Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] access cards, types of access controls ACLs data discretionary discretionary access control (DAC) ownership self/group/public controls in practice mandatory mandatory access control (MAC) 2nd access decisions data import and export passwords role-based access control (RBAC) 2nd system why use access decisions access points hardening rogue accessibility accountability 2nd accuracy accuracy of information Active Directory active electronic card Active Server Pages active taps ActiveX malicious controls ad hoc infrastructure Address Resolution Protocol (ARP) Adleman, Leonard administrative security analyzing costs and risks employees, setting security rules for overall planning and administration planning for disaster training users Advanced Encryption Standard (AES) 2nd 3rd development effort how it works Advanced Encryption System (AES) protocol Advanced Research Projects Agency (ARPA) algorithms, government American National Standards Institute (ANSI) amplitude amplitude modulation (AM) Anderson, James P. ANSI X3.105 ANSI X3.106 ANSI X3.92 antenna gain antivirus programs AppleTalk applets malicious application traffic arbitrated ARNES (Academic and Research Network of Slovenia) ARPANET assurance life-cycle 2nd operational asymmetric key asynchronous transfer mode (ATM) ATMs Atomic Energy Act of 1946 audit logging audit, security auditing AusCERT (Australian CERT) authentication 2nd 3rd 4th 5th 6th 7th multifactor mutual per-session server (AS) two-factor authenticator authenticity authorization 2nd access models Bell-LaPadula model Biba model 2nd categories or compartments classification sensitivity labels Automated Password Generator (APG) availability availability of networks |