Index
A
- Aanval
- acceptable use policy
- access denied, security awareness training
- administrator access
- Advanced Encryption Standard (AES)
- advanced malware mitigation, NGFW
- AES-128
- AES-192
- AES-256
- AIDE (FIM)
- anomaly detection, intrusion detection and prevention
- anti-virus
- application administrator
- application awareness, NGFW
- application encryption
- application monitoring
- application owner, trust model roles
- applications, trust model
- applications teams
- application user, trust model roles
- application whitelisting
- APTs
- Artillery
- asset inventory labels
- associate surveys, security awareness training
- asymmetric encryption
- authentication
- authorization
- automation
- awareness / Benefits of NGFW technology
B
- BackBox (Distro)
- BackTrack (Distro)
- Bastille Linux (OS hardening)
- behavioral analysis, intrusion detection and prevention
- Bit9
- bring your own device (BYOD) / Automating discovery
- Bro Network Security Monitor
- building blocks, trust model
- Burp Suite
- business impact analysis
- business networking sites, social engineering
- business partner, trust model users
- business partner architecture, network edge
- BYOD initiatives
- BYOx business model / Other thoughts on risk and new enterprise endeavors
C
- CERT
- change management, security
- CIRT team
- ClamAV (AV)
- classroom training, security awareness training
- client-side certificates / Client-side certificates
- cloaking
- Cloud service, network edge
- CMDB
- commercial PGP asymmetric key encryption solution
- common knowledge, security awareness training
- complete database encryption
- computer-based training, security awareness training
- considerations, wireless signal / Wireless signal considerations
- contracted incident response
- contractor, trust model users
- Counter Cipher Mode Protocol (CCMP)
- Cyber Monday traffic patterns
D
- 3DES
- data, trust model
- data-centric security architecture
- data access changes
- data administrator
- database encryption
- database team
- data classification
- data classification model / Assign data classification
- data classification policy
- data custodians
- data destruction policy
- data handling policy
- data locations, enterprise data
- DATALOSS db
- data masking
- data monitoring
- data owner
- data owner, trust model roles
- data owners
- data retention policy
- data risk
- data risk centric architectures
- data transfer systems
- data types, enterprise data
- DBA_VLAN / Security architecture 101
- DES
- desktop support team
- detection methods, intrusion detection and prevention
- DigiNinja
- DISA IA Awareness Posters
- Discover DLP
- Distributed denial-of-service (DDoS) protection
- DLP
- DLP strategy / Data in storage
- DMZ
- DNS
- DNS mail record (MX)
- DNS poisoning
- DNS records
- DNS resolution
- DNSSEC
- DNS Security (DNSSEC)
- DNS zone transfer
E
- e-mail
- E-mail DLP
- EAP-TLS
- effective tools
- effective training, security awareness training
- electronic communication methods, social engineering
- email SPAM filtering solution
- emerging technologies
- encrypted file transfer (external)
- encryption
- encryption algorithms
- AES-128 (Advanced Encryption Standard, 128-bit) / Encryption
- AES-192 (Advanced Encryption Standard, 192-bit) / Encryption
- AES-256 (Advanced Encryption Standard, 256-bit) / Encryption
- RC4 (Rons Code 4, named after Ron Rivest) / Encryption
- DES (Data Encryption Standard, 56-bit) / Encryption
- 3DES (Triple DES, 160-bit) / Encryption
- encryption and hashing
- Endpoint DLP
- enterprise data
- enterprise data, securing
- enterprise encryption standard
- enterprise incident response
- Enterprise Information Integration (EII)
- enterprise monitoring standard
- enterprise security
- enterprise security pitfalls
- enterprise security standards
- enterprise support, security incidents
- Enterprise trust models
- examples, wireless network security standard
- expected response times, incident response team
- external (non-employee), trust model users
- external user
- extract
F
- feature-rich web applications, network edge
- features, NGFW
- file share encryption
- file transfer
- FIM
- forensics
G
- GnuPG (encryption)
- Gnu Privacy Guard (GPU) / Encryption
H
- hardening
- hashing / File integrity monitoring
- heuristic anti-virus
- HIDS
- HIDS solution
- HIPS
- Honeyd (honeypot)
- host firewall
- human element, security
I
- IEEE
- IEEE 802.1X
- impact
- Imperva
- in-house incident response
- in-person social engineering
- incident response contacts
- incident response plan
- incident response process flow
- incident response team
- information security policy
- information security team
- internal (employee), trust model users
- internal network
- internal segmentation
- internal user
- Internet accessible websites
- Internet Engineering Task Force (IETF)
- Internet services
- intrusion detection
- intrusion detection and prevention technology
- intrusion prevention
- intrusion prevention, NGFW
- intrusion prevention system (IPS)
- ISO 27001
- IT security policies
- IT security standards
J
- job posting sites, social engineering
K
- KeePass (password safe)
- key indicators, spam e-mail
L
- Linux tools
- load (ETL)
- local SPAM filtering
- Logwatch (log monitoring)
M
N
- Nagios Community
- netstat, Linux tools
- netstat, Windows tools
- network-based security incidents
- network access control (NAC) / Network segmentation
- network architectural changes
- network boundary monitoring
- Network DLP
- network edge
- network security monitoring
- network segmentation
- network segment monitoring
- network services
- network team
- next-generation firewall (NGFW) / Data in transit
- next-generation firewalls
- NGFW
- Nikto
- NIST
- NIST SP 800-50
- NSA Best Practices for Securing Home Network
- NSS Labs
- NTL Institute
- ntop (traffic monitor)
O
- OpenDLP (DLP)
- Open Source Tripwire (FIM)
- OpenSSL
- OpenVAS
- OpenWIPS-ng
- operating system monitoring
- Oracle / Secure coding
- OSSEC
- OSSEC (HIDS)
- OSSIM (SIEM)
P
- PacketFence (NAC)
- Palo Alto networks website
- Payment Card Industry Data Security Standard (PCI-DSS) / Data locations
- Payment Card Industry Data Security Standard (PCI DSS) / Wireless segmentation
- PCI DSS
- perfmon
- perimeter security changes
- pfSense (firewall)
- PhishMe
- PhishMe.com
- phone methods, social engineering
- Phreaking
- physical access controls
- physical security
- physical security incident
- policies and standards, trust model
- Policy and standard, online resources
- policy enforcement
- PolicyTool
- predictive behavioral analysis
- Private Branch Exchanges (PBXs)
- privileged application access
- privileged data access
- privileged system access
- privileged user access
- privileged users
- probability
- processes, trust model
- process monitoring
- Proxy Auto-Configuration (PAC) files
- ps / Operating system monitoring
Q
- qualitative risk analysis
- quantitative risk analysis
R
- Rapid7 Nexpose
- RC4
- real-time FIM
- remote access policy
- Request for Comments (RFC)
- Request for Comments (RFC)
- risk
- risk analysis
- risk analysis, online resources
- risk analysis components
- road map
- road map components
- rogue access point
- roles, incident response team
- roles, trust model
S
- safe and secure computing resources
- sample incident response form
- sample incident response report form
- Samurai Web Testing Framework
- SANS Home/Small Office Security
- SANS InfoSec Reading Room
- search function / Secure coding
- secure development life cycle (SDLC) / Secure coding
- security
- security architecture
- Security architecture 101
- security architecture models
- security awareness materials
- security awareness resources
- security awareness training
- security event
- security exceptions
- security incident management
- security incidents
- security monitoring
- security monitoring requisites
- Security Onion
- security policies and standards
- security policy development
- security tools list
- selective database encryption
- Sender Policy Framework (SPF) / Spam e-mail
- service-level agreements (SLAs) / Building the incident response team
- shared key
- shared key implementation
- SIEM
- signature-based anti-virus
- signature-based detection, intrusion detection and prevention
- Simple Mail Transfer Protocol (SMTP) / Data locations
- Simple Public Key Infrastructure (SPKI) / User authentication
- Snort (IDS)
- Social-Engineer.com
- Social-Engineer Toolkit
- Social-Engineer Toolkit (SET) / Social engineering
- social engineering
- social engineering, human element
- social media
- social media threats
- Software Development Life Cycle (SDLC) / Defining application security architecture
- SpamAssassin (SPAM)
- spam e-mail
- SPAM filtering
- SPAMHAUS
- SPAM relaying
- specialized material, security awareness training
- SQL injection
- Sqlmap
- SSID
- SSID cloaking
- stored data
- supporting procedures, incident response team
- supporting processes
- Suricata (IPS)
- symmetric encryption
- system administrator
- system classification
- system classification model
- system hardening, online resources
- system hardening standard
- system management
- system owner, trust model roles
- system patching
- systems monitoring
- systems support team
T
- taskmgr
- technology use policy
- Temporal Key Integrity Protocol (TKIP)
- text.txt
- encrypted, OpenSSL AES-256 symmetric encryption used / Encryption
- The Learning Pyramid
- third-party services, network edge
- threat
- Time-to-resolution (TTR)
- tokenization
- tools, for securing data
- tools, for securing network
- Tools, for securing systems
- tools, for security monitoring
- tools, for testing security
- tools, for vulnerability scanning
- training materials, security awareness training
- transform
- transient data
- Tripwire
- TrueCrypt (encryption)
- trust model
- trust models
- trust no one model
U
- unique system check / Unique system check
- user account auditing
- user account management
- user Internet access
- user monitoring
- user permissions
- user roles
- users, trust model
V
W
- w3af
- war dialing
- web application firewalls
- Web DLP
- Webspoit Framework
- WEP
- Windows tools
- wireless authentication
- wireless encryption
- wireless intrusion prevention system / Wireless network intrusion prevention
- wireless network integration / Wireless network integration
- wireless networks
- wireless network security standard
- wireless segmentation
- wireless signal
- WPA
- WPA1
- WPA2
X
Z
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.