B



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

A1, TCSEC class 2nd
Acceptance testing
Access acceptability, databases
Access control
     databases 2nd
     e-mail
     file protection
         all-none
         group
         individual permissions
         per-object
         per-user
         persistent permissions
         SUID (set userid)
         temporary acquired permissions
     memory and address protection
         base/bounds registers
         context switch
         fences
         page frames
         paging 2nd
         relocation
         relocation factor
         segment address table
         segmentation 2nd
        selective protection [See Tagged architecture.]
         tagged architecture
     principles of trusted systems
     privacy in computing
     privacy principles and policies
     protected objects
         access control matrix
         ACLs (access control lists)
         AS (authentication server)
         capability
         directories
         domains
         erasing deleted files
         KDC (key distribution center)
         Kerberos
         local name space
         procedure-oriented
         protection goals
         pseudonyms
         revocation of access
         role-based
         single sign-on
         TGS (ticket-granting server)
         types of
         wild cards
Access control matrix
Access decisions, databases
Access policy ambiguity
Access triples security policy
Accountability principle
Accuracy
     cost of security
     of information, ethical issues
ACK (acknowledgment)
ACLs (access control lists) 2nd
ACM (Association for Computing Machinery), code of ethics 2nd
Acquisti, Alessandro
Acrobat PDF, deleting text
Action phrases
Active code, network threat 2nd
Active fault detection
Active server pages (ASP)
Active wiretapping
ActiveX controls
Add subkey
Addresses (IP) [See IP addresses.]
Addresses (memory) [See Memory and address protection.]
Adequate protection principle
Adjusting future earnings
Administering security [See Physical security; Risk analysis; Security plan; Security policies.]
Advertising, web privacy
Adware
AES (Advanced Encryption System) [See also DES (Data Encryption Standard).]
     add subkey
     byte substitution
     cryptanalysis of
     definition
     design contest
     MARS algorithm
     mix column
     RC6 algorithm
     Rijndael algorithm 2nd
     Serpent algorithm
     shift row
     structure of
     symmetric encryption
     Twofish algorithm
     versus DES
Affected subject
Agents, malicious
Aggregation of data 2nd
AH (authentication header)
Airport security, case study
Al Qaeda computer case study
Alarms 2nd [See also Alerts.]
ALE (annualized loss expectation)
Alerts [See also Alarms.]
Algebra, Euclidean
Algorithm design, DES
Algorithms, encryption [See Encryption, algorithms.]
Aliasing errors
All-none file protection
Allocation of general objects
Amateur computer criminals
Ambiguous access policies
Amplifiers, network
Analog network communication
Analysis, risk [See Risk analysis.]
Ancheta, Jeanson James
Anderson, Ross 2nd 3rd 4th
Angle of dispersion
Annualized loss expectation (ALE)
Anomaly-based intrusion detection
Anonymity 2nd
Anonymization 2nd
Anonymous e-mail
Antipiracy feature
Antón, Annie
Appended viruses
Applets, hostile 2nd
Application layer 2nd
Application proxy gateways
Applications
     code errors
    security [See Programs, security.]
     viruses
Architecture, networks
Arithmetic properties of cryptography
Arora, Ashish
ARPANET 2nd
AS (authentication server)
ASINTOER code
ASP (active server pages)
Asperger syndrome
Assertions
Assessment
    quality [See Evaluation.]
    risk [See Risk analysis.]
Asset identification
Association for Computing Machinery (ACM), code of ethics 2nd
Associativity
Assurance [See Trusted systems, assurance.]
Assurance arguments
Asymmetric encryption [See also Public key encryption; RSA (Rivest-Shamir-Adelman) encryption.]
     authentication
     characteristics of
     cryptanalysis of knapsack algorithm
     definition
     flow diagram
     general knapsacks
     hard knapsacks
     key distribution
     key management
     knapsack decryption algorithm
     knapsacks, and modular arithmetic
     knapsacks, as cryptographic algorithms
     MerkleHellman knapsacks 2nd
     overview
     relatively prime values
     RSA (Rivest-Shamir-Adelman)
     simple knapsacks 2nd
     superincreasing knapsacks 2nd
AT&T
Attachment viruses
Attackers [See also Crackers; Hackers.]
     amateurs
     career criminals
     motives
     network threat
     psychological profile
     terrorists
Attacks [See also Threats; Vulnerabilities.]
     attractive targets
     controls
     definition
     information leaks
     MOM (method, opportunity, motive)
     reprocessing used data items
     sources
     types
     universities, as prime targets
     vulnerabilities
Attacks, methods
     12-step password attacks
    brute force [See Brute force attack.]
     brute force password
     chosen plaintext
     ciphertext only
    cryptanalytic [See Cryptanalysis.]
     cyber
     database inference
         combined results control
         concealing control
         controls for
         count attacks
         direct attack
         indirect attack
         limited response suppression
         linear system vulnerability
         mean attacks
         median attacks
         problem summary
         query analysis
         random data perturbation
         random sample control
         statistical inference attacks
         sum attacks
         suppression control
         tracker attacks
    denial of service [See DDoS (distributed denial of service); DoS (denial of service).]
     encrypted password file
     exhaustive password
     full plaintext
     logic bombs
     man-in-the-middle
     partial plaintext
     password
         12-step process
         brute force
         encrypted password file
         exhaustive
         indiscreet users
         plaintext password list
         probability
         salt extension
         trial and error
         weak passwords
     probable plaintext
     salami
         definition 2nd
         examples
         persistence of
     timing
     trapdoors
     Trojan horses
     viruses
Attractive targets
Attributes 2nd
Audience for security policies
Audit trails
Auditability of databases
Audits
     data overload, case study
     log reduction
     principles of trusted systems
Australian Computer Crime and Security Survey
Authentication
     asymmetric encryption algorithms
     certificates
     Digital distributed
     distributed
     flaws
     mutual
     network vulnerabilities
         avoidance
         eavesdropping
         guessing passwords
         man-in-the-middle attack
         masquerade
         nonexistent authentication
         phishing
         session hijacking
         spoofing
         trusted authentication
         well-known authentication
         wiretapping
     nonexistent
     privacy in computing
         anonymized records
         attributes
         identity 2nd
         individual 2nd
         meaning of
         overview
     privacy principles and policies
     strong, networks
     symmetric encryption algorithms
     trusted, network vulnerability
    users [See User authentication.]
Authentication header (AH)
Authentication server (AS)
Authenticity, databases
Automatic exec by file type
Availability of data
     data and services
     data mining
     databases
     definition
    denial of service [See DDoS (distributed denial of service); DoS (denial of service).]
Avoidance




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net