O



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Napster
National Institute of Standards and Technology (NIST)
National Research Council (NRC)
National Security Agency (NSA) 2nd 3rd
Natural disasters
NBS (National Bureau of Standards) 2nd
NCSC (National Computer Security Center) 2nd
Negative result disclosure
Nessus
Net present value
netcat scanner
Network interface cards (NICs)
Network-based intrusion detection
Networked backups
Networks
     address shortage 2nd
     amplifiers
     analog communication
     angle of dispersion
     boundaries
     cables
         coaxial
         eavesdropping
         Ethernet
         impedance
         inductance
         networking
         UTP (unshielded twisted pair)
         wiretapping
     CAN (campus area network)
     clients
     coaxial cable
     communication mode
     control
     datagrams
     diagram of
     digital communication
     domain names
     environment of use 2nd
     Ethernet cable
     fault tolerance
     firewalls
         application proxy gateway
         comparison of
         definition
         design
         guards
         limitations
         overview
         packet filtering gateway
         personal
         sample configuration
         stateful inspection
         types of
     footprints
     frames
     geosynchronous orbit
     hosts
     IDS (intrusion detection system)
         anomaly based
         definition
         false results
         goals for
         heuristic 2nd
         host based
         misuse
         model based
         network based
         overview
         response to alarms
         signature based 2nd
         state based
         statistical analysis
         stealth mode
         strengths and weaknesses
         types of
     infrared
     internets
     LAN (local area network)
     layering
     links
     MAC (Media Access Control) address
     MAN (metropolitan area network)
     media
     microwave
     NICs (network interface cards)
     nodes
     opaqueness
     optical fiber
     OSI (Open Systems Interconnection) model
     overview
     ownership
     packets 2nd
     peers
     port numbers
     protocol stack
     protocols
     repeaters
     resilience
     routers
     routing concepts
     satellite
     secure e-mail
         confidentiality
         designs
         encryption
         keyrings
         MIC (message integrity check)
         PGP (Pretty Good Privacy)
         requirements
         ring of trust
         S/MIME (Secure MIME)
         sample systems
         solutions
         threats
     servers
     sessions
     shape
     single point of failure
     size
     SYN_RECV connections
     TCP protocols
     TCP/IP protocol
     the Internet
     top-level domain
     topography
     types of
     UDP (user datagram protocol)
     UTP (unshielded twisted pair) cable
     WAN (wide area network)
     wireless
     workstations
Networks, controls
     ACLs (access control lists)
     alarms
     alerts
     architecture
     challenge-response systems
     content integrity
     cryptographic checksum
     design
     Digital distributed authentication
     encryption
         AH (authentication header)
         certificate authorities
         comparison of methods
         e-mail
         encrypted tunnels
         end-to-end
         ESP (encapsulated security payload)
         firewalls
         IKE (ISAKMP key exchange)
         ISAKMP (Internet Security Association Key Management Protocol)
         issues
         link
         overview
         PKI (public key infrastructure)
         security associations
         signed code
         SPI (security parameter index)
         SSH (secure shell)
         SSL (Secure Sockets Layer)
         TLS (transport layer security)
         tunnels
         VPNs (virtual private networks)
     error correcting codes
     error detection
     even parity
     failover mode
     failure tolerance
     firewalls
     hash codes
     honeypots
     Huffman codes
     implementation
     intrusion detection
     Kerberos
     mobile agents
     odd parity
     one-time password
     onion routing
     parity check
     password tokens
     redundancy
     router access controls
     segmentation
     single points of failure
     SSID (Service Set Identifier)
     strong authentication
     summary of
     threat analysis
     tickets
     TKIP (Temporal Key Integrity Program)
     traffic flow security
     WEP (wired equivalent privacy)
     wireless security
     WPA (WiFi Protected Access)
Networks, threats
     active code 2nd
     active wiretapping
     ActiveX controls
     anonymity
     application code errors
     ASP (active server pages)
     attackers
     authentication vulnerabilities
         avoidance
         eavesdropping
         guessing passwords
         man-in-the-middle attack
         masquerade
         nonexistent authentication
         phishing
         session hijacking
         spoofing [See also Man-in-the-middle; ; Masquerade.]
         trusted authentication
         well-known authentication
         wiretapping
     automatic exec by file type
     botnets
     bots
     broadcast mode
     buffer overflow
     bulletin boards
     cable
         eavesdropping
         impedance
         inductance
         wiretapping
     challenge motive
     chats
     complex attacks
     connection flooding
     cookies
     cyberterrorism
     DDoS (distributed denial of service)
     defacing web sites
     distributed authentication
     DNS attacks
     DNS cache poisoning
     documentation availability
     DoS (denial of service)
     dot-dot-slash directory travel
     dumpster diving
     eavesdropping
     echo chargen
     escape-character attack
     espionage
     exposing messages
     falsifying messages
     fame motive
     format failures
     hactivism
     hostile applets
     ICMP (Internet Control Message Protocol)
     ideological motive
     iishack problem
     impersonation
     implementation flaws
     in mobile code
     intelligence gathering
     Java code
     JVM (Java virtual machine)
     malformed packets
     message confidentiality
     message integrity
     microwave
     misdelivering messages
     money motive
     motives for attacks
     multiple points of attack
     multiplexed signals
     noise
     optical fiber
     organized crime
     packet sniffers
     passive wiretapping
     ping of death
     port scans
     protocol failures
     protocol flaws
     reconnaissance
     replaying old messages
     RFC (Request For Comment)
     rogue access points
     sandbox
     satellite
     script kiddies
     scripts
     server-side includes
     sharing
     smurf attack
     social engineering
     SYN flood
     system complexity
     system fingerprinting
     teardrop attacks
     traffic flow analysis
     traffic redirection
     transmission failure
     unknown path
     unknown perimeter
     vulnerabilities
     vulnerabilities, summary of
     war driving
     web site vulnerabilities
     wireless
         eavesdropping
         interception
         rogue access points
         theft of service 2nd
         vulnerabilities
         war driving
         wiretapping
     wiretapping
     zombies
New Zealand Herald
NICs (network interface cards)
NIST (National Institute of Standards and Technology)
nmap scanner
Nodes, network
Noise, in communications
Nondeterminism
Nondeterministic Turing machines
Nonexistent authentication
Nonhierarchical security policies
Nonmalicious errors [See also Malicious code; Programs, security.]
     buffer overflows
     causes of failures
     combined flaws
     incomplete mediation
     synchronization
     time-of-check to time-of-use errors
Normative versus pragmatic organizations
NP class
NP-complete problems
NRC (National Research Council)
NSA (National Security Agency) 2nd 3rd
Nuclear weapons, tracking
Nucleus [See Kernel.]
Number of iterations
Number theory 2nd




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net