List of Exhibits

 < Day Day Up > 

 



Chapter 1: Risk Management

Exhibit 1: Laws Affecting Industries
Exhibit 2: Example of Simple Gantt Chart
Exhibit 3: Example of Simple Critical Path Method Chart
Exhibit 4: Sample Questionnaire
Exhibit 5: Risk Assessment Schedule
Exhibit 6: Information Classification Schedule
Exhibit 7: Asset Protection Schedule
Exhibit 8: Risk Assessment Report

Chapter 2: Policies and Procedures

Exhibit 1: Policy Format
Exhibit 2: Sample Acceptable E-Mail Use Policy Language
Exhibit 3: Sample E-Mail Retention Policy
Exhibit 4: Expectation of Privacy
Exhibit 5: Waiver of Privacy Rights
Exhibit 6: No User Privacy in Communications
Exhibit 7: Automated User Monitoring
Exhibit 8: Privacy Statement
Exhibit 9: Electronic Privacy Statement
Exhibit 10: Language Use in Communications
Exhibit 11: Copyright Sample
Exhibit 12: Software Copyright Sample
Exhibit 13: Proprietary and Sensitive Information Sample
Exhibit 14: Employee Responsibility Statement
Exhibit 15: Sending Unsolicited E-Mail or Spam
Exhibit 16: Attorney-Client E-Mail Footer Sample
Exhibit 17: Attorney-Client E-Mail
Exhibit 18: Employee Responsibility for Entry Methods
Exhibit 19: Password Maintenance
Exhibit 20: Employee-Installed Software and Storage Media Use
Exhibit 21: Entry Notice Banner
Exhibit 22: Log-In Banner Policy
Exhibit 23: System Development Policy
Exhibit 24: Workplace Safety Policy
Exhibit 25: Forensics Examination Policy
Exhibit 26: Protecting Employee Personal Information Policy
Exhibit 27: Multiple or Dual-Homed Firewall Policy
Exhibit 28: Screened Sub-Network Policy
Exhibit 29: Firewall Administration Policy
Exhibit 30: Firewall Administrator Policy
Exhibit 31: Firewall Administration Policy
Exhibit 32: Firewall Backup Policy

Chapter 3: Auditing

Exhibit 1: Management Functions
Exhibit 2: Application Functions
Exhibit 3: Document Flowchart
Exhibit 4: Data Flowchart
Exhibit 5: System Flowchart
Exhibit 6: Program Flowchart
Exhibit 7: Audit Management Plan for Firewall Administration Unit
Exhibit 8: Backup and Data Recovery Audit Program
Exhibit 9: Audit Report for XYZ Corporation Backup and Recovery Unit
Exhibit 10: General Controls Review for IT Department
Exhibit 11: Packet Filtering Security Table
Exhibit 12: Domain Registration Queries
Exhibit 13: SamSpade
Exhibit 14: SuperScan
Exhibit 15: Sample Output of Nmap
Exhibit 16: Sample of Nmap Results
Exhibit 17: C:\ netstat -na
Exhibit 18: Localhost #nmap -O -sS
Exhibit 19: [bash] $ nslookup
Exhibit 20
Exhibit 21: Vulnerability Scanners
Exhibit 22: Nessus Plugins
Exhibit 23: Nessus Preferences
Exhibit 24: Nessus Plugin Families
Exhibit 25: Nessus Report Sample
Exhibit 26: Nessus Scan Options
Exhibit 27: Automated Vulnerability Sample Finding Report
Exhibit 28: Firewall Policy Sample
Exhibit 29: Typical Wireless System
Exhibit 30: Wilbur Configuration
Exhibit 31: Wilbur Options

Chapter 4: Critical Incident Response and CIRT Development

Exhibit 1: IP Address Blocks
Exhibit 2: CIDR Addressing Blocks
Exhibit 3: Chain of Custody Schedule
Exhibit 4: BIOS Access Information
Exhibit 5: Typical Disk Geometry
Exhibit 6: Relative Addressing
Exhibit 7: Typical Floppy Disk Geometry
Exhibit 8: Partitions and Cluster Sizes
Exhibit 9: Boot Utilities
Exhibit 10: Netstat Connections
Exhibit 11: Common Activity Codes
Exhibit 12: IP Resolution in SamSpade
Exhibit 13: SamSpade Tools
Exhibit 14

Chapter 5: Legal Matters

Exhibit 1
Exhibit 2

Chapter 6: Privacy

Exhibit 1: Sample Web Site Privacy Statement



 < Day Day Up > 

 



Critical Incident Management
Critical Incident Management
ISBN: 084930010X
EAN: 2147483647
Year: 2004
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net