Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] D, TCSEC class DAC (discretionary access control) Daemen, John Danseglio. Mike Data [See also Information.] access risks anonymization availability, databases form checks, database justifying cost of security accuracy consistency reliability representative left in place minimization perturbation data mining database attacks database inference privacy random secrecy [See Confidentiality; Privacy.] semantics, data mining sensitivity stored, protecting Data Encryption Algorithm (DEA) [See also DES (Data Encryption Standard).] Data Encryption Algorithm-1 (DEA-1) [See also DES (Data Encryption Standard).] Data mining [See also Databases.] case study comparable data correcting mistakes data availability data correctness data semantics definition eliminating false matches integrity overview privacy aggregation of data correlation of data data perturbation government preserving privacy sensitivity Data Protection Act Database administrators 2nd Database management system (DBMS) Databases [See also Data mining.] advantages of aggregation [See also Inference.] attributes components of decentralization definition deleting fields and records [See Queries.] editing fields and records [See Queries.] elements fields front end [See DBMS (database management system).] inference [See also Aggregation.] combined results control concealing control controls for count attacks definition direct attack indirect attack limited response suppression linear system vulnerability mean attacks median attacks problem summary query analysis random data perturbation random sample control statistical inference attacks sum attacks suppression control tracker attacks logical structure manipulating [See Queries.] protection laws queries records definition manipulating [See Queries.] projecting selecting relations reliability commit flag committing updates concurrency consistency 2nd correction codes data form checks definition error detection filters intent phase monitors operating system protection features patterns recovery from backup redundancy shadow fields shadow values state constraints transition constraints two-phase update retrieving fields and records [See Queries.] schema security requirements access control 2nd auditability availability change logs confidentiality configuration management field checks inference integrity 2nd pass-through problem release proliferation user authentication version proliferation sensitive data access acceptability access decisions authenticity bounds disclosure characteristics of data availability definition disclosures, types of exact data disclosure existence disclosure negative result disclosure overview probable value disclosure security versus precision subschema Databases, multilevel confidentiality differentiated security duplicate records granularity integrity polyinstantiation redundancy security designs commutative filters distributed databases federated databases filtering guards integrity locks practical issues trusted front-end views windows security issues security proposals cryptographic checksum encryption integrity lock partitioning sensitivity lock separation "spray paint" lock Summer Study on Database Security Datagrams DBMS (database management system) DDoS (distributed denial of service) [See also Availability ; DoS (denial of service).] diagram of network threat TFN (Tribal Flood Network) 2nd TFN2K 2nd de Vere, Edward DEA (Data Encryption Algorithm) [See also DES (Data Encryption Standard).] DEA-1 (Data Encryption Algorithm-1) [See also DES (Data Encryption Standard).] Debugging code [See also Testing code.] Decentralization, databases Deceptive practices Deciphering data [See Decryption.] Decision making Decoding data [See Decryption.] Decryption algorithm definition DES (Data Encryption Standard) knapsacks Defacing web sites Defense methods [See also Controls.] privacy principles and policies viruses Defining computer crime Degaussing magnetic data [See also Magnetic remanence.] Deleting database fields and records [See Queries.] PDF text Word text Deloitte and Touche Tohmatsu Global Security Survey Delphi approach Delta (configuration control method) Denial of service (DoS) [See DoS (denial of service).] Deontology Department of Energy (DOE) policy Department of Trade and Industry (DTI) Depletion of information DES (Data Encryption Standard) [See also AES (Advanced Encryption System).] algorithm design background brute force attack complements cycle details cycle, example decryption design weaknesses differential cryptanalysis 2nd double DES encryption algorithm expansion permutations 2nd final permutation 2nd history initial permutation 2nd inverse initial permutation 2nd key clustering key length key transformation Lucifer algorithm number of iterations overview 2nd P-boxes 2nd parallel attack permutation cycle permutation types permuted choices product cipher S-boxes 2nd security of 2nd 3rd semiweak keys substitution cycle triple DES versus AES weak keys weaknesses Destination unreachable protocol Determining economic value [See Economics of cybersecurity.] DHCP (Dynamic Host Configuration Protocol) Diamond v. Bradley Diamond v. Diehr Difference files Differential cryptanalysis 2nd Differentiated security, multilevel databases Diffie-Hellman key exchange Diffusion 2nd Digital distributed authentication Digital Equipment Corporation Digital Millennium Copyright Act (DMCA) 2nd Digital network communication Digital objects [See Objects, digital.] Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) Digital signatures Digram analysis Digrams Direct attack Directive 95/46/EC Directories "Dirty" power Disaster recovery [See Backing up data; Physical security; Recovery from backup.] Disaster, natural [See Natural disasters.] Disclosure bounds controlled exact data existence negative result of software problems privacy issues probable value types of Discount rate Discretionary access control (DAC) Distributed authentication Distributed databases Distributed denial of service (DDoS) [See DDoS (distributed denial of service).] Division, cryptography DMCA (Digital Millennium Copyright Act) 2nd DNS attacks DNS cache poisoning Document viruses Documentation availability, network threat protection, legal issues DOE (Department of Energy) policy Domain errors Domain names 2nd Domain switching Domains Dominance DoS (denial of service) [See also Availability ; DDoS (distributed denial of service).] broadcast mode connection flooding DNS attacks DNS cache poisoning echo chargen estimated activity ethical issues network threat ping of death smurf attack SYN flood teardrop attacks traffic redirection transmission failure Dot-dot-slash directory travel Double DES DoubleClick Drive-by installation Drops, electrical DSA (Digital Signature Algorithm) DSS (Digital Signature Standard) DTI (Department of Trade and Industry) Dumpster diving Dunham, Ken Duplicate database records Durability Dynamic Host Configuration Protocol (DHCP) |