C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C-I-A acronym
Caesar, Julius
calendar date standards
California Data Security Act (California SB 1386)
campus area networks
Canada's first national Computer Emergency Response Team
Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)
CanCERT
CANs
capacitance card
CAST
CAST-256, Entrust Technologies, Inc. (represented by Carlisle Adams)
cells in ATM
central office (CO)
CERT Polska
certificates 2nd
challenge and response
Challenge Handshake Authentication Protocol (CHAP)
challenge-response systems
channels
checksum
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
ciphers
     substitution 2nd
     transposition 2nd
     types
ciphertext
circuit
circuit switching
Cisco Certified Security Professional (CCSP)
civil libertarians
classification
cleartext
client-side attacks
     web
client-side scripts
     languages
climate
cloak
CNRS
     Centre National pour la Recherche Scientifique, Ecole Normale Superieure (represented by Serge Vaudenay)
coaxial cable
Code Red virus
codetext
Cohen, Fred
cold sites
ColdFusion
     ColdFusion Markup Language (CFML)
Commercial Communications Security Endorsement Program (CCEP) 2nd
Common Criteria 2nd
Common Criteria Evaluation Assurance Levels (EALs)
Common Criteria Recognition Arrangement (CCRA)
Common Gateway Interface (CGI)
Communications Act of 1934
communications and network security
     active taps
     appropriate technology
     passive taps
     threats
     vulnerabilities
     what makes communication secure
communications integrity
communications security
communications vulnerabilities
compartmentalized information
compromise protection services
CompTIA's Security+
computer crime
Computer Emergency Response Team (CERT)
Computer Fraud and Abuse Act 2nd
Computer Incident Advisory Capability (CIAC)
computer security
     accuracy
     audit logging
     authentication
     availability
     biometric security
     broad definition of
     changes over the years
     confidentiality
     early efforts
         research and modeling
         security systems development
     history
     integrity
     mandates and legislation
         balancing act
         Computer Fraud and Abuse Act
         Computer Security Act of 1987
         recent initiatives
     overview
     secrecy
     standardization
         cryptography
         emanations
     what users can do
Computer Security Act of 1987
Computer Security Evaluation Center (CSC)
computer system security
     data access controls
     security administration
     system access controls
     system administration
     system design
     what makes system secure
Computer Underground Digest
COMSEC (U.S. Communications Security)
confidentiality 2nd 3rd 4th
connection-oriented communications
connectionless communications
cookies
     poisoned
     stolen
Core Wars
corporate raiders
costs of security, analyzing
countermeasures
     communications security
     computer security
     physical security
counties and statistically equivalent entities
Courtney, Robert H., Jr.
crackers
criminals
Critical National Infrastructure (CNI)
cross-site scripting (CSS)
cryptanalysis
cryptogram
cryptographic
     export restrictions
     locks
     modules
     products
cryptography
     standardization
cryptology
CRYPTON
     Future Systems, Inc. (represented by Chae Hoon Lim)




Computer Security Basics
Computer Security Basics
ISBN: 0596006691
EAN: 2147483647
Year: 2004
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net