E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

D, TCSEC class
DAC (discretionary access control)
Daemen, John
Danseglio. Mike
Data [See also Information.]
     access risks
     anonymization
     availability, databases
     form checks, database
     justifying cost of security
         accuracy
         consistency
         reliability
         representative
     left in place
     minimization
     perturbation
         data mining
         database attacks
         database inference
         privacy
         random
    secrecy [See Confidentiality; Privacy.]
     semantics, data mining
     sensitivity
     stored, protecting
Data Encryption Algorithm (DEA) [See also DES (Data Encryption Standard).]
Data Encryption Algorithm-1 (DEA-1) [See also DES (Data Encryption Standard).]
Data mining [See also Databases.]
     case study
     comparable data
     correcting mistakes
     data availability
     data correctness
     data semantics
     definition
     eliminating false matches
     integrity
     overview
     privacy
         aggregation of data
         correlation of data
         data perturbation
         government
         preserving privacy
         sensitivity
Data Protection Act
Database administrators 2nd
Database management system (DBMS)
Databases [See also Data mining.]
     advantages of
     aggregation [See also Inference.]
     attributes
     components of
     decentralization
     definition
    deleting fields and records [See Queries.]
    editing fields and records [See Queries.]
     elements
     fields
    front end [See DBMS (database management system).]
     inference [See also Aggregation.]
         combined results control
         concealing control
         controls for
         count attacks
         definition
         direct attack
         indirect attack
         limited response suppression
         linear system vulnerability
         mean attacks
         median attacks
         problem summary
         query analysis
         random data perturbation
         random sample control
         statistical inference attacks
         sum attacks
         suppression control
         tracker attacks
     logical structure
    manipulating [See Queries.]
     protection laws
     queries
     records
         definition
        manipulating [See Queries.]
         projecting
         selecting
     relations
     reliability
         commit flag
         committing updates
         concurrency
         consistency 2nd
         correction codes
         data form checks
         definition
         error detection
         filters
         intent phase
         monitors
         operating system protection features
         patterns
         recovery from backup
         redundancy
         shadow fields
         shadow values
         state constraints
         transition constraints
         two-phase update
    retrieving fields and records [See Queries.]
     schema
     security requirements
         access control 2nd
         auditability
         availability
         change logs
         confidentiality
         configuration management
         field checks
         inference
         integrity 2nd
         pass-through problem
         release proliferation
         user authentication
         version proliferation
     sensitive data
         access acceptability
         access decisions
         authenticity
         bounds disclosure
         characteristics of
         data availability
         definition
         disclosures, types of
         exact data disclosure
         existence disclosure
         negative result disclosure
         overview
         probable value disclosure
         security versus precision
     subschema
Databases, multilevel
     confidentiality
     differentiated security
     duplicate records
     granularity
     integrity
     polyinstantiation
     redundancy
     security designs
         commutative filters
         distributed databases
         federated databases
         filtering
         guards
         integrity locks
         practical issues
         trusted front-end
         views
         windows
     security issues
     security proposals
         cryptographic checksum
         encryption
         integrity lock
         partitioning
         sensitivity lock
         separation
         "spray paint" lock
         Summer Study on Database Security
Datagrams
DBMS (database management system)
DDoS (distributed denial of service) [See also Availability ; DoS (denial of service).]
     diagram of
     network threat
     TFN (Tribal Flood Network) 2nd
     TFN2K 2nd
de Vere, Edward
DEA (Data Encryption Algorithm) [See also DES (Data Encryption Standard).]
DEA-1 (Data Encryption Algorithm-1) [See also DES (Data Encryption Standard).]
Debugging code [See also Testing code.]
Decentralization, databases
Deceptive practices
Deciphering data [See Decryption.]
Decision making
Decoding data [See Decryption.]
Decryption
     algorithm
     definition
     DES (Data Encryption Standard)
     knapsacks
Defacing web sites
Defense methods [See also Controls.]
     privacy principles and policies
     viruses
Defining computer crime
Degaussing magnetic data [See also Magnetic remanence.]
Deleting
    database fields and records [See Queries.]
     PDF text
     Word text
Deloitte and Touche Tohmatsu Global Security Survey
Delphi approach
Delta (configuration control method)
Denial of service (DoS) [See DoS (denial of service).]
Deontology
Department of Energy (DOE) policy
Department of Trade and Industry (DTI)
Depletion of information
DES (Data Encryption Standard) [See also AES (Advanced Encryption System).]
     algorithm design
     background
     brute force attack
     complements
     cycle details
     cycle, example
     decryption
     design weaknesses
     differential cryptanalysis 2nd
     double DES
     encryption algorithm
     expansion permutations 2nd
     final permutation 2nd
     history
     initial permutation 2nd
     inverse initial permutation 2nd
     key clustering
     key length
     key transformation
     Lucifer algorithm
     number of iterations
     overview 2nd
     P-boxes 2nd
     parallel attack
     permutation cycle
     permutation types
     permuted choices
     product cipher
     S-boxes 2nd
     security of 2nd 3rd
     semiweak keys
     substitution cycle
     triple DES
     versus AES
     weak keys
     weaknesses
Destination unreachable protocol
Determining economic value [See Economics of cybersecurity.]
DHCP (Dynamic Host Configuration Protocol)
Diamond v. Bradley
Diamond v. Diehr
Difference files
Differential cryptanalysis 2nd
Differentiated security, multilevel databases
Diffie-Hellman key exchange
Diffusion 2nd
Digital distributed authentication
Digital Equipment Corporation
Digital Millennium Copyright Act (DMCA) 2nd
Digital network communication
Digital objects [See Objects, digital.]
Digital Signature Algorithm (DSA)
Digital Signature Standard (DSS)
Digital signatures
Digram analysis
Digrams
Direct attack
Directive 95/46/EC
Directories
"Dirty" power
Disaster recovery [See Backing up data; Physical security; Recovery from backup.]
Disaster, natural [See Natural disasters.]
Disclosure
     bounds
     controlled
     exact data
     existence
     negative result
     of software problems
     privacy issues
     probable value
     types of
Discount rate
Discretionary access control (DAC)
Distributed authentication
Distributed databases
Distributed denial of service (DDoS) [See DDoS (distributed denial of service).]
Division, cryptography
DMCA (Digital Millennium Copyright Act) 2nd
DNS attacks
DNS cache poisoning
Document viruses
Documentation
     availability, network threat
     protection, legal issues
DOE (Department of Energy) policy
Domain errors
Domain names 2nd
Domain switching
Domains
Dominance
DoS (denial of service) [See also Availability ; DDoS (distributed denial of service).]
     broadcast mode
     connection flooding
     DNS attacks
     DNS cache poisoning
     echo chargen
     estimated activity
     ethical issues
     network threat
     ping of death
     smurf attack
     SYN flood
     teardrop attacks
     traffic redirection
     transmission failure
Dot-dot-slash directory travel
Double DES
DoubleClick
Drive-by installation
Drops, electrical
DSA (Digital Signature Algorithm)
DSS (Digital Signature Standard)
DTI (Department of Trade and Industry)
Dumpster diving
Dunham, Ken
Duplicate database records
Durability
Dynamic Host Configuration Protocol (DHCP)




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net