Preface |
|
xii | |
Acknowledgments |
|
xiii | |
Introduction |
|
xiv | |
Objective Map: Exam SYO-601 |
|
1 | (2) |
|
Part I Threats, Attacks, and Vulnerabilities |
|
|
|
Chapter 1 Social Engineering Techniques |
|
|
3 | (18) |
|
Social Engineering Methods |
|
|
3 | (2) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
Spam over Instant Messaging (SPIM) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Third-Party Authorization |
|
|
12 | (1) |
|
Contractors/Outside Parties |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Principles (Reasons for Effectiveness) |
|
|
14 | (2) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (4) |
|
|
17 | (2) |
|
|
19 | (2) |
|
Chapter 2 Type of Attack Indicators |
|
|
21 | (18) |
|
|
22 | (6) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Potentially Unwanted Programs |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Remote-Access Trojans (RATs) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (3) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Malicious Universal Serial Bus (USB) Cable |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Adversarial Artificial Intelligence (AI) |
|
|
32 | (1) |
|
Tainted Training Data for Machine Learning (ML) |
|
|
33 | (1) |
|
Security of Machine Learning Algorithms |
|
|
33 | (1) |
|
|
33 | (1) |
|
Cloud-Based vs. On-Premises Attacks |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (4) |
|
|
35 | (3) |
|
|
38 | (1) |
|
Chapter 3 Application Attack Indicators |
|
|
39 | (18) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (2) |
|
Structured Query Language (SQL) |
|
|
41 | (1) |
|
Dynamic-Link Library (DLL) |
|
|
42 | (1) |
|
Lightweight Directory Access Protocol (LDAP) |
|
|
42 | (1) |
|
Extensible Markup Language (XML) |
|
|
43 | (1) |
|
Pointer/Object Dereference |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Time of Check/Time of Use |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
Server-Side Request Forgery |
|
|
48 | (1) |
|
Cross-Site Request Forgery |
|
|
49 | (1) |
|
Application Programming Interface (API) Attacks |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
Secure Sockets Layer (SSL) Stripping |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (5) |
|
|
52 | (2) |
|
|
54 | (3) |
|
Chapter 4 Network Attack Indicators |
|
|
57 | (20) |
|
|
57 | (5) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Radio Frequency Identification (RFID) |
|
|
60 | (1) |
|
Near Field Communication (NFC) |
|
|
61 | (1) |
|
Initialization Vector (IV) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
Address Resolution Protocol (ARP) Poisoning |
|
|
63 | (1) |
|
Media Access Control (MAC) Flooding |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (4) |
|
|
64 | (1) |
|
|
65 | (2) |
|
Universal Resource Locator (URL) Redirection |
|
|
67 | (1) |
|
|
67 | (1) |
|
Distributed Denial-of-Service (DDoS) |
|
|
68 | (4) |
|
|
69 | (2) |
|
|
71 | (1) |
|
Operational Technology (OT) |
|
|
71 | (1) |
|
Malicious Code and Script Execution |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
Visual Basic for Applications (VBA) |
|
|
73 | (1) |
|
|
73 | (4) |
|
|
74 | (2) |
|
|
76 | (1) |
|
Chapter 5 Threat Actors, Vectors, and Intelligence Sources |
|
|
77 | (22) |
|
|
77 | (6) |
|
Advanced Persistent Threats (APTs) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Level of Sophistication/Capability |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (2) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Threat Intelligence Sources |
|
|
86 | (6) |
|
Open Source Intelligence (OSINT) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Public/Private Information Sharing Centers |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
Automated Indicator Sharing (AIS) |
|
|
90 | (1) |
|
Structured Threat Information Expression (STIX) / Trusted Automated Exchange of Intelligence Information (TAXII) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (3) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Requests for Comment (RFCs) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (1) |
|
Adversary Tactics, Techniques, and Procedures (TTPs) |
|
|
95 | (1) |
|
|
95 | (4) |
|
|
96 | (2) |
|
|
98 | (1) |
|
Chapter 6 Vulnerabilities |
|
|
99 | (16) |
|
Cloud-based vs. On-premises Vulnerabilities |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (3) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
103 | (2) |
|
|
105 | (1) |
|
Outsourced Code Development |
|
|
105 | (1) |
|
|
105 | (1) |
|
Improper or Weak Patch Management |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
107 | (3) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (5) |
|
|
111 | (2) |
|
|
113 | (2) |
|
Chapter 7 Security Assessments |
|
|
115 | (14) |
|
|
115 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (4) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
Credentialed vs. Non-Credentialed |
|
|
118 | (1) |
|
Intrusive vs. Non-Intrusive |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Common Vulnerabilities and Exposures (CVE)/ Common Vulnerability Scoring System (CVSS) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Syslog/Security Information and Event Management (SIEM) |
|
|
121 | (2) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
Security Orchestration, Automation, and Response (SOAR) |
|
|
123 | (1) |
|
|
124 | (5) |
|
|
124 | (2) |
|
|
126 | (3) |
|
Chapter 8 Penetration Testing |
|
|
129 | (16) |
|
|
129 | (6) |
|
|
131 | (1) |
|
|
131 | (1) |
|
Partially Known Environment |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
Passive and Active Reconnaissance |
|
|
135 | (2) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (2) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (6) |
|
|
139 | (2) |
|
|
141 | (4) |
|
Part II Architecture and Design |
|
|
|
Chapter 9 Enterprise Security Architecture |
|
|
145 | (14) |
|
|
145 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Standard Naming Conventions |
|
|
146 | (1) |
|
Internet Protocol (IP) Schema |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (3) |
|
Data Loss Prevention (DLP) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
Geographical Considerations |
|
|
151 | (1) |
|
Response and Recovery Controls |
|
|
151 | (1) |
|
Secure Sockets Layer (SSL)/Transport Layer Security (TLS) Inspection |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (4) |
|
|
156 | (1) |
|
|
157 | (2) |
|
Chapter 10 Virtualization and Cloud Security |
|
|
159 | (14) |
|
|
159 | (3) |
|
Infrastructure as a Service (IaaS) |
|
|
160 | (1) |
|
Platform as a Service (PaaS) |
|
|
160 | (1) |
|
Software as a Service (SaaS) |
|
|
160 | (1) |
|
Anything as a Service (XaaS) |
|
|
160 | (1) |
|
Level of Control in the Hosting Models |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Managed Service Provider (MSP) / Managed Security Service Provider (MSSP) |
|
|
162 | (1) |
|
On-Premises vs. Off-Premises |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
Software-Defined Networking (SDN) |
|
|
165 | (1) |
|
Software-Defined Visibility (SDV) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (2) |
|
|
168 | (1) |
|
|
168 | (1) |
|
Virtual Machine (VM) Sprawl Avoidance |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (4) |
|
|
169 | (2) |
|
|
171 | (2) |
|
Chapter 11 Secure Application Development, Deployment, and Automation Concepts |
|
|
173 | (16) |
|
|
173 | (2) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
Provisioning and Deprovisioning |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (4) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Server-Side vs. Client-Side Execution and Validation |
|
|
179 | (1) |
|
|
179 | (1) |
|
Use of Third-Party Libraries and Software Development Kits (SDKs) |
|
|
179 | (1) |
|
|
180 | (1) |
|
Open Web Application Security Project (OWASP) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (2) |
|
Automated Courses of Action |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (5) |
|
|
185 | (2) |
|
|
187 | (2) |
|
Chapter 12 Authentication and Authorization |
|
|
189 | (18) |
|
|
189 | (4) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (2) |
|
Smart Card Authentication |
|
|
193 | (1) |
|
|
193 | (5) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
Multifactor Authentication (MFA) Factors and Attributes |
|
|
198 | (3) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
201 | (1) |
|
Cloud vs. On-premises Requirements |
|
|
202 | (1) |
|
|
202 | (5) |
|
|
202 | (2) |
|
|
204 | (3) |
|
Chapter 13 Cybersecurity Resilience |
|
|
207 | (20) |
|
|
207 | (6) |
|
|
208 | (1) |
|
|
208 | (2) |
|
|
210 | (1) |
|
|
211 | (2) |
|
|
213 | (1) |
|
Storage Area Network (SAN) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (5) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
Network Attached Storage (NAS) |
|
|
217 | (1) |
|
Storage Area Network (SAN) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
Last Known-Good Configuration |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (5) |
|
|
223 | (2) |
|
|
225 | (2) |
|
Chapter 14 Embedded and Specialized Systems |
|
|
227 | (20) |
|
|
227 | (2) |
|
|
228 | (1) |
|
Field Programmable Gate Arrays (FPGAs) |
|
|
228 | (1) |
|
|
228 | (1) |
|
Supervisory Control and Data Acquisition (SCADA) / Industrial Control System (ICS) |
|
|
229 | (2) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (2) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (2) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Heating, Ventilation, Air Conditioning (HVAC) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Multifunction Printers (MFPs) |
|
|
236 | (1) |
|
Real-time Operating Systems (RTOSs) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
Communication Considerations |
|
|
238 | (2) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Subscriber Identity Module (SIM) Cards |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (2) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (5) |
|
|
243 | (2) |
|
|
245 | (2) |
|
Chapter 15 Physical Security Controls |
|
|
247 | (24) |
|
|
247 | (1) |
|
Access Control Vestibules |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
Closed-Circuit Television (CCTV) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Two-Person Integrity/Control |
|
|
253 | (1) |
|
|
253 | (3) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (3) |
|
|
260 | (2) |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Protected Cable Distribution |
|
|
264 | (1) |
|
|
264 | (2) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (4) |
|
|
268 | (2) |
|
|
270 | (1) |
|
Chapter 16 Cryptographic Concepts |
|
|
271 | (24) |
|
General Cryptographic Concepts |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (2) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
Elliptic Curve Cryptography |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
Support for Confidentiality |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
Supporting Authentication |
|
|
286 | (1) |
|
Support for Nonrepudiation |
|
|
286 | (1) |
|
|
286 | (3) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Resource vs. Security Constraints |
|
|
289 | (1) |
|
Weak/Deprecated Algorithms |
|
|
289 | (1) |
|
|
289 | (6) |
|
|
290 | (1) |
|
|
291 | (4) |
|
|
|
Chapter 17 Secure Protocols |
|
|
295 | (12) |
|
|
295 | (6) |
|
Domain Name System Security Extensions (DNSSEC) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Secure/Multipurpose Internet Mail Extensions (S/MIME) |
|
|
296 | (1) |
|
Secure Real-time Transport Protocol (SRTP) |
|
|
297 | (1) |
|
Lightweight Directory Access Protocol over SSL (LDAPS) |
|
|
297 | (1) |
|
File Transfer Protocol, Secure (FTPS) |
|
|
297 | (1) |
|
SSH File Transfer Protocol (SFTP) |
|
|
297 | (1) |
|
Simple Network Management Protocol, Version 3 (SNMPv3) |
|
|
298 | (1) |
|
Hypertext Transfer Protocol over SSL/TLS (HTTPS) |
|
|
298 | (1) |
|
|
298 | (2) |
|
Post Office Protocol (POP) / Internet Message Access Protocol (IMAP) |
|
|
300 | (1) |
|
|
301 | (3) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
Network Address Allocation |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (3) |
|
|
304 | (2) |
|
|
306 | (1) |
|
Chapter 18 Host and Application Security |
|
|
307 | (22) |
|
|
307 | (7) |
|
|
307 | (3) |
|
|
310 | (1) |
|
Endpoint Detection and Response (EDR) |
|
|
311 | (1) |
|
|
311 | (1) |
|
Next-Generation Firewall (NGFW) |
|
|
311 | (1) |
|
Host-based Intrusion Detection System (HIDS) |
|
|
311 | (1) |
|
Host-based Intrusion Prevention System (HIPS) |
|
|
312 | (1) |
|
|
312 | (2) |
|
|
314 | (1) |
|
Boot Security/Unified Extensible Firmware Interface (UEFI) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (4) |
|
|
316 | (1) |
|
|
317 | (1) |
|
Hypertext Transfer Protocol (HTTP) Headers |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (4) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Self-Encrypting Drive (SED)/Full Disk Encryption (FDE) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
Trusted Platform Module (TPM) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (4) |
|
|
326 | (2) |
|
|
328 | (1) |
|
Chapter 19 Secure Network Design |
|
|
329 | (34) |
|
|
329 | (2) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (5) |
|
Virtual Local Area Network (VLAN) |
|
|
331 | (2) |
|
Screened Subnet (Previously Known as Demilitarized Zone) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
Virtual Private Network (VPN) |
|
|
336 | (4) |
|
|
337 | (1) |
|
Split Tunnel vs. Full Tunnel |
|
|
337 | (1) |
|
Remote Access vs. Site-to-Site |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
Layer 2 Tunneling Protocol (L2TP) |
|
|
339 | (1) |
|
|
340 | (1) |
|
Network Access Control (NAC) |
|
|
340 | (2) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (3) |
|
Broadcast Storm Prevention |
|
|
343 | (1) |
|
Bridge Protocol Data Unit (BPDU) Guard |
|
|
343 | (1) |
|
|
343 | (1) |
|
Dynamic Host Configuration Protocol (DHCP) Snooping |
|
|
344 | (1) |
|
Media Access Control (MAC) Filtering |
|
|
344 | (1) |
|
|
345 | (10) |
|
|
345 | (1) |
|
|
345 | (1) |
|
Network-based Intrusion Detection System (NIDS)/Network-based Intrusion Prevention System (NIPS) |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (5) |
|
Access Control List (ACL) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
Port Spanning/Port Mirroring |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
358 | (5) |
|
|
359 | (1) |
|
|
360 | (3) |
|
Chapter 20 Wireless Security |
|
|
363 | (14) |
|
|
363 | (3) |
|
Wi-Fi Protected Access 2 (WPA2) |
|
|
364 | (1) |
|
Wi-Fi Protected Access 3 (WPA3) |
|
|
365 | (1) |
|
Counter Mode/CBC-MAC Protocol (CCMP) |
|
|
365 | (1) |
|
Simultaneous Authentication of Equals (SAE) |
|
|
366 | (1) |
|
|
366 | (2) |
|
Extensible Authentication Protocol (EAP) |
|
|
366 | (1) |
|
Protected Extensible Authentication Protocol (PEAP) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
Remote Authentication Dial-in User Service (RADIUS) Federation |
|
|
368 | (1) |
|
|
368 | (2) |
|
Pre-shared Key (PSK) vs. Enterprise vs. Open |
|
|
368 | (1) |
|
Wi-Fi Protected Setup (WPS) |
|
|
369 | (1) |
|
|
369 | (1) |
|
Installation Considerations |
|
|
370 | (3) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
Wireless Access Point (WAP) Placement |
|
|
372 | (1) |
|
Controller and Access Point Security |
|
|
372 | (1) |
|
|
373 | (4) |
|
|
373 | (2) |
|
|
375 | (2) |
|
Chapter 21 Secure Mobile Solutions |
|
|
377 | (22) |
|
Connection Methods and Receivers |
|
|
377 | (5) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Global Positioning System (GPS) |
|
|
381 | (1) |
|
|
381 | (1) |
|
Mobile Device Management (MDM) |
|
|
382 | (5) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Push Notification Services |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
Context-Aware Authentication |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (2) |
|
MicroSD Hardware Security Module (HSM) |
|
|
388 | (1) |
|
MDM/Unified Endpoint Management (UEM) |
|
|
388 | (1) |
|
Mobile Application Management (MAM) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Enforcement and Monitoring |
|
|
389 | (4) |
|
Third-Party Application Stores |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
SMS/Multimedia Message Service (MMS)/Rich Communication Services (RCS) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (2) |
|
Bring Your Own Device (BYOD) |
|
|
394 | (1) |
|
Corporate-Owned, Personally Enabled (COPE) |
|
|
394 | (1) |
|
Choose Your Own Device (CYOD) |
|
|
394 | (1) |
|
|
394 | (1) |
|
Virtual Desktop Infrastructure (VDI) |
|
|
394 | (1) |
|
|
395 | (4) |
|
|
395 | (2) |
|
|
397 | (2) |
|
Chapter 22 Implementing Cloud Security |
|
|
399 | (14) |
|
|
399 | (6) |
|
High Availability Across Zones |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (2) |
|
|
405 | (3) |
|
|
405 | (1) |
|
|
406 | (1) |
|
Next-Generation Secure Web Gateway (SWG) |
|
|
406 | (1) |
|
Firewall Considerations in a Cloud Environment |
|
|
406 | (2) |
|
Cloud-Native Controls vs. Third-Party Solutions |
|
|
408 | (1) |
|
|
408 | (5) |
|
|
408 | (2) |
|
|
410 | (3) |
|
Chapter 23 Identity and Account Management Controls |
|
|
413 | (18) |
|
|
413 | (3) |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (1) |
|
|
414 | (2) |
|
|
416 | (1) |
|
|
416 | (1) |
|
|
416 | (3) |
|
|
416 | (1) |
|
Shared and Generic Accounts/Credentials |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (7) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Impossible Travel Time/Risky Login |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (5) |
|
|
427 | (2) |
|
|
429 | (2) |
|
Chapter 24 Implement Authentication and Authorization |
|
|
431 | (20) |
|
Authentication Management |
|
|
431 | (2) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
Knowledge-based Authentication |
|
|
433 | (1) |
|
|
433 | (6) |
|
|
433 | (1) |
|
Challenge-Handshake Authentication Protocol (CHAP) |
|
|
434 | (1) |
|
Password Authentication Protocol (PAP) |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
Security Assertion Markup Language (SAML) |
|
|
436 | (1) |
|
Terminal Access Controller Access Control System Plus (TACACS+) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (7) |
|
Attribute-Based Access Control (ABAC) |
|
|
440 | (1) |
|
Role-Based Access Control |
|
|
441 | (1) |
|
Rule-Based Access Control |
|
|
441 | (1) |
|
|
441 | (1) |
|
Discretionary Access Control (DAC) |
|
|
442 | (1) |
|
|
443 | (1) |
|
Privileged Access Management |
|
|
443 | (1) |
|
|
443 | (3) |
|
|
446 | (5) |
|
|
446 | (2) |
|
|
448 | (3) |
|
Chapter 25 Public Key Infrastructure |
|
|
451 | (30) |
|
Public Key Infrastructure (PKI) |
|
|
451 | (10) |
|
|
454 | (1) |
|
Certificate Authority (CA) |
|
|
454 | (1) |
|
|
455 | (1) |
|
Registration Authority (RA) |
|
|
455 | (1) |
|
Certificate Revocation List (CRL) |
|
|
456 | (1) |
|
|
457 | (2) |
|
Online Certificate Status Protocol (OCSP) |
|
|
459 | (1) |
|
Certificate Signing Request (CSR) |
|
|
459 | (1) |
|
|
460 | (1) |
|
Subject Alternative Name (SAN) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (5) |
|
|
462 | (1) |
|
Subject Alternative NameSAN |
|
|
463 | (1) |
|
Code-Signing Certificates |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (2) |
|
|
466 | (1) |
|
Distinguished Encoding Rules (DER) |
|
|
466 | (1) |
|
Privacy-Enhanced Mail (PEM) |
|
|
467 | (1) |
|
Personal Information Exchange (PFX) |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
468 | (7) |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
469 | (5) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
475 | (6) |
|
|
476 | (2) |
|
|
478 | (3) |
|
Part IV Operations and Incident Response |
|
|
|
Chapter 26 Tools/Assess Organizational Security |
|
|
481 | (22) |
|
Network Reconnaissance and Discovery |
|
|
481 | (10) |
|
|
482 | (1) |
|
|
482 | (2) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
491 | (2) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
Shell and Script Environments |
|
|
493 | (2) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
Packet Capture and Replay |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
496 | (2) |
|
|
496 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
499 | (4) |
|
|
499 | (2) |
|
|
501 | (2) |
|
Chapter 27 Incident Response Policies, Processes, and Procedures |
|
|
503 | (16) |
|
|
503 | (1) |
|
Incident Response Process |
|
|
504 | (3) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (2) |
|
|
508 | (1) |
|
The Diamond Model of Intrusion Analysis |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
512 | (1) |
|
Continuity of Operation Planning (COOP) |
|
|
513 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
515 | (4) |
|
|
515 | (2) |
|
|
517 | (2) |
|
Chapter 28 Investigations |
|
|
519 | (16) |
|
Vulnerability Scan Output |
|
|
519 | (1) |
|
|
519 | (2) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (3) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
Session Initiation Protocol (SIP) Traffic |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (4) |
|
|
526 | (2) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (4) |
|
|
531 | (2) |
|
|
533 | (2) |
|
Chapter 29 Mitigation Techniques and Controls |
|
|
535 | (12) |
|
Reconfigure Endpoint Security Solutions |
|
|
535 | (2) |
|
Application Approved List |
|
|
536 | (1) |
|
Application Blocklist/Deny List |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
537 | (3) |
|
|
537 | (1) |
|
|
538 | (1) |
|
|
538 | (1) |
|
Content Filter/URL Filter |
|
|
539 | (1) |
|
Update or Revoke Certificates |
|
|
539 | (1) |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
540 | (2) |
|
Secure Orchestration, Automation, and Response (SOAR) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
542 | (1) |
|
|
543 | (4) |
|
|
543 | (2) |
|
|
545 | (2) |
|
Chapter 30 Digital Forensics |
|
|
547 | (24) |
|
|
547 | (7) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
Timelines of Sequence of Events |
|
|
551 | (2) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
554 | (4) |
|
|
555 | (1) |
|
|
556 | (1) |
|
Random-Access Memory (RAM) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
|
558 | (1) |
|
|
559 | (1) |
|
Data Breach Notification Laws |
|
|
559 | (1) |
|
|
559 | (2) |
|
|
559 | (1) |
|
|
560 | (1) |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
Strategic Intelligence/Counterintelligence |
|
|
563 | (1) |
|
|
563 | (8) |
|
|
564 | (2) |
|
|
566 | (5) |
|
Part V Governance, Risk, and Compliance |
|
|
|
Chapter 31 Security Controls |
|
|
571 | (8) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (2) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
575 | (4) |
|
|
575 | (2) |
|
|
577 | (2) |
|
Chapter 32 Regulations, Standards, and Frameworks |
|
|
579 | (16) |
|
Regulations, Standards, and Legislation |
|
|
579 | (6) |
|
General Data Protection Regulation (GDPR) |
|
|
580 | (1) |
|
National, Territory, or State Laws |
|
|
581 | (2) |
|
Payment Card Industry Data Security Standard (PCI DSS) |
|
|
583 | (2) |
|
|
585 | (3) |
|
Center for Internet Security (CIS) |
|
|
585 | (1) |
|
National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)/Cybersecurity Framework (CSF) |
|
|
585 | (1) |
|
International Organization for Standardization (ISO) 27001/27002/27701/31000 |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
587 | (1) |
|
Benchmarks and Secure Configuration Guides |
|
|
588 | (2) |
|
Platform/Vendor-Specific Guides |
|
|
588 | (2) |
|
|
590 | (5) |
|
|
590 | (2) |
|
|
592 | (3) |
|
Chapter 33 Organizational Policies |
|
|
595 | (18) |
|
|
595 | (7) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
597 | (1) |
|
|
598 | (1) |
|
|
598 | (1) |
|
|
598 | (1) |
|
Nondisclosure Agreement (NDA) |
|
|
599 | (1) |
|
|
599 | (1) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
600 | (2) |
|
Diversity of Training Techniques |
|
|
602 | (1) |
|
Third-Party Risk Management |
|
|
602 | (3) |
|
|
602 | (1) |
|
|
602 | (1) |
|
|
603 | (1) |
|
Service Level Agreement (SLA) |
|
|
603 | (1) |
|
Memorandum of Understanding (MOU) |
|
|
603 | (1) |
|
Measurement Systems Analysis (MSA) |
|
|
604 | (1) |
|
Business Partnership Agreement (BPA) |
|
|
604 | (1) |
|
|
604 | (1) |
|
End of Service Life (EOSL) |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
605 | (1) |
|
|
605 | (1) |
|
|
605 | (1) |
|
|
606 | (1) |
|
|
606 | (1) |
|
|
606 | (1) |
|
|
607 | (1) |
|
|
607 | (1) |
|
|
607 | (1) |
|
Administrator/Root Accounts |
|
|
607 | (1) |
|
|
607 | (2) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (4) |
|
|
609 | (3) |
|
|
612 | (1) |
|
Chapter 34 Risk Management |
|
|
613 | (20) |
|
|
613 | (2) |
|
|
613 | (1) |
|
|
613 | (1) |
|
|
614 | (1) |
|
|
614 | (1) |
|
|
614 | (1) |
|
Software Compliance/Licensing |
|
|
615 | (1) |
|
Risk Management Strategies |
|
|
615 | (2) |
|
|
616 | (1) |
|
|
616 | (1) |
|
|
616 | (1) |
|
|
616 | (1) |
|
|
617 | (7) |
|
|
617 | (1) |
|
|
617 | (1) |
|
|
618 | (1) |
|
Risk Control Self-Assessment |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
619 | (1) |
|
Regulations That Affect Risk Posture |
|
|
619 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
Single-Loss Expectancy (SLE) |
|
|
623 | (1) |
|
Annualized Loss Expectancy (ALE) |
|
|
623 | (1) |
|
Annualized Rate of Occurrence (ARO) |
|
|
623 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
625 | (3) |
|
Recovery Time Objective (RTO) |
|
|
625 | (1) |
|
Recovery Point Objective (RPO) |
|
|
625 | (1) |
|
Mean Time to Repair (MTTR) |
|
|
626 | (1) |
|
Mean Time Between Failures (MTBF) |
|
|
626 | (1) |
|
Functional Recovery Plans |
|
|
627 | (1) |
|
|
627 | (1) |
|
Disaster Recovery Plan (DRP) |
|
|
627 | (1) |
|
Mission-Essential Functions |
|
|
627 | (1) |
|
Identification of Critical Systems |
|
|
628 | (1) |
|
|
628 | (1) |
|
|
628 | (5) |
|
|
629 | (2) |
|
|
631 | (2) |
|
|
633 | (18) |
|
Organizational Consequences of Privacy Breaches |
|
|
633 | (2) |
|
|
634 | (1) |
|
|
634 | (1) |
|
|
634 | (1) |
|
|
634 | (1) |
|
Notifications of Breaches |
|
|
635 | (1) |
|
|
635 | (1) |
|
Public Notifications and Disclosures |
|
|
635 | (1) |
|
|
635 | (4) |
|
|
636 | (2) |
|
Personally Identifiable Information (PII) |
|
|
638 | (1) |
|
Privacy-Enhancing Technologies |
|
|
639 | (2) |
|
|
640 | (1) |
|
|
640 | (1) |
|
|
640 | (1) |
|
|
641 | (1) |
|
|
641 | (1) |
|
Roles and Responsibilities |
|
|
641 | (2) |
|
|
641 | (1) |
|
|
642 | (1) |
|
|
642 | (1) |
|
|
642 | (1) |
|
Data Privacy Officer (DPO) |
|
|
643 | (1) |
|
|
643 | (1) |
|
|
643 | (1) |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
645 | (6) |
|
|
646 | (2) |
|
|
648 | (3) |
|
Part VI Appendixes and Glossary |
|
|
|
Appendix A OSI Model and Internet Protocols |
|
|
651 | (10) |
|
Appendix B About the Online Content |
|
|
661 | (4) |
Glossary |
|
665 | (38) |
Index |
|
703 | |