Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Napster National Institute of Standards and Technology (NIST) National Research Council (NRC) National Security Agency (NSA) 2nd 3rd Natural disasters NBS (National Bureau of Standards) 2nd NCSC (National Computer Security Center) 2nd Negative result disclosure Nessus Net present value netcat scanner Network interface cards (NICs) Network-based intrusion detection Networked backups Networks address shortage 2nd amplifiers analog communication angle of dispersion boundaries cables coaxial eavesdropping Ethernet impedance inductance networking UTP (unshielded twisted pair) wiretapping CAN (campus area network) clients coaxial cable communication mode control datagrams diagram of digital communication domain names environment of use 2nd Ethernet cable fault tolerance firewalls application proxy gateway comparison of definition design guards limitations overview packet filtering gateway personal sample configuration stateful inspection types of footprints frames geosynchronous orbit hosts IDS (intrusion detection system) anomaly based definition false results goals for heuristic 2nd host based misuse model based network based overview response to alarms signature based 2nd state based statistical analysis stealth mode strengths and weaknesses types of infrared internets LAN (local area network) layering links MAC (Media Access Control) address MAN (metropolitan area network) media microwave NICs (network interface cards) nodes opaqueness optical fiber OSI (Open Systems Interconnection) model overview ownership packets 2nd peers port numbers protocol stack protocols repeaters resilience routers routing concepts satellite secure e-mail confidentiality designs encryption keyrings MIC (message integrity check) PGP (Pretty Good Privacy) requirements ring of trust S/MIME (Secure MIME) sample systems solutions threats servers sessions shape single point of failure size SYN_RECV connections TCP protocols TCP/IP protocol the Internet top-level domain topography types of UDP (user datagram protocol) UTP (unshielded twisted pair) cable WAN (wide area network) wireless workstations Networks, controls ACLs (access control lists) alarms alerts architecture challenge-response systems content integrity cryptographic checksum design Digital distributed authentication encryption AH (authentication header) certificate authorities comparison of methods encrypted tunnels end-to-end ESP (encapsulated security payload) firewalls IKE (ISAKMP key exchange) ISAKMP (Internet Security Association Key Management Protocol) issues link overview PKI (public key infrastructure) security associations signed code SPI (security parameter index) SSH (secure shell) SSL (Secure Sockets Layer) TLS (transport layer security) tunnels VPNs (virtual private networks) error correcting codes error detection even parity failover mode failure tolerance firewalls hash codes honeypots Huffman codes implementation intrusion detection Kerberos mobile agents odd parity one-time password onion routing parity check password tokens redundancy router access controls segmentation single points of failure SSID (Service Set Identifier) strong authentication summary of threat analysis tickets TKIP (Temporal Key Integrity Program) traffic flow security WEP (wired equivalent privacy) wireless security WPA (WiFi Protected Access) Networks, threats active code 2nd active wiretapping ActiveX controls anonymity application code errors ASP (active server pages) attackers authentication vulnerabilities avoidance eavesdropping guessing passwords man-in-the-middle attack masquerade nonexistent authentication phishing session hijacking spoofing [See also Man-in-the-middle; ; Masquerade.] trusted authentication well-known authentication wiretapping automatic exec by file type botnets bots broadcast mode buffer overflow bulletin boards cable eavesdropping impedance inductance wiretapping challenge motive chats complex attacks connection flooding cookies cyberterrorism DDoS (distributed denial of service) defacing web sites distributed authentication DNS attacks DNS cache poisoning documentation availability DoS (denial of service) dot-dot-slash directory travel dumpster diving eavesdropping echo chargen escape-character attack espionage exposing messages falsifying messages fame motive format failures hactivism hostile applets ICMP (Internet Control Message Protocol) ideological motive iishack problem impersonation implementation flaws in mobile code intelligence gathering Java code JVM (Java virtual machine) malformed packets message confidentiality message integrity microwave misdelivering messages money motive motives for attacks multiple points of attack multiplexed signals noise optical fiber organized crime packet sniffers passive wiretapping ping of death port scans protocol failures protocol flaws reconnaissance replaying old messages RFC (Request For Comment) rogue access points sandbox satellite script kiddies scripts server-side includes sharing smurf attack social engineering SYN flood system complexity system fingerprinting teardrop attacks traffic flow analysis traffic redirection transmission failure unknown path unknown perimeter vulnerabilities vulnerabilities, summary of war driving web site vulnerabilities wireless eavesdropping interception rogue access points theft of service 2nd vulnerabilities war driving wiretapping wiretapping zombies New Zealand Herald NICs (network interface cards) NIST (National Institute of Standards and Technology) nmap scanner Nodes, network Noise, in communications Nondeterminism Nondeterministic Turing machines Nonexistent authentication Nonhierarchical security policies Nonmalicious errors [See also Malicious code; Programs, security.] buffer overflows causes of failures combined flaws incomplete mediation synchronization time-of-check to time-of-use errors Normative versus pragmatic organizations NP class NP-complete problems NRC (National Research Council) NSA (National Security Agency) 2nd 3rd Nuclear weapons, tracking Nucleus [See Kernel.] Number of iterations Number theory 2nd |