Chapter 18 – Managing Risk
- Acceptable Group Policy
- Aircrack-ng
- Approval Process
- Archive
- Backup
- Business Continuity Plan (BCP)
- Chain of custody
- Change management
- Change management team
- Change request
- Cold site
- Computer forensics
- Contingency plan
- Disaster recovery
- Documentation
- Electronic discovery
- Electrostatic discharge (ESD)
- Exit plan
- Fail closed
- Fail open
- First responder
- Forensics report
- Ground loop
- Heating, ventilation, and air conditioning (HVAC)
- High availability (HA)
- Hot site
- Incident
- Incident response
- Legal hold
- Maintenance window
- Material safety data sheet (MSDS)
- Memorandum of understanding (MOU)
- Metasploit
- Microsoft baseline security analyzer (MBSA)
- Multi-source agreement (MSA)
- Nessus
- Network access policy
- Nmap
- Penetration testing (PENTEST)
- Recovery point objective (RPO)
- Recovery time objective (RTO)
- Risk management
- Security policy
- Service level agreement (SLA)
- Single point of failure
- Statement of work (SOW)
- Succession planning
- Virtual IP
- Vulnerability management
- Vulnerability scanne
- Warm site