| < Day Day Up > |
|
DAC, see Discretionary Access Control
Data
administration management, 118
backup practices, 29
blocks, 308
classification, 28
controls, 104
disclosure, 387
entry, 99
flowchart, 127
fragmented, 287
-gathering tools, 309
hiding techniques, 309
integrity, 119
libraries, 98
manipulation, 155
privacy, Best Practices, 386
recovery sub-team, 36
storage, Windows NT incidents, 293
-transmission habits, 385
Database(s)
administration, 99
auditing of, 154
chronology, 235
concurrency controls, 157
definitions, 154
existence controls, 158
management system (DBMS), 154
managers, 333
Securities Exchange Commission, 178
Daubert v. Merrell Dow Pharmaceuticals, Inc., 365
DBMS, see Database management system
Defamation
claims of, 57-58
definition of, 24
Demilitarized zone (DMZ), 5, 97, 152, 160, 185, 324
Denial-of-service (DoS) attacks, 3, 23, 70
origin of, 240, 258
wireless, 211
Department Operating Procedure (DOP), 42
Design patents, 351
Detective controls, 117
DHCP, see Dynamic Host Control Protocol
Dial-in users, 474
Digital certificates, 92
Directory privileges, unauthorized changes of, 236
Disaster recovery, 104
plans, 32
training, 34
Discretionary Access Control (DAC), 155
Discrimination
claims of, 57-58
definition of, 24
Disk geometry, 275
Distributed denial-of-service attacks, 23
DMZ, see Demilitarized zone
DNS, see Domain Name System
Document flowcharts, 126, 127
Domain Name System (DNS), 23, 138, 159, 184, 462
cache corruption, 162
names, 176, 239
purpose of, 239
Domain registration
payments, 322
queries, 178
DOP, see Department Operating Procedure
DoS attacks, see Denial-of-service attacks
DOS-based operating systems file deletions, 287
Driver licensing, 381
Dumpsec, 503
Duplication tools, forensically sound, 281
Dynamic Host Control Protocol (DHCP), 85, 320
| < Day Day Up > |
|