RA (Registration Authority), BC21
race condition, 232
radiation monitoring, 268
Radio Frequency Interference (RFI), BC22
RADIUS (Remote Authentication Dial-In User Service), 60, 111, BC21
RAID Level 0 (disk striping), BC9
RAID Level 1 (disk mirroring), BC9
RAID Level 5 (disk striping with parity), BC9
Random Access Memory (RAM), 227
RARP (Reverse ARP), 93–94, BC21
RAS (Remote Access Service), 60, 110–111, BC21
RBAC (role-based access control), 64, BC22
RC5 (Rivest Cipher No. 5), 203
Read-Only Memory (ROM), 227
real (physical) evidence, 324, BC22
real-time blackhole list (RBL), 112
reciprocal site, 290
recovery controls, BC22
Recovery Time Objective (RTO), BC22
Reduced-Instruction-Set-Computing (RISC), 225, BC22
reference monitor, 171, 229, BC22
registers, 224
Registration Authority (RA), BC21
regulatory (administrative) laws, 306, BC1
regulatory policies, 131
relational database, 159
remote access, 109–112, 253
Remote Access Service (RAS), 60, 110–111, BC21
Remote Authentication Dial-In User Service (RADIUS), 60, 111, BC21
remote maintenance, 179
Remote Procedure Call (RPC), 98
repeater, 81
replay attack, 219
repository, BC22
resilient (fail-soft) system, 231, BC11
resource protection, 260
resources. See also Web site resources
for Access Control domain, 69
for Application Security domain, 184
for Business Continuity and Disaster Recovery Planning domain, 299
CIB (CISSP Candidate Information Bulletin), 13
The CISSP Prep Guide: Gold Edition (Krutz, Vines), 13
Computer Viruses For Dummies (Wiley Publishing),174
for Cryptography domain, 220–222
“Ethics and the Internet” (IAB), 334
for Information Security and Risk Management domain, 148
(ISC)2 publications, 29–30
for Legal, Regulations, Compliance, and Investigations domain, 334–335
list of, 366–367, BC35–BC36
for Operations Security domain, 273
for Physical (Environmental) Security domain, 358
practice exam on CD-ROM, 13, 15, 367
for Security Architecture and Design domain, 243
The Site Security Handbook (RFC 2196), 131
study guides, 13, 14, 15
for Telecommunications and Network Security domain, 119
training courses, 15
restricted access method, for remote access, 110
restricted areas, 356
retina pattern, 51–52
Reverse ARP (RARP), 93–94, BC21
review seminar, 14
RFC 1087 (“Ethics and the Internet”), 334
RFC 2196 (The Site Security Handbook), 131
RFI (Radio Frequency Interference), BC22
RG8 (thick coaxial cable), 78, 80
RG11 (thick coaxial cable), 78, 80
RG58 (thin coaxial cable), 78, 80
Rijndael algorithm, 203, BC22
ring topology, 77, BC22
RISC (Reduced-Instruction-Set-Computing), 225, BC22
risk acceptance, 144, BC22
risk analysis, 141–144, BC22
risk assignment (transference), 144, BC22
risk control, 144–145
risk, definition of, 139
risk identification, 139–141
risk management, 21
Risk Management domain. See Information Security and Risk Management domain
risk management triple, 139
risk mitigation, 139, BC22
risk reduction, 144, BC22
Rivest Cipher No. 5 (RC5), 203
Rivest, Shamir, Adleman (RSA), 206, BC23
RJ-type connectors, 79
role-based access control (RBAC), 64, BC22
roles and responsibilities for employees, 135–137
ROM (Read-Only Memory), 227
rotation of duties (job rotations), 138, 257, BC15, BC22
routed protocols, 92
router, 94, BC23
routing protocols, 92
RPC (Remote Procedure Call), 98
RSA (Rivest, Shamir, Adleman), 206, BC23
RS-232 standard, 80
RTO (Recovery Time Objective), BC22
rule-based access control, 65, BC23
running ciphers, 193