Index

images  A

Architecture

    balanced controls

        definition

        detective and preventative

        detective controls

        firewalls system

        intrusion prevention systems

        security business intelligence

    business needs

    BYOD

    cloud computing

    employee productivity

    hardware-enforced security

    IT consumerization

    privacy and regulatory requirements

    security zones

        critical data and resources

        definition

        devices and application types

        PEPs

        selective zones

        trusted zones

        untrusted zones

        user’s device and location

    threat landscape

    threat management

    traditional enterprise trust model

    trust calculation

        access type

        allow access

        available controls

        business partners

        definition

        destination score

        devices and usage models

        internal and external resources

        policy decision point (PDP)

        source score

    user and data perimeters

        defenses and detective control

        protect information

        security

        traditional network security

images  B

images  C, D

images  E

images  F

images  G

images  H

images  I, J, K, L

Internal partnerships

    business group managers

    corporate risk management

    corporate security

    far-reaching web

    fellow travelers

    finance group

        business groups

        internal audit

        SOX

    formal/informal

    human resources

        employee communications

        employee procedures

        internal investigations

        security policy

    information security group

    ITERP

    legal

        business groups

        contracts

        data classification

        financial compliance

        intellectual property

        litigation

        privacy

    risk review boards

    standing committees

images  M

images  N

images  O

images  P, Q

images  R

images  S

images  T, U, V, W, X, Y, Z

Threats and vulnerabilities

    Malware industry

    structured methods

        agents

        analyzing emerging threats

        blinkered security perspective

        playing war games

        product life cycle modelc (see Product life cycle model)

        risk-sensing analysis

        risk-sensing strategy

        security team

    threat landscape

        barriers

        broad-brush picture

        edge case insecurity

        obscurity

        phishing

        smartphones

    social engineering attacks

    web, attack surface

        embedded devices

        glimpse

        nontraditional devices

        security focus areas

        smartphones

    web applications

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset