| < Day Day Up > |
|
IBM (See International Business Machines)
ICEpak, 597
ICMP Traceback Messages, 406
IDCAMS delete/define control statements, 113
iDefense, 352
Identicator Technology, 397
identification/information fraud Title 18, Section 1028 of the U.S. Code, 541
identify data storage anomalies, 39, 83
Identify-Preserve-Analyze-Report model, 629
identity fraud, 532–35
IDS appliance, 585–87
IDS development, 585
IDS software vendors, 587
IDS switches, 61
IEEE Transactions on Information Theory, 561
IFC, 637
Igor Yarimaka, 570
IIS 4 holes, 354
Ikhwan al Muslimoon, 326
Illinois Institute of Technology’s Research Institute (IITRI) review, 449–451
image back-ups, 103
Image Copy, 112
image verification and authentication action agenda, 178–179
image verification and authentication conclusions, 176–78
IMAP (143), 592
IMDUMP, 145
Imperial College, 327
IMS Command utility, 113
IMS Database Change Accumulation utility, 112
IMS Database Recovery utility, 112
IMS Recovery Control (RECON), 111–12, 117
Inactive Account Scanner, 595
incident coordinator, 156
incident-handling procedures, 156
incident reporting, 228–29
Incident Response Policy, 156
incremental back-ups, 101–02
Index Rebuild function, 114
India, 261, 263–64, 271, 312, 418
India’s Congress Party, 312
India’s National Information Infrastructure- Defensive group, 261
indications and warnings (I and W) system, 311
Indonesian Embassy, 349
InfoGlide Corporation, 245
Information America, 531
information and communication technologies (ICTs), 305–07
Information Directorate, 32–33
information extraction (IE), 499
information flows, 439
Information Management System (IMS), 110–11
information peace-keeping (IP), 385–86
information relevance examples, 493–94
information teams, 200–01
Information Technology Association of America, 247, 406
Information Technology Information Sharing and Analysis Center (IT-ISAC), 406
information technology policy (ITS), 58
information technology systems (ITS), 286, 299
information warfare (IW) planning exercises, 394–95
information warfare defense unit, 261
InfoSec certification, 77–78
info-weapons arsenal, 426–27
InfraGard, 63, 272–73
INMARSAT satellite telephone, 371
insider attacks, 56, 204, 595
insurance companies, 15, 70–71
Insurance Information Institute, 523
insurer-certified security firm, 524
integrated development environment (IDE)119
Intel cybersecurity, 247
Intel™-based computer systems, 36
intelligent forensic filter, 44
intended performance analysis, 264
interactive visualization interface, 220–21
internal auditor education, 174
internal audits, 38
internal computer modification, 515
internal events, 56
Internal Revenue Service’s Criminal Investigation Division, 36
International Association of Computer Investigation Specialists (IACIS), 35, 192, 578
International Business Machines (IBM)
3590 drive, 116
Almaden Research Center, 461
Database Image Copy utility, 112
future applications, 463
Hewlett-Packard, 247, 463, 524
nano team, 462
IBM's pervasive computing division, 470
IMS Database Change Accumulation utility, 112
IMS Recovery Control (RECON), 111–12, 117
Information Management System (IMS), 110–11
magnetic materials creation, 462
Microsoft, 335
molecular computers, 463
nanomushrooms, 463
nano team, 462
pervasive computing division, 470
polymer form,s 463
Samuel Stupp, 463
self-assembling entities, 463
silicon fingers, 459
UCLA, 463
International Data Encryption Algorithm (IDEA), 559
International Hi-Tech Crime and Forensics Conference (IHCFC) of October 1999, 227–28
international laws violations, 518–19
international neo-Nazi network, 330
International Organization on Computer Evidence (IOCE), 227
international security environment, 382–83
international societal insulation, 253
internet abuse identification and detection, 45, 85
Internet attack planning, 325, 373
Internet Cafés, 22
Internet content identification, 408
Internet Control Message Protocol (ICMP), 193
Internet Defense Summit, 334–35
Internet Engineering Task Force, 406
Internet Explorer, 166, 488–89, 582
Internet forum, 306
Internet gateway, 239
Internet image copying, 490
Internet IW monitoring firms, 408
Internet-related investigations, 83, 148
Internet Relay Chat (IRC), 405
Internet security audit, 635
Internet security firm 2XS Ltd, 355
Internet Security Systems (ISS), 60, 65–66, 247, 585, 590, 597
Internet self-regulation, 318
Internet systems isolation, 299
Internetwide cooperation, 405–07
intoxicant function, 253
Intrusion.com, 586
intrusion detection services, 65
intrusion detection software, 585
Intrusion Detection Systems (IDS), 59–60, 219–20, 293–94
intrusion response, 228
Iomega Zip disks, 209–11
iPayment Technologies Inc., 522
IP sessions, 221
IP spoofing, 406
IP-to-MAC conversions, 611
IPv4, 501
IPv6, 501
IRA, 317
Iran, 253, 261
Iraq, 261, 293
Iraqi air attacks, 293
Iraqi air defense system, 293
Iraqi C2 system, 293
Iraqi OODA loop, 293
Iridium LLC, 434
Isaac Asimov, 270
Islamic Association for Palestine, 328
Islamic Liberation Army (ILA), 427
Islamic Liberation Party, 327–28
Islamic Movement of Uzbekistan, 359
Islamist diaspora, 307
Islamists, 329, 307, 370
ISP security
Ameritech, 398
AT&T, 398
Boston ISP Breakaway, 399
CLD Consulting Engineers Inc., 398–99
Computer Security Institute, 46, 69, 399, 569
CTC Communications, 398–99
EarthLink, 398
Exodus Communications, 66–67, 398
Gartner Group ISP report, 401
ISP’s security guidelines, 394, 398
network inspections, 399
Policy Enforcement Group, 399
PSINet, 398
San Francisco FBI Computer Intrusion Squad, 399
security demands, 398
security guidelines, 394, 398
service level agreement (SLA), 399–400
Visa International, 335, 401
Israeli Defense Forces, 262
Israeli Foreign Ministry, 353
Israeli Internet infrastructure destruction plan, 355
Israeli Internet Underground, 354–55
Israeli ISP NetVision, 354
Israeli Parliament (the Knesset), 262
Israeli-Palestinian cyberwar, 262
Israel’s cyberwar seminar, 262–64
IT system protection directive, 589
IW and democracy, 519–20
IW arsenal and tactics of private corporations action agenda, 420–22
IW arsenal and tactics of private corporations conclusions, 420–22
IW arsenal and tactics of terrorists and rogues action agenda, 377–78
IW arsenal and tactics of terrorists and rogues conclusions, 375–377
IW arsenal and tactics of the military action agenda, 321–322
IW arsenal and tactics of the military conclusions, 320–21
IW arsenal of the future action agenda, 464–67
IW arsenal of the future conclusions, 464
IW civilian casualties action agenda, 550–51
IW civilian casualties conclusions, 548–49
IW-D Oversight Office, 310–12
IW response techniques, 517–18
Izz al-Din Al-Kassam Brigades, 328
| < Day Day Up > |
|