M



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

L0pht 2nd
L1-L6 assurance levels
LAN (local area network)
Laptop computers, vulnerabilities
Lattice security model
Laws [See also Legal issues.]
     California Breach Act
     CAN SPAM Act
     civil
     contract
     Council of Europe Agreement on Cybercrime
     criminal
     E.U. Data Protection Act
     fraud
     GLBA (Graham-Leach-Bliley Act)
     HIPAA (Health Insurance Portability and Accountability Act)
     information-related
         as object
         database protection
         depletion
         electronic commerce
         electronic publishing
         information commerce
         intangible transfer
         marginal cost
         replication
         time-dependent value
     protecting computer artifacts
     RIPA (Regulation of Investigatory Powers Act)
     statutes, definition
     statutes, examples
     tort
     U.S. Computer Fraud and Abuse Act
     U.S. Economic Espionage Act
     U.S. Electronic Communications Privacy Act
     U.S. Electronic Funds Transfer Act
     U.S. Freedom of Information Act
     U.S. Privacy Act
     USA Patriot Act
     versus ethics
Layered defense
Layered trust
Layering networks
Leaking
     access rights
     information [See also Covert channels.]
Least common mechanism
Least privilege
Legal control [See Laws; Legal issues.]
Legal issues [See also Ethical issues; Laws.]
     computer crime
         California Breach Act
         CAN SPAM Act
         Computer Fraud and Abuse Act
         computer terminology and the law
         confidentiality threats
         Council of Europe Agreement on Cybercrime
         cryptography 2nd
         defining
         E.U. Data Protection Act
         Economic Espionage Act
         Electronic Communications Privacy Act
         Electronic Funds Transfer Act
         Freedom of Information Act
         GLBA (Graham-Leach-Bliley Act)
         HIPAA (Health Insurance Portability and Accountability Act)
         integrity threats
         international dimensions
         overview
         Patriot Act
         Privacy Act
         prosecuting
         restricted content
         rules of evidence
         rules of property
         scope limitations
         statutes, examples
         value of data
     cryptography
     overview
     program and data protection
         computer objects
         copyright 2nd
         documentation protection
         domain names
         firmware
         hardware
         object code software
         patents 2nd
         reverse engineering
         source code software
         trade secrets 2nd
         trademark
         URLs
         web content
     rights of employees and employers
         copyright ownership
         employee contracts
         licensed software
         patent ownership
         product ownership
         trade secrets
         work for hire
     software failure
         full disclosure
         overview
         quality demands
         quality software
         refunds
         reporting flaws
         selling correct software
         user interests
         vendor interests
         warranty of cyberworthiness
Legislation [See Laws.]
Levy, Elias
Lewis, John
Library viruses
Licensed software
Limited privilege
Limited response suppression
Linear system vulnerability
Link encryption
Links, network
Linux
Litchfield, David
Lloyd's Bank
Local area network (LAN)
Local name space
Locks
     access control
     integrity 2nd
     sensitivity
     "spray paint,"
Logic bombs 2nd
Logic errors
Logical separation 2nd
Logs
     audit
     database changes
     database transactions
     reduction
Loose versus tight organizational control
Loose-lipped system
Lower bound
Lucifer algorithm
Lynn, Michael




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net