Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] damage-assessment teams data dictionaries data encapsulation 2nd Data Encryption Standard (DES) data integrity risks 2nd data integrity controls 2nd Data Link layer (OSI) 2nd 3rd data management 2nd data ownership data PDU (protocol data unit) 2nd data preparation and records teams data validation edits and controls 2nd 3rd 4th database administrators database management systems (DBMS) 2nd 3rd databases. [See DBMS (database management systems)] DBMS (database management systems) 2nd 3rd DDoS (distributed denial-of-service attacks) decentralized access-control administration defect management defense-in-depth strategy denial-of-service attacks (DoS) 2nd department heads (IT) deployment policies evaluating process for 2nd DES (Data Encryption Standard) design security 2nd 3rd access standards auditing logical access 2nd data ownership formal security awareness and training 2nd logical access policies reviewing policies and procedures security administrators design (SDLC) 2nd 3rd designing business processes benchmarking 2nd 3rd 4th BRP (business process re-engineering) 2nd 3rd 4th performance indicators 2nd 3rd 4th detection risk developers security management responsibilities development policy development 2nd evaluating process for 2nd SDLC (Software Development Life Cycle) 2nd 3rd SDLC (system development life cycle) 2nd systems development segregation of duties dictionary attacks differential backups digital certificates 2nd Digital Signature Algorithm (DSA) digital signatures 2nd 3rd directory services disaster recovery planning. [See DRP] disaster recovery plans. [See DRPs] disclosure of information discovery discovery agreements discretionary access distributed denial-of-service attacks (DDoS) DMZs (screened subnets) DNS (Domain Name Service) Domain Name Service (DNS) domains DoS (denial-of-service attacks) 2nd DRP (disaster recovery planning) strategies and policies 2nd 3rd DRPs (disaster recovery plans) 2nd backup and storage differential backups evaluating 2nd 3rd 4th 5th full backups incremental backups SANs (storage area networks) 2nd tape storage 2nd 3rd BIA (business impact analysis) 2nd 3rd 4th 5th cold sites critical functions duplicate processing facilities 2nd evacuation planning 2nd 3rd evaluating backup and recovery provisions 2nd 3rd capability to continue information system processing 2nd 3rd capability to ensure business continuity 2nd exam prep questions 2nd 3rd 4th hot sites 2nd insurance liability insurance 2nd property insurance 2nd natural disaster costs noncritical functions process development 2nd 3rd reciprocal agreements 2nd 3rd 4th 5th response teams 2nd 3rd sensitive functions testing full operational tests 2nd 3rd paper tests preparedness tests walk-through tests vital functions warm sites dry-pipe sprinklers DSA (Digital Signature Algorithm) duplicate checks duplicate processing facilities 2nd dynamic passwords |