580–581, 676 Digital Signature Standard DSS, 345–346, 676

processors, 371–372 defined, 703 execution types, 372–373 operating modes for, 380–382 processing types, 374 protection mechanisms, 374–379, 376, 378 security modes for, 378–381 Program Evaluation Review Technique PERT,

242, 703–704

programmable read-only memory PROM, 382–383, 704 programming languages for, 232 security flaws in, 439 proprietary alarm systems, 638 proprietary data, 164, 704 protection mechanisms, 374–375 in computer design, 391–396 operating modes, 380–382 process states, 377–378, 378 rings, 375–376, 376 in security management, 159–161 security modes, 378–381 protection of personal information, 457 protection profiles, 704 protection rings, 244–246, 245 protection specifications development, 235–236 protocol data units PDUs, 73, 73 protocol security mechanisms, 103–106 protocol services, 107–108 protocols, 70, 704 provisions in business continuity planning, 521 proxies, 102, 704 proximity readers, 637, 704 proxy firewalls, 98 prudent man rule, 577, 704 pseudo-flaws, 281–282, 704 Public classification, 165, 704 public IP addresses, 124, 704 public key infrastructure PKI, 346 certificates in, 346–347 certificate authorities for, 347–348 generation and destruction of, 348–350 defined, 704 key management in, 350 public keys, 302, 313 in asymmetric cryptography, 337, 337 defined, 704 distribution of, 322 purging media, 460–461, 704 PVCs permanent virtual circuits, 108, 127, 700 Q QICs Quarter Inch Cartridges for backups, 556 qualitative decision making, 515, 705 qualitative risk analysis, 193–194, 705 quality assurance checks, 705 quantitative decision making, 515, 705 quantitative risk analysis, 190–193, 705 Quarter Inch Cartridges QICs for backups, 556 R racial harassment, 492 radiation monitoring, 388–389, 490, 639–640, 705 radio frequency interference RFI, 642, 705 radio frequency RF radiation, 490, 639–640 RADIUS Remote Authentication Dial-In User Service, 27–28, 106, 707 RAID Redundant Array of Independent Disks, 110–111 rainbow series, 424–428 RAM random access memory, 383–384, 705 random access storage, 226, 387–388, 705 random number generators, 303 RARP Reverse Address Resolution Protocol, 74–75, 92, 707 RAs registration authorities, 348, 706 RBAC role-based access controls, 23, 25–26, 708 RC5 Rivest Cipher 5 algorithm, 320 RDBMSs relational database management systems, 216 read-only memory ROM, 382–383, 705 ready state, 377, 705 real evidence, 591, 705 real memory, 225, 383, 705 realized risk, 190–191, 706 reconnaissance attacks, 278–280 record retention in administrative management, 458 in auditing, 483 defined, 706 record sequence checking, 131, 706 records, 217, 706 recovery controls, 4, 461, 706 recovery strategy, 545 alternative processing sites in, 547–550 business unit priorities in, 545–546 crisis management in, 546 database recovery, 551–552 emergency communications in, 546 Mutual Assistance Agreements in, 550–551 recovery vs. restoration, 558–559 workgroup recovery in, 546–547 recovery time objective RTO, 706 Red Book, 427 red boxes, 138 reducing risk, 195, 706 redundancy for failover servers, 543 knowledge, 177 Redundant Array of Independent Disks RAID, 110–111 redundant servers, 109 reference monitors, 245 defined, 706 in TCB, 417–418 reference profiles, 706 referential integrity, 218, 706 refreshing RAM, 384 regenerated keys asymmetric, 315 symmetric, 313 register addressing, 385, 706 registered trademarks, 581–582 registers, 384, 706 registration authorities RAs, 348, 706 registration with biometric devices, 16–17 regulatory policies, 183, 706 regulatory requirements, 514–515 reject risk, 195, 706 relational database management systems RDBMSs, 216 relational databases, 217–219, 706 relationships, 217, 266, 706 release control, 243 relevant evidence, 591, 707 remote access, 102–103 Remote Authentication Dial-In User Service RADIUS, 27–28, 106, 707 remote backup locations, 551–552 remote control technique, 107 remote journaling, 552, 707 remote mirroring, 552, 707 remote node operation, 107 Remote Procedure Call RPC, 76 repeatable phase in Capability Maturity Model, 239 repeaters, 83, 100 defined, 707 in Physical layer, 74 replay attacks, 57, 141, 360, 707 reporting in auditing, 481–482 incidents, 615–616 request control, 242 residual risk, 195, 707 resources in business continuity planning prioritizing, 519 requirements, 513–514 response teams for incidents, 612 restoration vs. recovery, 558–559 restricted interface model, 403, 707 retention in incidents, 615 retina scans, 14, 707 Reverse Address Resolution Protocol RARP, 74–75, 92, 707 reverse engineering, 707 reverse hash matching, 360, 707 review questions access control, 36–41 administrative management, 470–475 applied cryptography, 363–368 attacks, 62–67, 284–290 auditing, 502–507 Business Continuity Planning BCP, 528–533 communications security, 146–151 computer crime, 621–626 computer design, 408–413 cryptography, 328–333 Disaster Recovery Planning DRP, 564–569 employment policies and practices, 202–207 laws, 598–603 monitoring, 502–507 networks, 114–119 physical security, 652–657 security management, 168–173 security models, 443–448 system development controls, 250–255 revocation for certificates, 349–350, 707 RF radio frequency radiation, 490, 639–640