Chapter Opener Photo

Index

Note: Page numbers followed by f and t indicate figures and tables, respectively.

A

B

C

D

E

F

G

H

I

J

  • junk filter function, 267t

K

L

M

N

O

P

Q

  • quality process, 208

  • query, 275

  • Quora incident, 285

R

S

T

  • T-Mobile incident, 285

  • targets, 106

  • TDE. See Transparent Data Encryption

  • team lead on CSIRT, 288t

  • technical controls, 4

  • technical security controls, 331

  • Telnet protocol, 192t

  • Terminal Access Controller Access-Control System Plus (TACACS+), 253

  • test scenarios, 317

  • thick clients, 7

  • thin clients, 7

  • threats, 11

  • time-tested strategy, 39

  • TLS. See Transport Layer Security

  • Top 10 Web Application Security Risks, 281

  • TPM. See Trusted Platform Module

  • traditional software development management, 309

  • traffic flow, 182

  • training, on security development, 312

  • Transmission Control Protocol/Internet Protocol (TCP/IP) Reference Model, 190, 191, 191f, 192t, 268

  • Transparent Data Encryption (TDE), 276

  • Transport Control Protocol (TCP), 244

  • Transport Layer Security (TLS), 77

  • Trojan horse, 89, 91t

  • Truecrypt, 65

  • Trusted Platform Module (TPM), 67

  • trusted sites, 264t

  • trusted source, 81

  • Tucker, Charles, 6

  • tunneling, concept of, 253

  • two-factor authentication (2FA), 25, 200, 328

  • Type I authentication, 25, 26t

  • Type II authentication, 25, 26t

  • Type III authentication, 25, 26t

U

V

W

X

  • X.509 standard, 80

Z

  • zero-day attack, 94, 96

  • zombie, 266

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.174.191