J



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

I/O operation
IBM
     history of DES
     Lucifer algorithm
     MVS/ESA operating system
     Processor Resources/System Manager (PR/SM)
     U.S. government suit
IC3 (Internet Crime Complaint Center)
Icelandic DNA database
ICMP (Internet Control Message Protocol)
Identification
     errors
     principles of trusted systems
     versus authentication
Identity (authentication) 2nd
Identity (mathematical)
Identity theft 2nd
Ideology, attack motive
IDS (intrusion detection system)
     anomaly based
     Common Intrusion Detection Framework
     definition
     false results
     goals for
     heuristic 2nd
     host based
     misuse
     model based
     network based
    networks [See Networks; IDS (intrusion detection system).]
     overview
     principles of trusted systems
     response to alarms
     signature based 2nd
     state based
     statistical analysis
     stealth mode
     strengths and weaknesses
     types of
IEEE (Institute for Electrical and Electronics Engineers)
     code of ethics 2nd
     Standard 2nd
IIS (Internet Information Server) 2nd
iishack problem
IKE (ISAKMP key exchange)
Images, signaling through [See Steganography.]
Imation Data Protection Survey
Imbruglia, George
Impedance, electrical
Impersonation
     man-in-the-middle attack
     masquerade
     network threat
     of login
     phishing 2nd
     session hijacking
     spoofing
         cryptographic protection
         interface illusions
         network vulnerability
         trusted path
     steganography
     trusted systems
     web bugs 2nd
Implementation flaws
Incident response plans
Incident response teams
Incomplete mediation 2nd [See also Complete mediation.]
Independent testing
Indirect attack
Individual authentication 2nd
Inductance
Industrial espionage
Inference, database attacks
     combined results control
     concealing control
     controls for
     count attacks
     direct attack
     indirect attack
     limited response suppression
     linear system vulnerability
     mean attacks
     median attacks
     problem summary
     query analysis
     random data perturbation
     random sample control
     statistical inference attacks
     sum attacks
     suppression control
     tracker attacks
Information [See also Data; Databases.]
     anarchy
     collection, privacy issues 2nd
     commerce
     depletion
     disclosure, privacy issues
     flow analysis
     hiding
     leaks [See also Covert channels.]
     replication
     retention, privacy issues
     security, privacy issues
     usage, privacy issues
Information officers, security responsibilities
Information Security Breeches Survey (ISBS) 2nd
Information Technology Security Evaluation Criteria (ITSEC) 2nd
Informed consent
Infrared networks
Inherently hard problems
Initial permutation 2nd
Inspection, code
Installation testing
Instances
Institute for Electrical and Electronics Engineers (IEEE)
     code of ethics 2nd
     Standard 2nd
Intangible transfer
Integrated viruses
Integrated Vulnerability Assessments (IVAs)
Integration testing 2nd
Integrity
     *-property
     data 2nd
     data mining
     databases 2nd [See also Reliability.]
     definition
     economic
     enforcement
     locks 2nd
     multilevel databases
     overview
     threats
Intellectual property
Intelligence gathering
Intent phase
Intercepting sensitive information
Interception 2nd 3rd
Interceptors
Interface illusions
Internal networks
Internal rate of return (IRR)
Internet [See also Web sites.]
Internet Control Message Protocol (ICMP)
Internet Crime Complaint Center (IC3)
Internet Information Server (IIS) 2nd
Internet protocol [See IP addresses.]
Internet Scanner
Internet Security Association Key Management Protocol (ISAKMP)
Internet Security Systems (ISS)
Internet worm
Internets
Interprocess communication
Interruptions
Intrinsic good
Intruders
Intrusion detection system (IDS) [See IDS (intrusion detection system).]
Intrusion, characteristics
Inverse initial permutation 2nd
Inverses 2nd
Invisible gif [See Web bugs.]
IP addresses
     resolution
     shortage of 2nd
    spoofing [See Spoofing.]
     translation 2nd
IPSec (IP Security Protocol Suite)
IPv6
Iris pattern authentication [See Biometrics.]
IRR (internal rate of return)
ISAKMP (Internet Security Association Key Management Protocol)
ISAKMP key exchange (IKE)
ISBS (Information Security Breeches Survey) 2nd
ISO OSI (Open Systems Interconnection) model
Isolation
ISS (Internet Security Systems)
ITSEC (Information Technology Security Evaluation Criteria) 2nd
Ivanov, Alexey
IVAs (Integrated Vulnerability Assessments)




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net