T


tables, row-level access to, 234

tampering with data, 249

tcpvcon utility, 144

tcpview tool, 139

technical feasibility analysis, 291

technical planning, long-term, 65

technical threats, identifying, 362

technical training classes, 29

temperatures, in data centers, 93

TEMPEST project, 93

termination procedures, 75-76

terms, standard, 302

testing process, 296-298

third-party services

logical access by, 73-74

reviewing processes for managing, 73

threats, 352

administrative, 363

business, 361-362

financial threats, 361

legal threats, 361-362

overview, 361

regulatory threats, 362

failure to identify, 354-355

physical, 362-363

process component threats, 363-364

quantifying, 364

technical, 362

tools and technology, 161

training

overview, 28

reviewing and evaluating processes for, 70

sources of, 29-30

transaction tracing, 255

Transport Layer Security (EAP-TLS), 269

transportation of media, 77-78

transportation-related hazards, data center proximity to, 89

Treadway Commission, 308

Trojan horses, 242

trouble ticketing system, 273, 277

trunk autonegotiation, 126

trust, 19

Tunneled Transport Layer Security (EAP-TTLS), 269



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net