P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Object code, legal issues [See also Copyright.]
Objects, digital
     allocation
     copying
     copyright
     information as
     legal issues
     patents
    protected [See Protected objects.]
     reusing
OCTAVE methodology
Odd parity
Odlyzko, Andrew
Offers, web privacy
Offsite backups
One-by-one gif [See Web bugs.]
One-time execution viruses
One-time pads
One-time passwords 2nd
One-way functions
Onion routing
Online banking
Online environment
Online profiling
Opaqueness, of network
Opcodes
Open design
Open source
Open Systems Interconnection (OSI) model
Open versus closed organizations
Operating system data protection
Operating system protection features
Operating system security [See also Programs, security; Trusted systems.]
     cryptographic separation
     executives
     file protection
         all-none
         group
         individual permissions
         per-object
         per-user
         persistent permissions
         SUID (set userid)
         temporary acquired permissions
     granularity
     hardware-enforced protection
     history of
     levels of protection
     logical separation
     memory and address protection
         base/bounds registers
         context switch
         fences
         page frames
         paging 2nd
         relocation
         relocation factor
         segment address table
         segmentation 2nd
        selective protection [See Tagged architecture.]
         tagged architecture
     monitors
     multiprogrammed operating systems
     physical separation
     protected objects, accessing
         access control matrix
         ACLs (access control lists)
         AS (authentication server)
         capability
         directories
         domains
         erasing deleted files
         KDC (key distribution center)
         Kerberos
         local name space
         procedure-oriented
         protection goals
         pseudonyms
         revocation of access
         role-based
         single sign-on
         TGS (ticket-granting server)
         types of
         wild cards
     protection methods
     separation
     system functions
     temporal separation
     user authentication
         additional authentication information
         biometrics 2nd
         challenge-response system 2nd
         cookies
         flaws
         impersonating trusted systems
         impersonation of login
         multifactor authentication
         one-time passwords
         overview
         password attacks
         password selection criteria
         passwords as authenticators
         phishing
         process description
         single sign-on
         two-factor authentication
         versus identification
Opportunity cost
Optical fiber networks
     description
     eavesdropping
     wiretapping
Oracle, estimating security costs
Oracles
Orange Book [See TCSEC (Trusted Computer System Evaluation Criteria).]
Organizational culture
     cultural practices
     cultural values
     dimensions of
     employee versus job
     heroes
     loose versus tight control
     normative versus pragmatic
     open versus closed
     parochial versus professional
     process versus results
     rituals
     role of organizational culture
     security choices, examples
     symbols
Organized crime
Originality of work
OSI (Open Systems Interconnection) model
Overlapping controls
Overwriting magnetic data
Owners
Ownership
     networks
     of data
     programs
     web sites
Ozment, Andy




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net