risk acceptance strategy – security clearance 479
SAINT, 221
salt, 284, 340, 439, 444, 454
SAML (Security Assertion Markup
Language), 358, 409, 414, 425,
427, 43 0
eavesdropping, 113
integration, 112
sampling, 172, 305, 391, 408, 453
sandbox, 54, 339, 385, 390
sanitization, 38, 41, 291, 329, 334, 407, 425,
446
certificate, 42
SSD (solid-state drive), 46
SASL (Simple Authentication and Security
Layer), 368
SBU (Sensitive But Unclassified)
classification, 452
SCA (Security Controls Assessment), 26, 327
SCADA systems, 85, 339
SCADA (Supervisory Control and Data
Acquisition) systems, 346
scans, 169
descriptions, 141
SCAP (Security Content Automation
Protocol), 139, 145, 416
SCCM (System Center Configuration
Manager), 392
SCE (Script Check Engine), 374
scheduling processes, 61, 272
scoping, 330, 335, 423
SCP (Secure Copy), 442
screen scraping, 85, 349
scripted attacks, 373
SDLC approach, 177, 225, 308, 393, 454
design review, 181
SDN (software-defined networking), 419
sectors, 29
security and risk management, answers,
318 –327
security architecture and engineering,
answers, 338–347
security assessment and testing, answers,
369–381
security awareness training, 5
security clearance, U.S. government, 62
risk acceptance strategy, 244, 324, 424,
436
risk assessment, 25, 136, 206, 324
asset values, 13
flood, 164
impact, 222
matrix, 18
natural disaster, 18, 21, 23
natural disasters, 19
probability, 222
qualitative, matrix, 18
quantitative, 2
risk management, 323
framework, 14
organizational, 260
strategies, 6
risk mitigation strategies, 208, 320
risk transference, 439, 454
risk-based identity proofing, 408
rogue access point attacks, 2, 318
role-based access controls, 109, 415
root cause analysis, 441
root security issues, 198
routers, 84, 418
NAT, 93
routing protocols, 84
RPO (recovery point objective), 386, 412,
418
RSA (Rivest, Shamir, Adleman), 339, 428,
437
RST flags, 80, 348
RTOs (recovery time objectives), 324, 386,
412 , 418, 453
Ruby code, 199
Rule-BAC, 364
rule-based access controls, 109
rules, firewalls, 94
RUM (real user monitoring), 372
S
SaaS (software as a service), 53, 73, 237,
338, 344, 383, 420
firewall controls, 68