Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] C-I-A acronym Caesar, Julius calendar date standards California Data Security Act (California SB 1386) campus area networks Canada's first national Computer Emergency Response Team Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) CanCERT CANs capacitance card CAST CAST-256, Entrust Technologies, Inc. (represented by Carlisle Adams) cells in ATM central office (CO) CERT Polska certificates 2nd challenge and response Challenge Handshake Authentication Protocol (CHAP) challenge-response systems channels checksum Cipher Block Chaining (CBC) Cipher Feedback (CFB) ciphers substitution 2nd transposition 2nd types ciphertext circuit circuit switching Cisco Certified Security Professional (CCSP) civil libertarians classification cleartext client-side attacks web client-side scripts languages climate cloak CNRS Centre National pour la Recherche Scientifique, Ecole Normale Superieure (represented by Serge Vaudenay) coaxial cable Code Red virus codetext Cohen, Fred cold sites ColdFusion ColdFusion Markup Language (CFML) Commercial Communications Security Endorsement Program (CCEP) 2nd Common Criteria 2nd Common Criteria Evaluation Assurance Levels (EALs) Common Criteria Recognition Arrangement (CCRA) Common Gateway Interface (CGI) Communications Act of 1934 communications and network security active taps appropriate technology passive taps threats vulnerabilities what makes communication secure communications integrity communications security communications vulnerabilities compartmentalized information compromise protection services CompTIA's Security+ computer crime Computer Emergency Response Team (CERT) Computer Fraud and Abuse Act 2nd Computer Incident Advisory Capability (CIAC) computer security accuracy audit logging authentication availability biometric security broad definition of changes over the years confidentiality early efforts research and modeling security systems development history integrity mandates and legislation balancing act Computer Fraud and Abuse Act Computer Security Act of 1987 recent initiatives overview secrecy standardization cryptography emanations what users can do Computer Security Act of 1987 Computer Security Evaluation Center (CSC) computer system security data access controls security administration system access controls system administration system design what makes system secure Computer Underground Digest COMSEC (U.S. Communications Security) confidentiality 2nd 3rd 4th connection-oriented communications connectionless communications cookies poisoned stolen Core Wars corporate raiders costs of security, analyzing countermeasures communications security computer security physical security counties and statistically equivalent entities Courtney, Robert H., Jr. crackers criminals Critical National Infrastructure (CNI) cross-site scripting (CSS) cryptanalysis cryptogram cryptographic export restrictions locks modules products cryptography standardization cryptology CRYPTON Future Systems, Inc. (represented by Chae Hoon Lim) |