D


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

damage-assessment teams
data dictionaries
data encapsulation 2nd
Data Encryption Standard (DES)
data integrity
     risks 2nd
data integrity controls 2nd
Data Link layer (OSI) 2nd 3rd
data management 2nd
data ownership
data PDU (protocol data unit) 2nd
data preparation and records teams
data validation edits and controls 2nd 3rd 4th
database administrators
database management systems (DBMS) 2nd 3rd
databases. [See DBMS (database management systems)]
DBMS (database management systems) 2nd 3rd
DDoS (distributed denial-of-service attacks)
decentralized access-control administration
defect management
defense-in-depth strategy
denial-of-service attacks (DoS) 2nd
department heads (IT)
deployment
    policies
         evaluating process for 2nd
DES (Data Encryption Standard)
design
     security 2nd 3rd
         access standards
         auditing logical access 2nd
         data ownership
         formal security awareness and training 2nd
         logical access policies
         reviewing policies and procedures
         security administrators
design (SDLC) 2nd 3rd
designing
     business processes
         benchmarking 2nd 3rd 4th
         BRP (business process re-engineering) 2nd 3rd 4th
         performance indicators 2nd 3rd 4th
detection risk
developers
     security management responsibilities
development
     policy development 2nd
         evaluating process for 2nd
     SDLC (Software Development Life Cycle) 2nd 3rd
     SDLC (system development life cycle) 2nd
    systems development
         segregation of duties
dictionary attacks
differential backups
digital certificates 2nd
Digital Signature Algorithm (DSA)
digital signatures 2nd 3rd
directory services
disaster recovery planning. [See DRP]
disaster recovery plans. [See DRPs]
disclosure of information
discovery
discovery agreements
discretionary access
distributed denial-of-service attacks (DDoS)
DMZs (screened subnets)
DNS (Domain Name Service)
Domain Name Service (DNS)
domains
DoS (denial-of-service attacks) 2nd
DRP (disaster recovery planning)
     strategies and policies 2nd 3rd
DRPs (disaster recovery plans) 2nd
     backup and storage
         differential backups
         evaluating 2nd 3rd 4th 5th
         full backups
         incremental backups
         SANs (storage area networks) 2nd
         tape storage 2nd 3rd
     BIA (business impact analysis) 2nd 3rd 4th 5th
     cold sites
     critical functions
     duplicate processing facilities 2nd
     evacuation planning 2nd 3rd
    evaluating
         backup and recovery provisions 2nd 3rd
         capability to continue information system processing 2nd 3rd
         capability to ensure business continuity 2nd
     exam prep questions 2nd 3rd 4th
     hot sites 2nd
     insurance
         liability insurance 2nd
         property insurance 2nd
     natural disaster costs
     noncritical functions
     process development 2nd 3rd
     reciprocal agreements 2nd 3rd 4th 5th
     response teams 2nd 3rd
     sensitive functions
     testing
         full operational tests 2nd 3rd
         paper tests
         preparedness tests
         walk-through tests
     vital functions
     warm sites
dry-pipe sprinklers
DSA (Digital Signature Algorithm)
duplicate checks
duplicate processing facilities 2nd
dynamic passwords



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net