Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] L0pht 2nd L1-L6 assurance levels LAN (local area network) Laptop computers, vulnerabilities Lattice security model Laws [See also Legal issues.] California Breach Act CAN SPAM Act civil contract Council of Europe Agreement on Cybercrime criminal E.U. Data Protection Act fraud GLBA (Graham-Leach-Bliley Act) HIPAA (Health Insurance Portability and Accountability Act) information-related as object database protection depletion electronic commerce electronic publishing information commerce intangible transfer marginal cost replication time-dependent value protecting computer artifacts RIPA (Regulation of Investigatory Powers Act) statutes, definition statutes, examples tort U.S. Computer Fraud and Abuse Act U.S. Economic Espionage Act U.S. Electronic Communications Privacy Act U.S. Electronic Funds Transfer Act U.S. Freedom of Information Act U.S. Privacy Act USA Patriot Act versus ethics Layered defense Layered trust Layering networks Leaking access rights information [See also Covert channels.] Least common mechanism Least privilege Legal control [See Laws; Legal issues.] Legal issues [See also Ethical issues; Laws.] computer crime California Breach Act CAN SPAM Act Computer Fraud and Abuse Act computer terminology and the law confidentiality threats Council of Europe Agreement on Cybercrime cryptography 2nd defining E.U. Data Protection Act Economic Espionage Act Electronic Communications Privacy Act Electronic Funds Transfer Act Freedom of Information Act GLBA (Graham-Leach-Bliley Act) HIPAA (Health Insurance Portability and Accountability Act) integrity threats international dimensions overview Patriot Act Privacy Act prosecuting restricted content rules of evidence rules of property scope limitations statutes, examples value of data cryptography overview program and data protection computer objects copyright 2nd documentation protection domain names firmware hardware object code software patents 2nd reverse engineering source code software trade secrets 2nd trademark URLs web content rights of employees and employers copyright ownership employee contracts licensed software patent ownership product ownership trade secrets work for hire software failure full disclosure overview quality demands quality software refunds reporting flaws selling correct software user interests vendor interests warranty of cyberworthiness Legislation [See Laws.] Levy, Elias Lewis, John Library viruses Licensed software Limited privilege Limited response suppression Linear system vulnerability Link encryption Links, network Linux Litchfield, David Lloyd's Bank Local area network (LAN) Local name space Locks access control integrity 2nd sensitivity "spray paint," Logic bombs 2nd Logic errors Logical separation 2nd Logs audit database changes database transactions reduction Loose versus tight organizational control Loose-lipped system Lower bound Lucifer algorithm Lynn, Michael |