FTC (Federal Trade Commission) – IaaS (infrastructure as a service) 469
hard drives
forensic analysis, 262
sectors, bad, 29
zero fill, 48
hardware failure, 64
hash functions, 340
hashed passwords, 114, 273, 306–307, 398
hashing algorithms, 56, 322, 429
H AVA L , 339
headers, removing, 414
hearsay rule, 421
heuristic-based antimalware software, 188,
399, 420
HIDS (host-based intrusion detection
system), 387
hijacking, 186, 196–197, 393, 403
wireless networks, 203
HIPAA (Health Insurance Portability and
Accountability Act), 7, 34, 46, 240, 262,
311, 319, 320, 325, 422, 430, 433, 451
encryption and, 35
hiring
background checks, 253
screening, 25
honeynets, 156, 211, 383, 409, 445
honeypots, 153, 156, 211, 383, 409, 445
hot sites, 88, 386, 440
hotfixes, 383
HSA (Homeland Security Act), 430
HTTP (hypertext transfer protocol)
OSI model and, 90
traffic, 350
humidity values, 73
HVAC system, 75
hybrid authentication, 409
hybrid cloud computing, 362–363
hypervisor, 345, 385
I
IaaS (infrastructure as a service), 53, 63,
169, 214, 237, 264, 338, 342, 390, 410,
420, 434
FTC (Federal Trade Commission), 333
FTP (file transfer protocol), 330, 348
alternatives, 280
versus SFTP, 32
full backups, 158, 448
full disk encryption, 33, 330
full interruption tests, 436, 456
functional flaws, 139
functional requirements, 397
fuzzers, 369, 379
zzuf, 373
fuzzing, 131, 146, 371, 416, 439, 451
generational, 415
intelligent fuzzing, 223
zzuf, 415
G
Gantt charts, 399, 400
gateways, 84, 418
GDPR (General Data Protection Regulation),
2, 334, 335, 446
generational fuzzing, 415
GISRA (Government Information Security
Reform Act), 319
GLBA (Gramm-Leach-Bililey Act), 319, 324,
325, 422
Google
password storage, 118
user authentication, 118
Graham-Denning model, 77, 347
Gramm-Leach-Bliley Act, 442
Grandfather/Father/Son scheme, 384
grant rule, 344
gray box penetration testing, 131, 182, 188,
208, 399, 400, 408, 441, 446
group policy, 332
GSM, 451
H
HAL Systems, 323
hand geometry scanners, 216, 411