| < Day Day Up > |
|
ICANN, see Internet Corporation for Assigned Names and Numbers
ICMP, see Internet Control Management Protocol
IDE drives, 274
IDS, see Intrusion Detection System
IEEE, see Institute of Electrical and Electronics Engineers
Industrial Revolution, 25
Industries, laws affecting, 9
INFO files, 301
Information
assets inventory, 384
classification schedule, 28
flow, charts documenting, 16
hiding, 278
ownership, 382
privacy, threats to, 383
systems
attacks concentrating on, 2
managers, 118
support policies, 98
technology (IT), 105
audit, major steps of, 129
auditors, goals of, 119
department, audit program for small, 147-150
security officers, 333
vulnerability, 382
Information Systems Audit and Control Association (ISACA), 115, 133, 257
Information Systems Security Association (ISSA), 257
Instant Messenger, 385
Institute of Electrical and Electronics Engineers (IEEE), 83, 207
Insurance, definition of, 25
Intellectual property, 232, 343, 455
Internal controls, 112
International Standards Organization, 43, 134
Internet
activity logs, employee, 225
browsing, 102, 246
connection, 69, 233
Control Management Protocol (ICMP), 181
default password on, 274
domain names, 348
firewall policy, 91
Protocol (IP), 237
address architecture, 240
address blocks, 238
address confirmation, 176
spoofing, 467
Relay Chat (IRC), 85, 297
Service Providers, 217
Web sites, audit management planning, 136
Internet Corporation for Assigned Names and Numbers (ICANN), 349
Interview
environments, hostile, 267
method, most time-consuming, 14
Intrusion attack(s)
detection of, 70
patterns, 70
Intrusion Detection System (IDS), 2, 211
dream, 96
host-based, 96
product vendors, 96
Inventory
information assets, 384
theft, 354
Investigator goals, 342
IP, see Internet Protocol
IRC, see Internet Relay Chat
IRS Procedure 86-19, 9
ISACA, see Information Systems Audit and Control Association
ISO 9000, 43, 47
ISO 17799, 134
ISSA, see Information Systems Security Association
IT, see Information technology
| < Day Day Up > |
|