C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

B1, TCSEC class 2nd
B2, TCSEC class 2nd
B3, TCSEC class 2nd
Backdoors [See Trapdoors.]
Backing up data
Balanced scorecard
Base registers
Baseline
Bastion host
Beacon gif [See Web bugs.]
Beizer. Boris
BellLa Padula security model
Beneficiaries of security policies
Benign viruses
Best practices 2nd
BestBuy
Biba integrity security model
BIND (Berkeley Internet Name Domain)
Binding of functionality
Biometrics 2nd [See also Face recognition authentication.]
"Black hole" failure
Black-box testing
Blaze, Matt
Block ciphers [See also AES (Advanced Encryption System); DES (Data Encryption Standard).]
Bombs, software [See Logic bombs; Time bombs.]
Book ciphers
Boot sector viruses
Bootstrapping
Botnets
Bots
Boundaries, network
Boundary condition errors
Bounds disclosure
Bounds registers
Brain virus
Breakable encryption
Breaking encryption [See also Cryptanalysis.]
     chosen plaintext attacks
     ciphertext only attacks
     full plaintext attacks
     partial plaintext attacks
     probable plaintext attacks
     weaknesses
Britain [See United Kingdom.]
British evaluation criteria
Broadcast mode
Brute force attack 2nd
Buffer overflow 2nd
Bugs
     software
     web 2nd
Bulletin boards
Business case
     adjusting future earnings
     balanced scorecard
     cost estimates
     definition
     determining economic value
     discount rate
     false positives
     influences on investment strategy
     IRR (internal rate of return)
     net present value
     opportunity cost
     overview
     ROI (return on investment)
     web application, case study
Business continuity plan
Byte substitution




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net