S
Sandbox, 275, 279 “80, 282 “83
Screened host firewall, 71 “72
Screened subnet firewall, 72 “74
Script-aliased common gateway interface, 305
Scripting language, 275 “77
Secondary authentication, 68
Second-preimage resistant hash function, 91
Secret key cryptography, 92 “96, 103
Secret key digital watermarking, 354
Secret-sharing scheme, 341
Secure channel sign-in , 226 “27
Secure data network system, 125, 143
Secure Electronic Payment Protocol, 261
Secure electronic transaction, 259, 261
Secure hash algorithm 1, 92, 134
Secure Hypertext Transfer Protocol, 153 “54, 387
Secure Internet Programming Group, 279
Secure messaging, 145 “46
Secure sockets layer, 41, 143, 146, 226, 230, 244, 302, 310, 330, 337, 387
architecture, 155 “59
certificates, 175 “78
Handshake Protocol, 161 “67
history, 153 “55
implementations , 169 “71
Record Protocol, 158 “61
security analysis, 167 “69
version 1/version 2, 154
version 3, 154 “55, 171, 172
Secure transaction technology, 261
Secure Web tunneling, 182
Security administrator tool for analyzing networks, 380
Security association, 124, 129 “30, 133, 138 “41
Security association bundle, 130, 138 “39
Security association database, 129
Security engineering, 387
Security-Enhanced Application Protocol, 144
Security gateway. See Firewall
Security Hypertext Transfer Protocol, 144
Security Internet gateway. See Firewall
Security mechanism, 14 “15
Security parameters index, 129
Security policy, 10 “13, 51, 52, 281, 375
Security policy database, 129, 131, 138
Security Protocol identifier, 129
Security scanner, 379 “81
Self-labeling, 367, 369 “70
Self-signature field, 189
Sender anonymity, 320 “21
Sequence number guessing attack, 3, 4
Serial Line Internet Protocol, 118
Server application programming interface, 309
Server configuration, 42 “46
Server hello message, 163 “64, 167
Server key exchange message, 164
Server-side include, 300, 311 “12
Server-side security, 297 “300
Server (site) certificate, 203 “4
Session hijacking attack, 156
Session identity field, 162 “63
Session-unique keying, 130 “31
Simple authentication and security layer, 157
Simple distributed security infrastructure, 188
Simple key management for Internet protocols, 137, 138
Simple Mail Transfer Protocol, 55, 321, 335
Simple Object Access Protocol, 7 “8, 146
Simple Object Access Protocol envelope, 8
Simple public key infrastructure, 188
Single sign-in, 217, 222 “28
Socksified client/stack, 60, 61, 65
Software publisher certificate, 205 “7
Source Internet Protocol address, 54, 55
Source port number, 55, 56
Specific security mechanism, 14 “15
Spoofing attack, 230, 328
Standardization bodies, 187
Standards for interoperable LAN/MAN security, 118
Stateless packet filter, 56 “57, 58
Static packet filtering, 52, 54 “57
Station-to-Station Protocol, 137
Strategic technology protection program, 380
Strong collision resistant hash function, 91
Strong credential sign-in, 227 “28
Symmetric key cryptography. See Secret key cryptography
System administration, 50