679 Directory UMM :Networking Manual:

RFC 1918, 707 RFI radio frequency interference, 642, 705 rights in access control, 30–32, 33 Rijndael cipher, 320–321, 708 ring topology, 87, 88 rings, protection, 375–376, 376 RIP Routing Information Protocol, 75 risk in business continuity planning acceptance and mitigation, 525 assessment, 524 identification, 516–517 defined, 708 risk analysis, 185, 708 risk management, 185 defined, 708 handling risk, 195–196 methodologies, 188–190 qualitative analysis, 193–194 quantitative analysis, 190–193 terminology, 186–187, 187 risk mitigation, 195 risk tolerance, 195, 708 Rivest, Ronald, 337, 342 Rivest, Shamir, and Adleman RSA encryption, 337–338, 708 Rivest Cipher 5 RC5 algorithm, 320 Rogier, Nathalie, 342 role-based access controls RBAC, 23, 25–26, 708 roles, security, 179–180 ROLLBACK command, 219 ROM read-only memory, 382–383, 705 root accounts, 494 root level, 708 rootkits, 278, 708 Rosenberger, Rob, 264 ROT3 Rotate 3 cipher, 294, 307 routers, 101 defined, 708 in Network layer, 75 Routing Information Protocol RIP, 75 rows in databases, 217 Royce, Winston, 237 RPC Remote Procedure Call, 76 RSA Rivest, Shamir, and Adleman encryption, 337–338, 708 RTO recovery time objective, 706 rule-based access controls, 24, 708 running key ciphers, 309–310, 708 running state, 377, 708 S S-HTTP Secure HTTP, 353, 710 SMIME Secure Multipurpose Internet Mail Extensions protocol, 105, 134, 352–353, 710 S-RPC Secure Remote Procedure Call, 77, 104, 710 sabotage, 493 safe computing, 451 safe harbor sites, 590 safeguards, 187 calculating, 192–193 defined, 708 in distributed architecture, 395–396 safety of people, 520–521, 640 in physical security, 640–647 sags, 641, 709 salami attacks, 438, 709 salts for passwords, 496, 709 sampling in auditing, 482, 709 sandbox concept, 214, 268, 709 sanitation of media, 460, 709 SAs security associations, 357, 710 SATAN tool, 487 scalability in symmetric key algorithms, 313 scanning attacks, 279–280, 611, 709 scavenging, 490, 709 schemas, database, 219, 709 Schneier, Bruce, 319, 321 screened hosts, 98–99 screening job candidates, 177–178 script kiddies, 258, 609 scripted access, 23, 709 scripts, logon, 693 SDLC Synchronous Data Link Control protocol defined, 716 polling in, 87 in WANs, 79, 108, 130 search warrants, 594, 614, 709 second-tier attacks, 140–141, 709 secondary evidence, 592, 709 secondary memory, 385–386, 709 secondary storage, 225, 387, 709 Secret classification, 164, 709