only for RuBoard - do not distribute or recompile |
Web Security, Privacy & Commerce, 2nd Edition
[Symbol][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][X][Y][Z]
PP3P (Platform for Privacy Preferences Project) , 2nd
base data elements
compact policies , 2nd
deploying
enabled web site, example
HTTP responses, P3P headers
Internet Explorer, support by
policy reference files
well-known locations
privacy policy, creating
PrivacySealExample program
packets
ACK packets
acknowledgment or retransmission
byte count
displaying text
DNS requests
size
SYN packets
SYN ACK packets
packet sniffers
Ethernet interfaces, and
packet sniffing
packet switching
packet-filtering firewalls , 2nd
paper
shredders for
throwing out
parity RAID systems
partitions
backup by
root
passwords , 2nd , 3rd
bad passwords, characteristics
choosing
classes, bases, and rotation
good passwords, characteristics
hit lists of
ISPs, requirements for
management, multiple passwords
nonreusable
password files, setting up
password keepers
password sniffers
protocols, secure against
sharing of
spoofing requests for
theft of
writing down
patches
patents
patents, cryptographic systems
PCT (Private Communications Technology) , 2nd
peering agreements
PEM certification format, example
performance
C programs
monitoring resources
Perl programming language
scripts, filtering
system function
tainting
PERL.EXE and the cgi-bin directory
personal certificates
personal information
ISPs, available to
See : PII personally identifiable informationpersonnel, security aspects of
PGP (Pretty Good Privacy) , 2nd
digital certificates, and
document authentication
DSA algorithm, and
fraudulent keys
key certification
key-pair generation
keys, certification
public keys and digital certificates
signatures
certification
software signature
phf script
phishing (identity theft scams)
phone charge scams
physical security
access control
of backups
plan
physical tokens
PICS (Platform for Internet Content Selection) , 2nd
HTTP label requests
label specification
MPAA movie-rating example
name/value pairs
rating services, label requests from
RFC 822 header, document labeling with
PII (personally identifiable information) , 2nd
ping
ping of death
piracy of software , 2nd
PKI (public key infrastructure) , 2nd
barriers to development
PKZIP virus
plaintext , 2nd
See : PICS Platform for Internet Content Selection
See : P3P Platform for Privacy Preferences Project , 2ndplug-ins , 2nd
history
installation
Internet Explorer
Netscape plug-in security warning
security aspects
security concerns
Polaroid Corporation, identification products
policy reference files , 2nd
well-known locations
policy, security
pornography and the Internet
child pornography
filtering software , 2nd
portmap service
portrayal of information in false light
ports
SSL on TCP IP
updating
POSIX specification, system calls
Postel, Jon
power surges , 2nd , 3rd
PPP (Point-to-Point Protocol)
preventing theft
Princton University Secure Internet Programming group
print through process
printer spoolers, security risks
printers, security risks
privacy , 2nd
cookies, and
digital cash systems
digital certificates, and
downloaded software, from
email and
JavaScript and
protecting
torts
violations, refer link field
web browser extensions, from
Privacy Act of 1974
Privacy Foundation
web bugs, guidelines for use
privacy policies
P3P, deploying
privacy protections
American business, self regulation
Canada
Code of Fair Information Practices
COPPA
early US legislation
European legislation
European Union
Fair Credit Reporting Act
Internet Explorer 6.0, built into
OECD guidelines
seal programs
privacy-protecting technologies
PrivacySealExample Program
Private Communications Technology (PCT) , 2nd
private information
private keys
generation and storage
management
privileges, CGI scripts and
profiles
programmed threats
See : bugsprogrammingerrors
guidelines for
references for
programs that spend money
Promo Line, Inc.
proprietary encryption algorithms
protocols
proxies
proxy firewalls
proxy servers , 2nd
public key cryptography
algorithms, attacks on
authentication using SSH
challenge-response
digital certificates
Hushmail
key certification
Web of Trust
patents
PGP, key generation with
private key management
public key systems
computational expense
real-world examples
replay attacks, preventing
public keys , 2nd
cryptographic algorithms
identification, using for
PGP
smart cards, and
public libraries and anonymous browsing
public terminals, security risks
public/private key pairs for web servers
publicity
punch-down blocks vs. RJ11 plugs
purchasing over Internet
only for RuBoard - do not distribute or recompile |