612 Directory UMM :Networking Manual:

processors, 371–372 defined, 703 execution types, 372–373 operating modes for, 380–382 processing types, 374 protection mechanisms, 374–379, 376, 378 security modes for, 378–381 Program Evaluation Review Technique PERT,

242, 703–704

programmable read-only memory PROM, 382–383, 704 programming languages for, 232 security flaws in, 439 proprietary alarm systems, 638 proprietary data, 164, 704 protection mechanisms, 374–375 in computer design, 391–396 operating modes, 380–382 process states, 377–378, 378 rings, 375–376, 376 in security management, 159–161 security modes, 378–381 protection of personal information, 457 protection profiles, 704 protection rings, 244–246, 245 protection specifications development, 235–236 protocol data units PDUs, 73, 73 protocol security mechanisms, 103–106 protocol services, 107–108 protocols, 70, 704 provisions in business continuity planning, 521 proxies, 102, 704 proximity readers, 637, 704 proxy firewalls, 98 prudent man rule, 577, 704 pseudo-flaws, 281–282, 704 Public classification, 165, 704 public IP addresses, 124, 704 public key infrastructure PKI, 346 certificates in, 346–347 certificate authorities for, 347–348 generation and destruction of, 348–350 defined, 704 key management in, 350 public keys, 302, 313 in asymmetric cryptography, 337, 337 defined, 704 distribution of, 322 purging media, 460–461, 704 PVCs permanent virtual circuits, 108, 127, 700 Q QICs Quarter Inch Cartridges for backups, 556 qualitative decision making, 515, 705 qualitative risk analysis, 193–194, 705 quality assurance checks, 705 quantitative decision making, 515, 705 quantitative risk analysis, 190–193, 705 Quarter Inch Cartridges QICs for backups, 556 R racial harassment, 492 radiation monitoring, 388–389, 490, 639–640, 705 radio frequency interference RFI, 642, 705 radio frequency RF radiation, 490, 639–640 RADIUS Remote Authentication Dial-In User Service, 27–28, 106, 707 RAID Redundant Array of Independent Disks, 110–111 rainbow series, 424–428 RAM random access memory, 383–384, 705 random access storage, 226, 387–388, 705 random number generators, 303 RARP Reverse Address Resolution Protocol, 74–75, 92, 707 RAs registration authorities, 348, 706 RBAC role-based access controls, 23, 25–26, 708 RC5 Rivest Cipher 5 algorithm, 320 RDBMSs relational database management systems, 216 read-only memory ROM, 382–383, 705 ready state, 377, 705 real evidence, 591, 705 real memory, 225, 383, 705 realized risk, 190–191, 706 reconnaissance attacks, 278–280 record retention in administrative management, 458 in auditing, 483 defined, 706 record sequence checking, 131, 706 records, 217, 706