Q



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

P class
P-boxes 2nd
Packet filtering gateways
Packet sniffers
Packets, network 2nd
Page address translation
Page frames
Page size
Page translation table
Paged segmentation
Paging 2nd
Palladium (protect memory project)
Parallel attack
Parity check
Parker, Donn
Parochial versus professional organizations
Partial ordering
Partial plaintext attacks
Partitioning multilevel databases
Pass-through problem
Passenger Name Record (PNR)
Passive fault detection
Passive wiretapping
Passport
Password attacks
     12-step process
     brute force
     encrypted password file
     exhaustive
     guessing
     indiscreet users
     plaintext password list
     probability
     salt extension
     trial and error
     weak passwords
Passwords
     as authenticators
     frequency of change
     guessing
     Microsoft
     mnemonic qualities
     network tokens
     one-time
     selection criteria
     with Kerberos
Patents
     definition
     Diamond v. Bradley
     Diamond v. Diehr
     for computer objects
     Gottschalk v. Benson
     infringement
     legal issues 2nd
     ownership
     registering
     requirements of novelty
Path, trusted [See Trusted path.]
Patriot Act
Patterns
     cryptographic permutations
     database reliability
     virus signatures
Payment schemes, web privacy
Payments online, web privacy
PDF, deleting text
Peer reviews
Peers, network
Penetrate-and-patch technique
Penetration testing 2nd 3rd
Per-object file protection
Per-session cookies
Per-subject protection
Per-user file protection
Performance testing
Permission based principles of trusted systems
Permissions [See also Privilege.]
     individual
     persistent
     temporary acquired
Permutation cycle
Permutations
     columnar transpositions
     combined approaches
     definition
     digram analysis
     digrams
     encipherment/decipherment complexity
     patterns
     product ciphers
     substitution ciphers
     symmetric encryption
     trigrams
     types
Permuted choices
Persistent cookies
Personal computer users, security responsibilities
Personal firewall
Personal identification number (PIN)
Personnel staff members, security responsibilities
PGP (Pretty Good Privacy)
Phishing 2nd [See also Impersonation.]
Photon reception
Photons, cryptography with
Physical controls
Physical security
     backing up data
     cold site backups
     complete backups
     computer screen emanations
     contingency planning
     definition
     degaussing magnetic data
     "dirty" power
     fires
     floods
     guards
     hot site backups
     intercepting sensitive information
     locks
     natural disasters
     networked backups
     offsite backups
     overwriting magnetic data
     power loss
     revolving backups
     selective backups
     shell backups
     shredding paper data
     smart cards
     surge suppressors
     Tempest program
     theft prevention
     unauthorized access
     UPS (uninterruptible power supply)
     vandalism
Physical separation 2nd
PIN (personal identification number)
Ping of death
Ping protocol
Piracy
Pixel tags [See Web bugs.]
PKI (public key infrastructure)
Plaintext
     chosen plaintext attacks
     ciphertext only attacks
     definition
     full plaintext attacks
     partial plaintext attacks
     password list attacks
     probable plaintext attacks
Planning, security [See Risk analysis; Security plan.]
PNR (Passenger Name Record)
Poem codes
Polarizing filters
Policies [See also Principles; Security policies; Standards.]
     economic
    privacy [See Privacy.]
    security [See Security policies.]
Polyinstantiation
Polymorphism, viruses
Port numbers
Port scans
Power off, virus defense
Power, electrical
Power, Richard
PR/SM [See IBM, Processor Resources/System Manager.]
Pragmatic versus normative organizations
Precision versus security
Prediction, of risk [See Risk analysis.]
Pretty Good Privacy (PGP)
Prevention [See Controls; Defense methods.]
Prime numbers
Primitive operations
Principles [See also Policies; Standards.]
     economic
    privacy [See Privacy.]
     security
         adequate protection
         easiest penetration
         effectiveness
         weakest link
    trusted systems [See Trusted systems.]
Privacy [See also Confidentiality.]
     access control
     affected subject
     aspects of
     authentication
         anonymized records
         attributes
         identity 2nd
         individual 2nd
         meaning of
         overview
     case study
     computer-related problems
     controlled disclosure
     data mining
         aggregation of data
         correlation of data
         data perturbation
         government
         preserving privacy
         sensitive data
     dimensions of privacy
     e-mail
         access control
         anonymous
         interception
         mixmaster remailers
         monitoring
         overview
         remailers
         simple remailers
         spamming
         spoofing
         transmitting
     emerging technologies
         consumer products
         electronic voting
         overview
         privacy issues
         RFID (radio frequency identification)
         security issues
         Skype
         VoIP (Voice over IP)
     government and
         Council of Europe
         European Privacy Directive
         Icelandic DNA database
         principles and policies
         U.K. RIPA (Regulation of Investigatory Powers Act)
     history of
     information collection 2nd
     information disclosure
     information retention
     information security
     information usage
     informed consent
     loss of control
     monitoring
     on the web
         advertising
         adware
         contests
         cookies
         credit card payments
         drive-by installation
         highjackers
         keystroke loggers
         offers
         online environment
         online profiling
         payment schemes
         payments online
         precautions
         registration
         shopping
         site ownership
         spyware
         third-party ads
         third-party cookies
         web bugs
     ownership of data
     policy changes
     principles and policies
         access control
         anonymity
         audit trails
         authentication
         Convention 2nd
         COPPA (Children's Online Privacy Protection Act)
         Council of Europe
         data access risks
         data anonymization
         data left in place
         data minimization
         deceptive practices
         defense methods
         Directive 95/46/EC
         e-Government Act of 2000
         European Privacy Directive
         Fair Credit Reporting Act
         fair information
         Fair Information Policies
         Federal Educational Rights and Privacy Act
         FTC (Federal Trade Commission)
         GLBA (Graham-Leach-Bliley Act)
         government policies
         HIPAA (Health Insurance Portability and Accountability Act)
         identity theft
         multiple identities
         non-U.S.
         Privacy Act (5 USC 552a)
         protecting stored data
         pseudonymity
         quality
         restricted usage
         training
         U.S. laws
         Ware committee report
         web site controls, commercial
         web site controls, government
     rights, ethical issues
     RIPA (Regulation of Investigatory Powers Act)
     sensitive data
Privacy Act 2nd
Privacy-preserving data mining
Private key encryption [See also AES (Advanced Encryption System); DES (Data Encryption Standard); Symmetric encryption.]
Privilege [See also Permissions.]
     escalation
     limited
Probability
Probability password attacks
Probable plaintext attacks
Probable value disclosure
Problems, cryptographic
Procedure-oriented access control
Process activation
Process versus results organizations
Product cipher, DES
Product ciphers
Product ownership
Professional versus parochial organizations
Profile, of attackers
Programs
     definition [See also Applications; Code (program); Software.]
     protection legal issues
         computer objects
         copyright 2nd
         documentation protection
         domain names
         firmware
         hardware
         object code software
         patents 2nd
         reverse engineering
         source code software
         trade secrets 2nd
         trademark
         URLs
         web content
Programs, security [See also Operating system security; Trusted systems.]
    controls [See Controls.]
     cyber attacks
     errors
     failures
     faults
     fixing faults
     flaws
         aliasing
         authentication
         boundary conditions
         definition
         domain errors
         identification
         logic errors
         overview
         serialization
         types of
         validation errors
     IEEE Standard 2nd
    intentional incidents [See Cyber attacks.]
     malicious code [See also Attacks, methods; Trapdoors; Viruses.]
         agents
        back doors [See Trapdoors.]
         history of
         implementation time
         interface illusions
         keystroke logging
        leaking information [See Covert channels.]
         logic bombs
         man-in-the-middle attacks
         potential for harm
         privilege escalation
         rabbits
         rootkit revealers
         rootkits
         Sony XCP (extended copy protection) rootkit
         spoofing
         threat assessment
         time bombs
         timing attacks
         Trojan horses
         types of 2nd
         worms
         zero day exploits
     nonmalicious errors
         buffer overflows
         causes of failures
         combined flaws
         incomplete mediation
         synchronization
         time-of-check to time-of-use errors
     overview
     penetrate-and-patch technique
     unexpected behavior
Project leaders, security responsibilities
Proliferation of keys
Proof of program correctness
Propagation of errors
Proprietary resources, ethical issues
Prosecuting computer crime
Protected objects, accessing
     access control matrix
     ACLs (access control lists)
     AS (authentication server)
     capability
     directories
     domains
     erasing deleted files
     KDC (key distribution center)
     Kerberos
     local name space
     procedure-oriented
     protection goals
     pseudonyms
     revocation of access
     role-based
     single sign-on
     TGS (ticket-granting server)
     types of
     wild cards
Protecting stored data
Protection [See Controls; Defense methods.]
Protection profiles
Protection system commands
Protection systems
Protocols
     destination unreachable
     echo
     encryption
     failures
     flaws
     networking
     ping
     SMTP (simple mail transport protocol)
     SNMP (simple network management protocol)
     source quench
     stack
     TCP/IP
     UDP (user datagram protocol)
Provenzano, Bernardo
Proxies
Proxy firewall
Pseudonymity
Pseudonyms
PSOS (Provably Secure Operating System)
Public domain
Public key encryption [See also Asymmetric encryption; RSA (Rivest-Shamir-Adelman) encryption.]
     characteristics
     definition
     flow diagram
     key proliferation
     purpose of
Public key infrastructure (PKI)




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net