Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] I/O operation IBM history of DES Lucifer algorithm MVS/ESA operating system Processor Resources/System Manager (PR/SM) U.S. government suit IC3 (Internet Crime Complaint Center) Icelandic DNA database ICMP (Internet Control Message Protocol) Identification errors principles of trusted systems versus authentication Identity (authentication) 2nd Identity (mathematical) Identity theft 2nd Ideology, attack motive IDS (intrusion detection system) anomaly based Common Intrusion Detection Framework definition false results goals for heuristic 2nd host based misuse model based network based networks [See Networks; IDS (intrusion detection system).] overview principles of trusted systems response to alarms signature based 2nd state based statistical analysis stealth mode strengths and weaknesses types of IEEE (Institute for Electrical and Electronics Engineers) code of ethics 2nd Standard 2nd IIS (Internet Information Server) 2nd iishack problem IKE (ISAKMP key exchange) Images, signaling through [See Steganography.] Imation Data Protection Survey Imbruglia, George Impedance, electrical Impersonation man-in-the-middle attack masquerade network threat of login phishing 2nd session hijacking spoofing cryptographic protection interface illusions network vulnerability trusted path steganography trusted systems web bugs 2nd Implementation flaws Incident response plans Incident response teams Incomplete mediation 2nd [See also Complete mediation.] Independent testing Indirect attack Individual authentication 2nd Inductance Industrial espionage Inference, database attacks combined results control concealing control controls for count attacks direct attack indirect attack limited response suppression linear system vulnerability mean attacks median attacks problem summary query analysis random data perturbation random sample control statistical inference attacks sum attacks suppression control tracker attacks Information [See also Data; Databases.] anarchy collection, privacy issues 2nd commerce depletion disclosure, privacy issues flow analysis hiding leaks [See also Covert channels.] replication retention, privacy issues security, privacy issues usage, privacy issues Information officers, security responsibilities Information Security Breeches Survey (ISBS) 2nd Information Technology Security Evaluation Criteria (ITSEC) 2nd Informed consent Infrared networks Inherently hard problems Initial permutation 2nd Inspection, code Installation testing Instances Institute for Electrical and Electronics Engineers (IEEE) code of ethics 2nd Standard 2nd Intangible transfer Integrated viruses Integrated Vulnerability Assessments (IVAs) Integration testing 2nd Integrity *-property data 2nd data mining databases 2nd [See also Reliability.] definition economic enforcement locks 2nd multilevel databases overview threats Intellectual property Intelligence gathering Intent phase Intercepting sensitive information Interception 2nd 3rd Interceptors Interface illusions Internal networks Internal rate of return (IRR) Internet [See also Web sites.] Internet Control Message Protocol (ICMP) Internet Crime Complaint Center (IC3) Internet Information Server (IIS) 2nd Internet protocol [See IP addresses.] Internet Scanner Internet Security Association Key Management Protocol (ISAKMP) Internet Security Systems (ISS) Internet worm Internets Interprocess communication Interruptions Intrinsic good Intruders Intrusion detection system (IDS) [See IDS (intrusion detection system).] Intrusion, characteristics Inverse initial permutation 2nd Inverses 2nd Invisible gif [See Web bugs.] IP addresses resolution shortage of 2nd spoofing [See Spoofing.] translation 2nd IPSec (IP Security Protocol Suite) IPv6 Iris pattern authentication [See Biometrics.] IRR (internal rate of return) ISAKMP (Internet Security Association Key Management Protocol) ISAKMP key exchange (IKE) ISBS (Information Security Breeches Survey) 2nd ISO OSI (Open Systems Interconnection) model Isolation ISS (Internet Security Systems) ITSEC (Information Technology Security Evaluation Criteria) 2nd Ivanov, Alexey IVAs (Integrated Vulnerability Assessments) |