It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]

backdoors, 242

BackTrack, 272

backup and recovery, 36, 85, 95, 107-108, 229, 260, 288-289

basic service set (BSS), 264

biometric authentication devices, in data center, 92

blade antennas, 272

bootcfg tool, 139, 143

broken authentication, 215-216

BSS (basic service set), 264

BSSID (BSS identifier), 264

budget

for projects, 290

tracking performance against, 65

burglar alarms, 84, 96

business applications, 38

business functions, identifying, 357-358

business threats, assessing, 361-362

financial threats, 361

legal threats, 361-362

overview, 361

regulatory threats, 362

Категории