IDPSs within the
  2280. organization.
  2281. site policy awareness An IDPS’s ability to dynamically
  2282. modify its configuration in response to environmental activ-
  2283. ity. A so-called dynamic IDPS can adapt its reactions in
  2284. response to administrator guidance over time and the local
  2285. environment.
  2286. smart card An authentication component similar to a dumb
  2287. card that contains a computer chip to verify and validate
  2288. several pieces of information instead of just a PIN.
  2289. smoke detection system A category of fire detection systems
  2290. that focuses on detecting the smoke from a fire.
  2291. sniffer See packet sniffer.
  2292. social engineering The process of using social skills to con-
  2293. vince people to reveal access credentials or other valuable
  2294. information to an attacker.
  2295. software assurance (SA) A methodological approach to the
  2296. development of software that seeks to build security into the
  2297. development life cycle rather than address it at later stages.
  2298. SA attempts to intentionally create software free of vulner-
  2299. abilities and provide effective, efficient software that users
  2300. can deploy with confidence.
  2301. software library A collection of configuration items that is
  2302. usually controlled and that developers use to construct revi-
  2303. sions and issue new configuration items.
  2304. software piracy The unauthorized duplication, installation,
  2305. or distribution of copyrighted computer software, which is a
  2306. violation of intellectual property.
  2307. spam Undesired e-mail, typically commercial advertising
  2308. transmitted in bulk.
  2309. spear phishing Any highly targeted phishing attack.
  2310. spike A short-term increase in electrical power availability,
  2311. also known as a swell.
  2312. spoofing A technique for gaining unauthorized access to
  2313. computers using a forged or modified source IP address to
  2314. give the perception that messages are coming from a trusted
  2315. host.
  2316. 672 Glossary
  2317. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2318. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2319. sprinkler system A fire suppression system designed to apply
  2320. a liquid, usually water, to all areas in which a fire has been
  2321. detected.
  2322. spyware Any technology that aids in gathering information
  2323. about people or organizations without their knowledge.
  2324. standard The normal, targeted, or desired level to which a
  2325. behavior or action must be performed.
  2326. standby (or offline) UPS An offline battery backup that
  2327. detects the interruption of power to equipment and activates
  2328. a transfer switch that provides power from batteries through
  2329. a DC to AC converter until normal power is restored or the
  2330. computer is shut down.
  2331. standby ferroresonant UPS A UPS in which the outside power
  2332. source directly feeds the internal protected device. The UPS
  2333. serves as a battery backup, incorporating a ferroresonant trans-
  2334. former instead of a converter switch, providing line filtering and
  2335. reducing the effect of some power problems, and reducing noise
  2336. that may be present in the power as it is delivered.
  2337. state table A tabular database of the state and context of
  2338. each packet in a conversation between an internal and exter-
  2339. nal user or system. A state table is used to expedite firewall
  2340. filtering.
  2341. stateful packet inspection (SPI) A firewall type that keeps
  2342. track of each network connection between internal and
  2343. external systems using a state table and that expedites the
  2344. filtering of those communications. Also known as a stateful
  2345. inspection firewall.
  2346. stateful protocol analysis (SPA) The comparison of vendor-
  2347. supplied profiles of protocol use and behavior against
  2348. observed data and network patterns in an effort to detect
  2349. misuse and attacks.
  2350. static electricity An imbalance of electrical charges in the
  2351. atmosphere or on the surface of a material, caused by
  2352. triboelectrification.
  2353. static filtering A firewall type that requires the configuration
  2354. rules to be manually created, sequenced, and modified within
  2355. the firewall.
  2356. steganography A data hiding method that involves embed-
  2357. ding messages and information within other files, such as
  2358. digital pictures or other images.
  2359. storage channel A covert channel that communicates by
  2360. modifying a stored object.
  2361. strategic plan The documented product of strategic plan-
  2362. ning; a plan for the organization’s intended strategic efforts
  2363. over the next several years.
  2364. strategic planning The actions taken by senior management
  2365. to specify the long-term goals and objectives of the organiza-
  2366. tion, to plan its future direction, actions, and efforts, and to
  2367. estimate and schedule the allocation of resources necessary to
  2368. achieve those goals and objectives.
  2369. strong authentication In access control, the use of at least
  2370. two different authentication mechanisms drawn from two
  2371. different factors of authentication.
  2372. subject attribute See attribute.
  2373. subjects and objects A computer can be either the subject of
  2374. an attack—an agent entity used to conduct the attack—or the
  2375. object of an attack.
  2376. substitution cipher An encryption method in which one
  2377. value is substituted for another.
  2378. successors Tasks or action steps that come after the specific
  2379. task at hand.
  2380. sunset clause A component of policy or law that defines an
  2381. expected end date for its applicability.
  2382. surge A long-term increase in electrical power availability.
  2383. synchronous token An authentication component in the
  2384. form of a token—a card or key fob that contains a computer
  2385. chip and a liquid crystal display and shows a computer-
  2386. generated number used to support remote login authentica-
  2387. tion. This token must be calibrated with the corresponding
  2388. software on the central authentication server.
  2389. systems development life cycle (SDLC) A methodology for
  2390. the design and implementation of an information system. The
  2391. SDLC contains different phases depending on the methodol-
  2392. ogy deployed, but generally the phases address the investiga-
  2393. tion, analysis, design, implementation, and maintenance of an
  2394. information system.
  2395. systems-specific security policies (SysSPs) Policy
  2396. documents designed to bridge the gap between managerial
  2397. guidance and technical implementation of a specific
  2398. technology.
  2399. tactical plan The documented product of tactical planning; a
  2400. plan for the organization’s intended tactical efforts over the
  2401. next few years.
  2402. tactical planning The actions taken by management to spec-
  2403. ify the intermediate goals and objectives of the organization
  2404. in order to obtain specified strategic goals, followed by esti-
  2405. mates and schedules for the allocation of resources necessary
  2406. to achieve those goals and objectives.
  2407. tailgating The process of gaining unauthorized entry into a
  2408. facility by closely following another person through an
  2409. entrance and using the credentials of the authorized person to
  2410. bypass a control point.
  2411. task-based access control (TBAC) An example of a nondis-
  2412. cretionary control where privileges are tied to a task a user
  2413. performs in an organization and are inherited when a user is
  2414. assigned to that task. Tasks are considered more temporary
  2415. than roles. TBAC is an example of an LDAC.
  2416. task rotation See job rotation.
  2417. Glossary 673
  2418. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2419. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2420. TCP hijacking A form of man-in-the-middle attack whereby
  2421. the attacker inserts himself into TCP/IP-based communica-
  2422. tions. TCP/IP is short for Transmission Control Protocol/
  2423. Internet Protocol.
  2424. technical controls Information security safeguards that
  2425. focus on the application of modern technologies, systems,
  2426. and processes to protect information assets. These
  2427. safeguards include firewalls, virtual private networks,
  2428. and IDPSs.
  2429. technical feasibility An assessment of whether the organiza-
  2430. tion can acquire the technology necessary to implement and
  2431. support the proposed control.
  2432. technical specifications SysSP A systems-specific security
  2433. policy that expresses technical details for the acquisition,
  2434. implementation, configuration, and management of a partic-
  2435. ular technology, written from a technical perspective.
  2436. Typically the policy includes details on configuration rules,
  2437. systems policies, and access control.
  2438. technology governance A process organizations use to
  2439. manage the effects and costs of technology implementation,
  2440. innovation, and obsolescence.
  2441. telecommuting A work arrangement in which employees
  2442. work from an off-site location and connect to an organiza-
  2443. tion’s equipment electronically. Also known as telework.
  2444. telework See telecommuting.
  2445. TEMPEST A U.S. government program designed to protect
  2446. computers from electronic remote eavesdropping by reducing
  2447. EMR emissions.
  2448. termination control strategy The risk control strategy that
  2449. eliminates all risk associated with an information asset by
  2450. removing it from service.
  2451. theft The illegal taking of another’s property, which can be
  2452. physical, electronic, or intellectual.
  2453. thermal detection system A category of fire detection sys-
  2454. tems that focuses on detecting the heat from a fire.
  2455. thermal detector An alarm sensor designed to detect a
  2456. defined rate of change in the ambient temperature within a
  2457. defined space.
  2458. threat A potential risk of an asset’s loss of value.
  2459. threat agent A person or other entity that may cause a loss
  2460. in an asset’s value.
  2461. threat assessment An evaluation of the threats to informa-
  2462. tion assets, including a determination of their potential to
  2463. endanger the organization.
  2464. threats-vulnerabilities-assets (TVA) triples A pairing of an
  2465. asset with a threat and an identification of vulnerabilities that
  2466. exist between the two. This pairing is often expressed in
  2467. the format T x V y A z , where there may be one or more
  2468. vulnerabilities between Threat X and Asset Z. For example,
  2469. T1V1A2 would represent Threat 1 to Vulnerability 1 on
  2470. Asset 2.
  2471. threats-vulnerabilities-assets (TVA) worksheet A document
  2472. that shows a comparative ranking of prioritized assets against
  2473. prioritized threats, with an indication of any vulnerabilities in
  2474. the asset/threat pairings.
  2475. time-share The business continuity strategy that allows an
  2476. organization to co-lease a hot, warm, or cold site in conjunc-
  2477. tion with one or more business partners or other
  2478. organizations.
  2479. timing channel A covert channel that transmits information
  2480. by managing the relative timing of events.
  2481. top-down approach A methodology of establishing security
  2482. policies that is initiated by upper management.
  2483. transfer control strategy The risk control strategy that
  2484. attempts to shift residual risk to other assets, other processes,
  2485. or other organizations.
  2486. transport mode An IPSec mode in which only the IP data is
  2487. encrypted, not the IP headers.
  2488. transposition cipher Also known as a permutation cipher,
  2489. an encryption method that involves simply rearranging the
  2490. values within a block based on an established pattern to cre-
  2491. ate the ciphertext.
  2492. trap-and-trace An application that uses a combination of
  2493. techniques to detect an inbound communication and then
  2494. trace it back to its source. The trap usually consists of a
  2495. honeypot or padded cell and an alarm.
  2496. trap door See back door.
  2497. trespass Unauthorized entry into the real or virtual property
  2498. of another party.
  2499. triboelectrification The exchange of electrons between two
  2500. materials when they make contact, resulting in one object
  2501. becoming more positively charged and the other more nega-
  2502. tively charged.
  2503. Trojan horse A malware program that hides its true nature
  2504. and reveals its designed behavior only when activated.
  2505. true attack stimulus An event that triggers an alarm and
  2506. causes an IDPS to react as if a real attack is in progress. The
  2507. event may be an actual attack, in which an attacker is
  2508. attempting a system compromise, or it may be a drill, in
  2509. which security personnel are using hacker tools to test a net-
  2510. work segment.
  2511. trusted computing base (TCB) According to the TCSEC, the
  2512. combination of all hardware, firmware, and software
  2513. responsible for enforcing the security policy.
  2514. 674 Glossary
  2515. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2516. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2517. trusted network The system of networks inside the organi-
  2518. zation that contains its information assets and is under the
  2519. organization’s control.
  2520. trusted VPN Also known as a legacy VPN, a VPN imple-
  2521. mentation that uses leased circuits from a service provider
  2522. who gives contractual assurance that no one else is allowed to
  2523. use these circuits and that they are properly maintained and
  2524. protected.
  2525. tuning The process of adjusting an IDPS to maximize its
  2526. efficiency in detecting true positives while minimizing false
  2527. positives and false negatives.
  2528. tunnel mode An IPSec mode in which the entire IP packet is
  2529. encrypted and then placed into the content portion of another
  2530. IP packet.
  2531. two-person control The requirement that two employees
  2532. review and approve each other’s work before the task is cat-
  2533. egorized as finished.
  2534. Unified Threat Management (UTM) A security approach that
  2535. seeks a comprehensive solution for identifying and respond-
  2536. ing to network-based threats from a variety of sources. UTM
  2537. brings together firewall and IDPS technology with antimal-
  2538. ware, load balancing, content filtering, and data loss preven-
  2539. tion. UTM integrates these tools with management, control,
  2540. and reporting functions.
  2541. untrusted network The system of networks outside the
  2542. organization over which the organization has no control. The
  2543. Internet is an example of an untrusted network.
  2544. uptime The percentage of time a particular service is avail-
  2545. able; the opposite of downtime.
  2546. utility An attribute of information that describes how data
  2547. has value or usefulness for an end purpose.
  2548. Vernam cipher An encryption process that generates a ran-
  2549. dom substitution matrix between letters and numbers that is
  2550. used only one time. Also called a one-time pad.
  2551. version The recorded state of a particular revision of a soft-
  2552. ware or hardware configuration item. The version number is
  2553. often noted in a specific format, such as “M.N.b.” In this
  2554. notation, “M” is the major release number and “N.b” can rep-
  2555. resent various minor releases or builds within the major release.
  2556. vibration sensor An alarm sensor designed to detect move-
  2557. ment of the sensor rather than movement in the environment.
  2558. Vigenère cipher An advanced type of substitution cipher that
  2559. uses a simple polyalphabetic code.
  2560. virtual organization A group of people brought together for
  2561. a specific task, usually from different organizations, divisions,
  2562. or departments.
  2563. virtual password A password composed of a seemingly
  2564. meaningless series of characters derived from a passphrase.
  2565. virtual private network (VPN) A private and secure network
  2566. connection between systems that uses the data communica-
  2567. tion capability of an unsecured and public network.
  2568. virus A type of malware that is attached to other executable
  2569. programs. When activated, it replicates and propagates itself
  2570. to multiple systems, spreading by multiple communications
  2571. vectors. For example, a virus might send copies of itself to all
  2572. users in the infected system’s e-mail program.
  2573. virus hoax A message that reports the presence of a nonex-
  2574. istent virus or worm and wastes valuable time as employees
  2575. share the message.
  2576. vulnerability A potential weakness or fault in an asset or its
  2577. defensive control system(s) that opens it to attack or damage.
  2578. vulnerability assessment (VA) The process of identifying
  2579. and documenting specific and provable flaws in the organi-
  2580. zation’s information asset environment.
  2581. vulnerability assessment and remediation domain The
  2582. component of the maintenance model focused on identifying
  2583. specific, documented vulnerabilities and remediating them in
  2584. a timely fashion.
  2585. war dialer An automatic phone-dialing program that dials every
  2586. number in a configured range to determine if one of the numbers
  2587. belongs to a computer connection such as a dial-up line.
  2588. war dialing The use of scripted dialing attacks against a pool
  2589. of phone numbers in an effort to identify modem
  2590. connections.
  2591. war game A type of rehearsal that seeks to realistically sim-
  2592. ulate the circumstances needed to thoroughly test a plan.
  2593. warm site An exclusive-use contingency strategy in which an
  2594. organization leases a redundant facility complete with some
  2595. systems, services, and equipment needed to resume operations
  2596. with a reasonable delay.
  2597. water mist sprinkler A fire suppression sprinkler system that
  2598. relies on ultra-fine mists to reduce the ambient temperature
  2599. below that needed to sustain a flame.
  2600. waterfall model A type of SDLC in which each phase of the
  2601. process “flows from” the information gained in the previous
  2602. phase, with multiple opportunities to return to previous
  2603. phases and make adjustments.
  2604. wet-pipe system A fire suppression sprinkler system that
  2605. contains pressurized water in all pipes and has some form of
  2606. valve in each protected area.
  2607. wireless vulnerability assessment An assessment approach
  2608. designed to find and document vulnerabilities that may be
  2609. present in the organization’s wireless local area networks.
  2610. work breakdown structure (WBS) A list of the tasks to be
  2611. accomplished in the project, the skill sets or individual
  2612. employees needed to perform the tasks, the start and end
  2613. Glossary 675
  2614. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2615. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2616. dates for tasks, the estimated resources required, and the
  2617. dependencies among tasks.
  2618. work factor The amount of effort (usually in hours) required
  2619. to perform cryptanalysis to decode an encrypted message
  2620. when the key, the algorithm, or both are unknown.
  2621. work recovery time (WRT) The amount of effort (expressed
  2622. as elapsed time) necessary to make the business function
  2623. operational after the technology element is recovered (as
  2624. identified with RTO). Tasks include testing and validation of
  2625. the system.
  2626. worm A type of malware that is capable of activation
  2627. and replication without being attached to an existing
  2628. program.
  2629. zombie See bot.
  2630. 676 Glossary
  2631. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2632. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2633. Index
  2634. Note: Page numbers followed by f and t indicate figures and tables, respectively.
  2635. A
  2636. AAA (authentication, authorization,
  2637. and accountability), 344
  2638. acceptance control strategy, 270
  2639. acceptance of risk, 638–639
  2640. access
  2641. defined, 11
  2642. improper file, 96
  2643. information security vs., 21–22, 22f
  2644. remote, 342–346
  2645. access control lists (ACLs), 167,
  2646. 169–170, 298, 300
  2647. access control matrix, 167, 169, 301, 305
  2648. access controls
  2649. accountability, 301, 305
  2650. architecture models, 308–315
  2651. auditability, 302, 305
  2652. authentication, 302–305
  2653. authorization, 302, 305
  2654. biometrics, 305–308
  2655. defined, 298, 299
  2656. discretionary, 299
  2657. identification, 302
  2658. lattice-based, 299, 300
  2659. mandatory, 299, 301
  2660. matrix, 301, 305
  2661. nondiscretionary, 299, 300–301
  2662. TACACS, 343–344
  2663. accountability, 301, 305
  2664. accreditation. See also certifications
  2665. vs. certifications, 527
  2666. definition, 527
  2667. ISO 27001/27002 Systems, 540
  2668. NIST security life cycle approach,
  2669. 527–532
  2670. NSTISS, 532–540
  2671. accuracy, defined, 14–15
  2672. ACLU (American Civil Liberties Union),
  2673. 16
  2674. ACM (Association for Computing
  2675. Machinery), 138
  2676. acquired value, 275
  2677. ACS (annualized cost of a safeguard),
  2678. 272, 276
  2679. active vulnerability scanners, 401, 404,
  2680. 405
  2681. address restrictions, 315, 318–319,
  2682. 318t
  2683. Advanced Encryption Standard (AES),
  2684. 436–437, 439
  2685. Advanced Research Projects Agency
  2686. (ARPA), 4–6
  2687. advance-fee fraud (AFF), 72, 73–74
  2688. adverse events, 191, 192
  2689. adware, 80, 81
  2690. AES (Advanced Encryption Standard),
  2691. 436–437, 439
  2692. affidavit, 643
  2693. after-action review (AAR), 208, 209
  2694. aggregate information, 115
  2695. Agreement on Trade-Related Aspects of
  2696. Intellectual Property Rights
  2697. (TRIPS), 128
  2698. air-aspirating detector, 480
  2699. Aircrack, 408
  2700. AirSnare, 408, 409f
  2701. alarm clustering/compaction, 358
  2702. alarm filtering, 359
  2703. alarm systems, 477
  2704. ALE (annualized loss expectancy), 272,
  2705. 276
  2706. alert/alarm, 358
  2707. algorithm, 422
  2708. American Civil Liberties Union (ACLU),
  2709. 16
  2710. American Recovery and Reinvestment
  2711. Act of 2009 (ARRA), 118
  2712. American Society of International Law,
  2713. 127
  2714. amperage, 490
  2715. analysis phase, 26, 27
  2716. Andersen, Arthur, 159
  2717. Anderson, James, 3, 21
  2718. annualized cost of a safeguard (ACS),
  2719. 272, 276
  2720. annualized loss expectancy (ALE), 272,
  2721. 276
  2722. annualized rate of occurrence (ARO),
  2723. 272, 276
  2724. anomaly-based detection, 371, 372
  2725. application firewalls, 320–321
  2726. application header (AH) protocol, 457
  2727. application layer firewall, 320–321
  2728. application protocol verification, 362,
  2729. 364, 365, 375, 399
  2730. ARO (annualized rate of occurrence),
  2731. 272, 276
  2732. ARPANET, 4–5
  2733. asset exposure, 260
  2734. assets, 11, 232, 237–254. See also
  2735. information
  2736. categorization, 240
  2737. inventory, 239–240
  2738. prioritization, 249
  2739. vulnerabilities, 251, 254, 255t
  2740. asset valuation, 244–249
  2741. assignees, 509
  2742. Association for Computing Machinery
  2743. (ACM), 138
  2744. asymmetric encryption, 437–440
  2745. asynchronous tokens, 302, 303, 304f
  2746. attack protocol, 395, 397
  2747. attacks. See also threats
  2748. back doors, 87
  2749. communication interception, 90–91
  2750. defined, 12, 49
  2751. denial-of-service, 88–89
  2752. dictionary attack, 67
  2753. direct/indirect, 12
  2754. distributed denial-of-service (DDoS),
  2755. 88
  2756. e-mail, 89
  2757. hoaxes, 87
  2758. mail bombs, 89
  2759. maintenance hook, 87
  2760. man-in-the-middle, 90, 91
  2761. password crack, 66–68
  2762. pharming, 90
  2763. phishing, 72
  2764. social engineering, 72–76
  2765. by software, 80–91
  2766. spam, 89
  2767. spoofing, 15, 90
  2768. trap door, 87
  2769. 677
  2770. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2771. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2772. attack success probability, 259–260
  2773. attribute-based access control (ABAC),
  2774. 299, 301
  2775. attributes, 299, 300, 301
  2776. auditability, 302, 305
  2777. auditing, 593
  2778. Australian computer security laws,
  2779. 127–128
  2780. Corporations Act 2001, 128
  2781. Cybercrime Legislation Amendment
  2782. Bill 2011, 128
  2783. Privacy Act 1988, 127
  2784. Spam Act 2003, 128
  2785. Telecommunications Act 1997, 127
  2786. authentication, 302–305, 342–346
  2787. authentication, authorization, and
  2788. accounting (AAA), 344
  2789. authentication factors, 302–305
  2790. authenticity, defined, 15
  2791. authorization, 302, 305
  2792. automated response, 212
  2793. availability, 11–14
  2794. availability disruption, 56
  2795. AVG AntiVirus, 82
  2796. avoidance of competitive disadvantage,
  2797. 230, 231
  2798. awareness and training, 598
  2799. B
  2800. back door virus/worm, 87
  2801. background check, 575–576
  2802. back hack, 393, 394
  2803. backup media, 210
  2804. backups, 212–214
  2805. baseline, 282, 283
  2806. baselining, 282–283
  2807. basic input/output system (BIOS), 239
  2808. bastion host, 326–327, 327–328, 328f
  2809. behavioral feasibility, 283, 284
  2810. behavior-based detection, 371, 372
  2811. Bell Labs, 8
  2812. Bell-LaPadula (BLP) confidentiality
  2813. model, 312–313
  2814. benchmarking, 278–280, 282
  2815. best business practices, 278, 280
  2816. best practices, 280–282
  2817. best practices, firewalls, 332–333
  2818. BIA (business impact analysis). See
  2819. business impact analysis (BIA)
  2820. Biba integrity model, 313
  2821. biometric access control, defined, 305
  2822. biometric locks, 470, 475
  2823. biometrics, 305–308
  2824. acceptability of, 308, 309t
  2825. authentication technologies, 306
  2826. effectiveness of, 307–308, 309t
  2827. recognition, 306–307, 307f
  2828. signature and voice recognition,
  2829. 306–307
  2830. BIOS (basic input/output system), 239
  2831. bit stream cipher, 422
  2832. blackout, 57, 58
  2833. Blaster worm, 84
  2834. block cipher, 422
  2835. Bluetooth, 457
  2836. book-based cipher, 431–432
  2837. boot virus, 80, 82
  2838. bottom-up approach, 22, 23, 24f
  2839. Brewer-Nash model, 315
  2840. brownouts, 57, 58
  2841. brute force, 66
  2842. brute force attacks, 66
  2843. brute force password attack, 66
  2844. buffer overruns/overflows, 94–95
  2845. build, 596
  2846. build list, 596
  2847. bull’s-eye model, 520–522
  2848. Bureau of the Census, 117
  2849. business continuity plan (BC plan), 191,
  2850. 193
  2851. business continuity planning (BCP),
  2852. 191, 192, 215–218, 270
  2853. business impact analysis (BIA), 193,
  2854. 195, 196, 197–200
  2855. mission/business processes, 198–199
  2856. recovery criticality, 198–199
  2857. recovery priorities for system
  2858. resources, 199
  2859. resource requirements, 199–200
  2860. business partners, 581
  2861. business resumption planning (BRP),
  2862. 191, 193
  2863. Business Software Alliance (BSA), 53
  2864. C
  2865. CA (certificate authority), 442–443
  2866. Caesar Cipher, 425
  2867. Calce, Michael, 89
  2868. Canaday, Rudd, 8
  2869. capabilities tables, 168, 169
  2870. capital planning and investment control
  2871. (CPIC), 598–599
  2872. catastrophic failures, 489
  2873. CBA (cost-benefit analysis), 273, 274
  2874. CCE (Certified Computer Examiner),
  2875. 570–571
  2876. CCM (configuration and change man-
  2877. agement), 594
  2878. CCRA (Common Criteria Recognition
  2879. Agreement), 312
  2880. CCT (closed-circuit television), 470, 476
  2881. CD Universe, 77
  2882. CEM (Common Methodology for
  2883. Information Technology Security
  2884. Evaluation), 312
  2885. centralized IDPS control strategy, 382,
  2886. 384–385, 384f
  2887. CER (crossover error rate), 305, 308
  2888. CERT/CC (Computer Emergency
  2889. Response Team Coordination
  2890. Center), 185
  2891. certificate authority (CA), 442–443
  2892. certificate revocation list (CRL), 442,
  2893. 444
  2894. certifications
  2895. vs. accreditation, 527
  2896. Associate of (ISC) 2 , 565
  2897. Certified Computer Examiner (CCE),
  2898. 570–571
  2899. Certified Information Security
  2900. Manager (CISM), 565
  2901. Certified Information Systems
  2902. Auditor (CISA), 566
  2903. Certified Information Systems
  2904. Security Professional (CISSP),
  2905. 562–563
  2906. Certified in Risk and Information
  2907. Systems Control (CRISC), 567
  2908. Certified in the Governance of Enter-
  2909. prise IT (CGEIT), 566–567
  2910. Certified Secure Software Lifecycle
  2911. Professional (CSSLP), 564–565
  2912. Chief Information Security Officer
  2913. (CISO), 556–558
  2914. Chief Security Officer (CSO),
  2915. 558–559
  2916. CompTIA, 569–570
  2917. costs, 571
  2918. definition, 527
  2919. 678 Index
  2920. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  2921. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  2922. EC Council, 568–569
  2923. ISO 27001/27002 Systems, 540
  2924. NIST security life cycle approach,
  2925. 527–532
  2926. NSTISS, 532–540
  2927. SSCP (Systems Security Certified
  2928. Practitioner), 564
  2929. Certified Computer Examiner (CCE),
  2930. 570–571
  2931. Certified Information Security Manager
  2932. (CISM), 565
  2933. Certified Information Systems Auditor
  2934. (CISA), 566
  2935. Certified Information Systems Security
  2936. Professional (CISSP), 562–563
  2937. Certified in Risk and Information
  2938. Systems Control (CRISC), 567
  2939. Certified in the Governance of Enter-
  2940. prise IT (CGEIT), 566–567
  2941. Certified Secure Software Lifecycle
  2942. Professional (CSSLP), 564–565
  2943. Certified Security Project Manager, 518
  2944. CFA Act, 113
  2945. CGEIT (Certified in the Governance of
  2946. Enterprise IT ), 566–567
  2947. chain of custody, 643, 646
  2948. chain of evidence, 643, 646
  2949. champion, 35
  2950. change control, 96
  2951. change control method, 522
  2952. change management culture, 525
  2953. chemical gas emission systems, 480,
  2954. 486–487
  2955. Chief Information Officer (CIO), 23, 35
  2956. Chief Information Security Officer
  2957. (CISO), 35, 36f, 155–156,
  2958. 556–558
  2959. Chief Security Officer (CSO), 558–559
  2960. Chinese wall. See Brewer-Nash model
  2961. ChoicePoint, 16
  2962. C.I.A. triangle, 10–11, 11f, 231
  2963. cipher
  2964. bit stream, 422
  2965. block, 422
  2966. cipher methods
  2967. book-based, 431–432
  2968. exclusive OR operation, 428–429
  2969. hash functions, 432–434
  2970. substitution, 423–426
  2971. transposition, 426–428
  2972. Vernam, 429–431
  2973. Vigenère, 425
  2974. circuit gateway firewalls, 320
  2975. circuit-level gateways, 331
  2976. CISA (Certified Information Systems
  2977. Auditor), 566
  2978. CISM (Certified Information Security
  2979. Manager), 565
  2980. CISO (Chief Information Security
  2981. Officer), 35, 36f, 155–156,
  2982. 556–558
  2983. CISSP (Certified Information Systems
  2984. Security Professional), 562–563
  2985. civil law, 112
  2986. Clark-Wilson integrity model, 313–314
  2987. classified data, 243–244
  2988. clean agent, 480, 487
  2989. clean desk policy, 243
  2990. cleartext, 422
  2991. Clipper Chip, 115, 116f
  2992. clipping level, 371, 372
  2993. closed-circuit television (CCT), 470, 476
  2994. CM (configuration management), 594
  2995. code, 422
  2996. Code Red (worms), 83
  2997. codes of ethics, 137–139
  2998. cold sites, 216, 217
  2999. color coding, 369
  3000. combination SysSPs, 170–172
  3001. command injection, 94, 95
  3002. commercial off-the-shelf software
  3003. (COTS), 31
  3004. Committee on National Security Sys-
  3005. tems (CNSS), 10, 17–18, 187
  3006. Common Attack Pattern Enumeration
  3007. and Classification (CAPEC), 52
  3008. Common Criteria, 311–312
  3009. Common Criteria Recognition Agree-
  3010. ment (CCRA), 312
  3011. Common Methodology for Information
  3012. Technology Security Evaluation
  3013. (CEM), 312
  3014. communication interception attacks,
  3015. 90–91
  3016. communications security, 10
  3017. communities of interest, 37–38, 233–234
  3018. community clouds, 210
  3019. competitive advantage, 230, 231
  3020. competitive intelligence, 58
  3021. Comptroller General, 117
  3022. computer crime and security survey, 50
  3023. Computer Emergency Response Team/
  3024. Coordination Center (CERT/CC),
  3025. 74, 185
  3026. computer forensics, 208, 209
  3027. Computer Fraud and Abuse Act of 1986
  3028. (CFA Act), 113, 119t
  3029. computer rooms, 477–478
  3030. physical and environmental controls,
  3031. 478
  3032. computer security, defined, 3
  3033. ComputerSecurityActof1987(CSAAct),
  3034. 114, 119t
  3035. Computer Security Institute (CSI), 50
  3036. survey of types of attack or misuse, 51t
  3037. computer viruses/worms, 16, 81–82
  3038. COMSEC (communications security),
  3039. 242
  3040. confidence value, 359
  3041. confidentiality, 15, 241–243
  3042. configuration, 594
  3043. configuration and change management
  3044. (CCM), 594, 610–614
  3045. configuration item, 594
  3046. configuration management (CM), 594
  3047. configuration rule policies, 168, 170
  3048. Congress, 114, 117, 122, 123
  3049. Consensus Roadmap for Defeating
  3050. Distributed Denial of Service
  3051. Attacks, 89
  3052. consolidated contingency plan, 219–220
  3053. consultants, 581
  3054. contact and weight sensor, 471, 477
  3055. content filters, 341–342
  3056. contingency/continuity planning
  3057. business continuity (BC) planning,
  3058. 215–218
  3059. business impact analysis (BIA), 193,
  3060. 195, 196, 197–200
  3061. components of, 193f
  3062. consolidated, 219–220
  3063. contingency planning management
  3064. team (CPMT), 192, 193,
  3065. 195–199
  3066. incident response planning (IRP),
  3067. 192
  3068. major steps in, 195f
  3069. overview, 191–196
  3070. timeline, 194f
  3071. contingency plan, 191, 192
  3072. Index 679
  3073. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  3074. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  3075. contingency planning (CP)
  3076. business impact analysis (BIA),
  3077. 197–200
  3078. defined, 191, 192
  3079. incident response planning,
  3080. 200–212
  3081. information technology, 602
  3082. policy, 196–197
  3083. contingency planning management team
  3084. (CPMT), 192, 193, 195–199
  3085. contract employees, 580–581
  3086. Controlling the Assault of Non-Solicited
  3087. Pornography and Marketing Act of
  3088. 2003 (CAN-SPAM Act), 120t
  3089. control performance baselines and
  3090. metrics, 601–602
  3091. controls. See also access controls; risk
  3092. control strategies
  3093. defined, 12
  3094. levels of, 187
  3095. control strength (CS), 264
  3096. Convention on Cybercrime, 128
  3097. conversion strategies, 518–520
  3098. copyright law, 124
  3099. copyright protection, 53
  3100. corporate governance, 156
  3101. corporate resource misuse, 132
  3102. cost avoidance, 272, 274
  3103. cost-benefit analysis (CBA), 273, 274
  3104. Council of Europe Convention on
  3105. Cybercrime, 128
  3106. countermeasures, 12, 268
  3107. covert channel, 308, 310
  3108. CPIC (capital planning and investment
  3109. control), 598–599
  3110. CPMT (contingency planning manage-
  3111. ment team), 192, 193, 195–199
  3112. cracker, 64, 65
  3113. cracking, 66
  3114. credit reporting agencies, 117
  3115. criminal law, 112
  3116. CRISC (Certified in Risk and Informa-
  3117. tion Systems Control), 567
  3118. crisis management, 218–219
  3119. critical security control, 523–525
  3120. CRL (certificate revocation list), 442
  3121. crossover error rate (CER), 305, 308
  3122. cross-site scripting (XSS), 94, 95
  3123. cryptanalysis, 418–419
  3124. cryptogram, 422
  3125. cryptographic notation, 434
  3126. cryptography
  3127. algorithms, 434–442
  3128. cipher methods, 422–434
  3129. definition, 418
  3130. foundations of, 419–422
  3131. history of, 419–421
  3132. tools for, 442–461
  3133. cryptology, 418–419
  3134. cryptotext, 422
  3135. CSI (Computer Security Institute), 50
  3136. CSO (Chief Security Officer), 558–559
  3137. CSSLP (Certified Secure Software Life-
  3138. cycle Professional), 564–565
  3139. cultural differences, 129–130
  3140. cultural mores, 110, 111
  3141. customer information, 115
  3142. cyberactivist, 78
  3143. cyberactivist operations, 78
  3144. cyberterrorism, 78–79
  3145. cyberwarfare, 78, 80
  3146. D
  3147. damage assessment, 208–209
  3148. Dan-0411 flag erratum, 92
  3149. data
  3150. classification and management,
  3151. 241–244, 244f
  3152. collection, 361
  3153. custodians, 37
  3154. in information systems, 20
  3155. owners, 37
  3156. responsibilities, 37
  3157. risk management and, 240
  3158. storage, 211, 218
  3159. users, 37
  3160. Database Right, 129
  3161. database security, 47, 48
  3162. database shadowing, 216, 218
  3163. data classification and management,
  3164. 241–244
  3165. data classification scheme, 241
  3166. data collection, 361
  3167. data collection and management, 619
  3168. Data Encryption Standard (DES), 435
  3169. data interception, 493–495
  3170. data security, 47, 48
  3171. data sources, 615–618
  3172. decipher, 422
  3173. deep packet inspection, 372
  3174. de facto standards, 158, 160
  3175. defense control strategy, 268
  3176. defense in depth, 185, 187, 188f
  3177. de jure standards, 158, 160
  3178. delayed failures, 489
  3179. deliverable, 508–509
  3180. delta conversion online UPS, 489, 492
  3181. deluge system, 480, 483
  3182. demilitarizedzones(DMZs),320,329–331
  3183. denial-of-service (DoS) attacks, 88–89,
  3184. 364, 368
  3185. Department of Defense (DoD), 4, 6, 9,
  3186. 30, 242
  3187. Department of Homeland Security
  3188. (DHS), 30, 113, 139–142
  3189. DES (Data Encryption Standard), 435
  3190. detecting differences, 621
  3191. DHCP (Dynamic Host Configuration
  3192. Protocol), 238
  3193. Diameter protocol, 344
  3194. dictionary attacks, 67
  3195. dictionary password attack, 66, 67
  3196. difference analysis
  3197. definition, 619
  3198. types of, 622t
  3199. differential backups, 208, 211
  3200. Diffie-Hellman key exchange, 448–449
  3201. Digati, Anthony, 77
  3202. digital certificates, 442, 446–448
  3203. digital forensics, 641–650
  3204. digital malfeasance, 641
  3205. Digital Millennium Copyright Act
  3206. (DMCA), 119t, 129
  3207. digital signatures, 444–446
  3208. Digital Signature Standard (DSS),
  3209. 444–446
  3210. direct changeover strategy, 518–519
  3211. direct/indirect attacks, 12
  3212. Directive 95/46/EC, 129
  3213. direct observation method, 493–494
  3214. disaster recovery (DR)
  3215. mitigation and, 270
  3216. overview, 214–215
  3217. plan, 192
  3218. recovery operations, 215
  3219. disaster recovery planning (DRP), 192
  3220. disasters, 192
  3221. 680 Index
  3222. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  3223. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  3224. discretionary access controls (DACs), 299
  3225. disk duplexing, 212, 213
  3226. disk mirroring, 212, 213
  3227. disk striping, 212
  3228. distinguished name (DN), 448
  3229. distributed denial-of-service (DDoS)
  3230. attacks, 79, 88–89, 364, 368
  3231. DMZs (demilitarized zones), 320,
  3232. 329–331
  3233. DN (distinguished name), 448
  3234. DoD (Department of Defense), 4, 6, 9,
  3235. 30, 242
  3236. dogs, 473
  3237. Domain Name System (DNS), 79, 98,
  3238. 333
  3239. Domain Name System (DNS) cache
  3240. poisoning, 90
  3241. doorknob rattling, 360
  3242. double conversion online UPS, 489, 492
  3243. downtime, 56, 57
  3244. dry-pipe system, 480, 483
  3245. DSS(DigitalSignatureStandard),444–446
  3246. due care, 111
  3247. due diligence, 111, 279
  3248. dumb cards, 302, 303
  3249. dumpster diving, 243, 244
  3250. dust contamination, 70
  3251. dynamic filtering, 315, 319
  3252. Dynamic Host Configuration Protocol
  3253. (DHCP), 238
  3254. E
  3255. earthquakes, 68, 69
  3256. ECMA (European Computer Manufac-
  3257. turers Association), 345–346
  3258. Economic Espionage Act of 1996
  3259. (EEA), 119t, 123
  3260. education programs, 189
  3261. EF (exposure factor), 273, 275
  3262. EISP (enterprise information security
  3263. policy), 163–164, 164t
  3264. electromagnetic interception, 494
  3265. electromagnetic radiation (EMR),
  3266. 493–494
  3267. electromechanical locks, 471, 474–475
  3268. Electronic Communications Privacy Act
  3269. of 1986 (ECPA), 117, 119t
  3270. Electronic Frontier Foundation (EFF),
  3271. 436, 451
  3272. electronic monitoring, 476–477
  3273. electronic push-button locks, 475
  3274. electronic vaulting, 216, 218
  3275. electrostatic discharge (ESD), 70, 488
  3276. Eli Lilly and Co., 16
  3277. Elmusharaf, Mudawi Mukhtar, 79
  3278. EM (evidentiary material), 641
  3279. e-mail attacks, 89
  3280. e-mail spoofing, 15
  3281. employees, 240. See also personnel
  3282. contract, 580–581
  3283. temporary, 580
  3284. employment contracts, 576
  3285. employment policies and practices,
  3286. 573–579
  3287. EMR (electromagnetic radiation),
  3288. 493–494
  3289. encapsulating security payload (ESP)
  3290. protocol, 457, 459
  3291. encapsulation, 347
  3292. encipher, 422
  3293. encryption
  3294. asymmetric, 437–440
  3295. key size, 440–442
  3296. private-key, 435
  3297. public-key, 437
  3298. symmetric, 435–437
  3299. VPNs and, 347
  3300. end-user license agreement (EULA), 53
  3301. end users, 36
  3302. Enron, 159
  3303. enterprise information security policy
  3304. (EISP), 163–164, 164t
  3305. enticement, 393, 395
  3306. entrapment, 393, 395
  3307. equipment policies, 166–167
  3308. ESD (electrostatic discharge), 488
  3309. espionage/trespass, 58–59, 122–123
  3310. estimated capital expenses, 511
  3311. estimated noncapital expenses, 511
  3312. Ethernet, 5
  3313. ethical hacking, 630–632
  3314. ethical issues
  3315. causes of unethical and illegal behav-
  3316. ior, 136–137
  3317. codes of ethics, 137–139
  3318. cultural differences, 129–130
  3319. education and, 135
  3320. scenarios, 133–135
  3321. ten commandments of, 130
  3322. ethics, defined, 110, 111
  3323. European Computer Manufacturers
  3324. Association (ECMA), 345–346
  3325. evasion, 359
  3326. events, 192
  3327. evidentiary procedures, 649–650
  3328. evidence, defined, 208, 209. See also
  3329. evidentiary material
  3330. evidence search and seizure, 647–648
  3331. evidentiary material (EM)
  3332. definition, 641
  3333. handling, 646
  3334. reporting, 649
  3335. exclusive OR operation (XOR), 428–429
  3336. exit interview, 577–578
  3337. expert hackers, 59, 60
  3338. exploits, defined, 13, 49
  3339. Export Administration Act (1979), 123
  3340. export and espionage laws, 122–123
  3341. exposure, defined, 13
  3342. exposure factor (EF), 273, 275
  3343. Express Scripts, Inc., 77
  3344. external intelligence sources, 617t–618t
  3345. external monitoring, 614–619
  3346. external monitoring domain, 614–615
  3347. extranet, 326, 331
  3348. F
  3349. facilities management, 470
  3350. facility systems, maintenance, 493
  3351. Factor Analysis of Information Risk
  3352. (FAIR) methodology, 263–267
  3353. fail-safe lock, 471, 475
  3354. fail-secure lock, 471, 475
  3355. FAIR (Factor Analysis of Information
  3356. Risk) methodology, 263–267
  3357. false accept rate, 306, 308
  3358. false attack stimulus, 359
  3359. false negative/positive, 359
  3360. false reject rate, 306, 307
  3361. FASP (Federal Agency Security Practices),
  3362. 280
  3363. fault, 57, 58
  3364. FCO (field change order) numbers, 239
  3365. feasibility studies, 283–285
  3366. Federal Agency Security Practices (FASP),
  3367. 280
  3368. Federal Bureau of Investigation (FBI),
  3369. 142–144
  3370. Index 681
  3371. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  3372. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  3373. Federal Communications Commission
  3374. (FCC), 56
  3375. Federal courts, 117
  3376. Federal Privacy Act of 1974 (FPA), 117,
  3377. 119t
  3378. fencing, 472
  3379. field change order (FCO) numbers, 239
  3380. file corruption, 17
  3381. file hashing, 16
  3382. file transfer protocol (FTP) servers, 329
  3383. filtration, 488
  3384. financial considerations, 512–513
  3385. financial reporting laws, 124
  3386. Financial Services Modernization Act. See
  3387. Gramm-Leach-Bliley Act (GLB Act)
  3388. fingerprinting, 360, 395, 399
  3389. fire detection systems, 481–482
  3390. fires, 68, 69
  3391. fire security and safety, 479–487
  3392. fire suppression systems, 480, 482–486
  3393. Firewalk, 400
  3394. firewalls
  3395. analysis tools, 400–401
  3396. application, 320–321
  3397. bastion host, 327–328, 328f
  3398. best practices for, 332–333
  3399. configuration, 332
  3400. content filters, 341–342
  3401. defined, 315, 316
  3402. dynamic packet-filtering, 315, 319
  3403. HTTP/HTTPS and, 333, 337, 338,
  3404. 340
  3405. hybrid, 321–322, 326–331
  3406. MAC layer, 321
  3407. packet-filtering, 315, 316–320, 318f
  3408. packet-filtering routers, 327
  3409. processing modes, 316–322
  3410. residential vs. commercial, 322–326
  3411. reverse, 341
  3412. rules, 333–341
  3413. screened host, 328–329, 329f
  3414. screened subnet, 329–331, 330f
  3415. selecting right, 331
  3416. stateful inspection, 315, 319
  3417. static, 315, 319
  3418. fixed-temperature sensor, 480
  3419. flame detector, 480
  3420. floods, 68, 69
  3421. footprinting, 360, 395, 397
  3422. forces of nature, 68–70
  3423. Foreign Intelligence Surveillance Act of
  3424. 1978 (FISA), 113
  3425. forensics, 641
  3426. format strings, 96
  3427. 4-1-9 fraud, 73–74
  3428. Fourth Amendment, 117
  3429. Fraud and Related Activity in Connec-
  3430. tion with Access Devices, 119t
  3431. Freedom of Information Act (FOIA),
  3432. 119t, 124
  3433. friendly departures, 579
  3434. FTP (file transfer protocol) servers, 329
  3435. FUD(fear,uncertainly,anddoubt)era,274
  3436. full backups, 208, 211
  3437. fully distributed IDPS control strategy,
  3438. 382, 385–386, 385f
  3439. G
  3440. gap analysis, 515, 516f
  3441. gaseous emission systems, 480,
  3442. 486–487
  3443. gates, 472
  3444. General Electric (GE), 8
  3445. Generally Accepted Security Principles
  3446. and Practices for Securing Infor-
  3447. mation Technology Systems (SP
  3448. 800-14), 179
  3449. Georgia Computer Systems Protection
  3450. Act, 126
  3451. GFCI (ground fault circuit interruption),
  3452. 489–490
  3453. GFI LANguard Network Security Scan-
  3454. ner (NSS), 403
  3455. GIAC (Global Information Assurance
  3456. Certification), 137, 138
  3457. GIAC Certified Project Manager, 517
  3458. Global Information Assurance Certifi-
  3459. cation (GIAC), 137, 138
  3460. goals, defined, 154
  3461. Goodtimes virus, 87
  3462. governance, 156–158
  3463. Graham-Denning access control model,
  3464. 314
  3465. Gramm-Leach-Bliley Act of 1999 (GLB
  3466. Act), 118, 120t
  3467. ground fault circuit interruption (GFCI),
  3468. 489–490
  3469. grounding, 490
  3470. guards, 472
  3471. Guide for Developing Security Plans for
  3472. Federal Information Systems (SP
  3473. 800-18 Rev. 1), 182
  3474. guidelines, 158, 160, 160f
  3475. H
  3476. hacker, 49–50
  3477. hackers/hacking, 49–52, 59–66, 394
  3478. defined, 59, 60
  3479. skills and abilities, 60–61, 64
  3480. hacktivist, 78
  3481. hardware
  3482. asset identification, 238–239
  3483. failures/errors, 92–93
  3484. FCO numbers, 239
  3485. in information systems, 20, 237f, 240
  3486. Harrison-Ruzzo-Ullman (HRU) access
  3487. control model, 315
  3488. hash algorithms, 432
  3489. hash functions, 432–434
  3490. hash value, 16, 432
  3491. healthcare organizations (HCOs), 118
  3492. Health Information Technology for
  3493. Economic and Clinical Health Act
  3494. (HITECH), 118
  3495. Health Insurance Portability and
  3496. Accountability Act of 1996
  3497. (HIPAA), 117–118, 119t
  3498. heating, ventilation, and air condition-
  3499. ing (HVAC) systems, 487–489
  3500. hidden forms, 98–99
  3501. hiring issues, 574f
  3502. historical perspectives, 3–10
  3503. hoaxes, 87
  3504. honeynets, 391–392
  3505. honeypots, 391–392
  3506. host-based IDPSs (HIDPS), 362,
  3507. 368–371, 389
  3508. advantages of, 369–370
  3509. disadvantages of, 370–371
  3510. hostile departures, 578–579
  3511. hot sites, 216–217
  3512. hot swap, 212, 214
  3513. HPING, 401
  3514. HTTP/HTTPS, 333
  3515. human error/failure, 71–76
  3516. humidity, 488
  3517. hurricanes, 70
  3518. hybrid cryptography systems, 448–449
  3519. 682 Index
  3520. Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  3521. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
  3522. hybrid firewalls, 321–322
  3523. hybrid VPNs, 347
  3524. HyperText Markup Language (HTML),
  3525. 81
  3526. I
  3527. IAD (Information Assurance Director-
  3528. ate), 146
  3529. ICMP (Internet Control Message Pro-
  3530. tocol), 333, 336, 337
  3531. identification, 302
  3532. identification (ID) card, 471, 473
  3533. identity theft, 121–122
  3534. Identity Theft and Assumption Deter-
  3535. rence Act, 120t
  3536. idle scanning, 400
  3537. IDPSs (intrusion detection and preven-
  3538. tion systems), 620–621
  3539. IDSs (intrusion detection systems),
  3540. 357–358. See also intrusion detec-
  3541. tion and prevention systems
  3542. IEC (International Electrotechnical
  3543. Commission), 175
  3544. illicit use, 132
  3545. immediate failures, 489
  3546. implementation of information security
  3547. bull’s-eye model, 520–522
  3548. certifications and accreditation,
  3549. 527–540
  3550. change control method, 522
  3551. change management, 525
  3552. conversion strategies, 518–520
  3553. financial considerations, 512–513
  3554. nontechnical aspects, 525–526
  3555. organizational feasibility considera-
  3556. tions, 514
  3557. outsourcing, 522
  3558. overview, 22–23
  3559. priority considerations, 513
  3560. procurement considerations, 514
  3561. project management, 508–518
  3562. project plan, 507
  3563. project scope, 512
  3564. staffing considerations, 513–514
  3565. supervised, 515
  3566. technical aspects, 518–525
  3567. time and schedule considerations, 513
  3568. training and indoctrination consid-
  3569. erations, 514
  3570. implementation phase, 26, 28
  3571. incident response (IR), 606–610
  3572. automated response, 212
  3573. backup media, 210
  3574. contingency/continuity planning and,
  3575. 192, 200–212
  3576. damage assessment, 208–209
  3577. format and content, 201
  3578. incident candidate, 203
  3579. incident classification, 203
  3580. incident detection, 203–206
  3581. incident indicators, 203–206
  3582. incident planning, 201
  3583. incident reaction, 206–208
  3584. incident recovery, 209–210
  3585. mitigate control strategy and, 270
  3586. online and cloud backup, 210
  3587. plan, 201–203
  3588. policy, 200–201
  3589. prioritization of efforts, 208
  3590. storage, 201–202
  3591. system backups, 212–214
  3592. testing, 202–203
  3593. incident candidate, 203
  3594. incident classification, 203
  3595. incident damage assessment, 208–209
Add Comment
Please, Sign In to add comment