R


RA (Registration Authority), BC21

race condition, 232

radiation monitoring, 268

Radio Frequency Interference (RFI), BC22

RADIUS (Remote Authentication Dial-In User Service), 60, 111, BC21

RAID Level 0 (disk striping), BC9

RAID Level 1 (disk mirroring), BC9

RAID Level 5 (disk striping with parity), BC9

Random Access Memory (RAM), 227

RARP (Reverse ARP), 93–94, BC21

RAS (Remote Access Service), 60, 110–111, BC21

RBAC (role-based access control), 64, BC22

RC5 (Rivest Cipher No. 5), 203

Read-Only Memory (ROM), 227

real (physical) evidence, 324, BC22

real-time blackhole list (RBL), 112

reciprocal site, 290

recovery controls, BC22

Recovery Time Objective (RTO), BC22

Reduced-Instruction-Set-Computing (RISC), 225, BC22

reference monitor, 171, 229, BC22

registers, 224

Registration Authority (RA), BC21

regulatory (administrative) laws, 306, BC1

regulatory policies, 131

relational database, 159

remote access, 109–112, 253

Remote Access Service (RAS), 60, 110–111, BC21

Remote Authentication Dial-In User Service (RADIUS), 60, 111, BC21

remote maintenance, 179

Remote Procedure Call (RPC), 98

repeater, 81

replay attack, 219

repository, BC22

resilient (fail-soft) system, 231, BC11

resource protection, 260

resources. See also Web site resources

for Access Control domain, 69

for Application Security domain, 184

for Business Continuity and Disaster Recovery Planning domain, 299

CIB (CISSP Candidate Information Bulletin), 13

The CISSP Prep Guide: Gold Edition (Krutz, Vines), 13

Computer Viruses For Dummies (Wiley Publishing),174

for Cryptography domain, 220–222

“Ethics and the Internet” (IAB), 334

for Information Security and Risk Management domain, 148

(ISC)2 publications, 29–30

for Legal, Regulations, Compliance, and Investigations domain, 334–335

list of, 366–367, BC35–BC36

for Operations Security domain, 273

for Physical (Environmental) Security domain, 358

practice exam on CD-ROM, 13, 15, 367

for Security Architecture and Design domain, 243

The Site Security Handbook (RFC 2196), 131

study guides, 13, 14, 15

for Telecommunications and Network Security domain, 119

training courses, 15

restricted access method, for remote access, 110

restricted areas, 356

retina pattern, 51–52

Reverse ARP (RARP), 93–94, BC21

review seminar, 14

RFC 1087 (“Ethics and the Internet”), 334

RFC 2196 (The Site Security Handbook), 131

RFI (Radio Frequency Interference), BC22

RG8 (thick coaxial cable), 78, 80

RG11 (thick coaxial cable), 78, 80

RG58 (thin coaxial cable), 78, 80

Rijndael algorithm, 203, BC22

ring topology, 77, BC22

RISC (Reduced-Instruction-Set-Computing), 225, BC22

risk acceptance, 144, BC22

risk analysis, 141–144, BC22

risk assignment (transference), 144, BC22

risk control, 144–145

risk, definition of, 139

risk identification, 139–141

risk management, 21

Risk Management domain. See Information Security and Risk Management domain

risk management triple, 139

risk mitigation, 139, BC22

risk reduction, 144, BC22

Rivest Cipher No. 5 (RC5), 203

Rivest, Shamir, Adleman (RSA), 206, BC23

RJ-type connectors, 79

role-based access control (RBAC), 64, BC22

roles and responsibilities for employees, 135–137

ROM (Read-Only Memory), 227

rotation of duties (job rotations), 138, 257, BC15, BC22

routed protocols, 92

router, 94, BC23

routing protocols, 92

RPC (Remote Procedure Call), 98

RSA (Rivest, Shamir, Adleman), 206, BC23

RS-232 standard, 80

RTO (Recovery Time Objective), BC22

rule-based access control, 65, BC23

running ciphers, 193




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net