T



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

TACACS
tag abuse
Tan Book
taps
TCSEC
TEA
telephone connections
TEMPEST 2nd 3rd
     Endorsement Programs (TEP)
     Faraday screen
     Industrial TEMPEST Program
     initial standards
     NACSEM 5100
     Optical
     Products Program
     program overview
     security, containment approach
     source suppression
     standards
     Test Services Program
     Zoned Equipment Program
Temporal Key Integrity Protocol (TKIP) 2nd
terminal
Terminal Access Controller Access Control System (TACACS)
terrorists
test documentation requirement
testing equipment
Thompson, Ken
threats
     countermeasures
     insiders and outsiders
     intentional and unintentional
     natural
     physical
     vulnerabilities
tickets 2nd
tiger teams
time bombs
time-to-live (TTL)
tokens 2nd 3rd
     active
topology
traffic analysis
training users
tranquility property
Transmission Control Protocol/Internet Protocol (TCP/IP)
Transport Control Protocol (TCP)
     attacks
transposition ciphers 2nd
trap door
Trivial File Transfer Protocol (TFTP)
Trojan horses 2nd 3rd
     bombs
trunk, communications
Trusted Computer System Evaluation Criteria (TCSEC)
Trusted Database Management System Interpretation (TDI) (Lavender Book)
trusted distribution
trusted facility management
Trusted Facility Manual (TFM)
Trusted Network Interpretation (TNI) (Red Book)
trusted recovery
trusted system
tunneling
Turing, Alan
twisted pair cable
two key
two-factor authentication
TWOFISH




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net