S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Rabbits
Radio frequency identification (RFID)
RAND Corporation 2nd
Random number sequences
Random sample control
Ranum, Marcus
RC2 cipher
RC4 cipher
RC5 cipher
RC6 algorithm
Read-only files, viruses
Realism
Rearrangement [See Permutations.]
Recipients
Reconnaissance
Records, database 2nd
Recovery from backup
Redaction Tool
Redundancy
     database reliability
     multilevel databases
     networks
     process comparison
Reference monitor
Refunds
Registration
     copyright
     patents
     web privacy
Regression testing
Regulation of Investigatory Powers Act (RIPA)
Regulation, economics
Relational operators
Relations, database
Relatively prime values
Release proliferation
Reliability
     databases [See also Integrity.]
         commit flag
         committing updates
         concurrency
         consistency 2nd
         correction codes
         data form checks
         definition
         error detection
         filters
         intent phase
         monitors
         operating system protection features
         patterns
         recovery from backup
         redundancy
         shadow fields
         shadow values
         state constraints
         transition constraints
         two-phase update
Religion, and ethics
Relocation
Relocation factor
Remailers
Remanence, magnetic
Repeaters, network
Replay attack
Reporting
     computer crime
     program flaws
Reprocessing used data items
Request For Comment (RFC)
Requirements checking
Requirements of novelty
Resident viruses
Resilience, network
Resorla, Eric
Respondent types
Response
     CERT (Computer Emergency Response Team)
     intrusion detection
     limited response suppression
     plans
     teams
     to alarms
Responsibility for security
Restricted content
Restricted usage
Results versus process organizations
Retina pattern authentication [See Biometrics.]
Return on investment (ROI)
Reverse engineering
Reviews, design and code
Revocation of access
Revolving backups
RFC (Request For Comment)
RFID (radio frequency identification)
.rhosts file
Right, versus wrong [See Ethics.]
Rights of employees and employers
     copyright ownership
     employee contracts
     licensed software
     patent ownership
     product ownership
     trade secrets
     work for hire
Rijmen, Vincent
Rijndael algorithm 2nd [See also AES (Advanced Encryption System).]
Ring of trust
RIPA (Regulation of Investigatory Powers Act)
Risk analysis [See also Security plan.]
     classical probability
     Delphi approach
     FMEA (failure modes and effects analysis)
     frequency probability
     FTA (fault tree analysis)
     hazard analysis techniques
     HAZOP (hazard and operability studies)
     IVAs (Integrated Vulnerability Assessments)
     nature of risk
     probability
     pros and cons
     steps involved in
         alternative steps
         asset identification
         control selection
         cost/benefit analysis
         expected loss computations
         exploitation estimation
         savings projections
         vulnerability identification
     subjective probability
     VAM (Vulnerability Assessment and Mitigation)
Risks
     definition
     exposure
     impact
     leverage
     nature of
     prediction [See also Risk analysis.]
Rituals, organizational
Rivest, Ron
Rivest-Shamir-Adelman (RSA) encryption [See RSA (Rivest-Shamir-Adelman) encryption.]
.rlogin file
Rochefort, Joseph
Rogue access points
Rogue programs [See Malicious code.]
ROI (return on investment)
Role-based access control
rootkit
Rootkit revealers
Rootkits
Roundoff error
Router access controls
Routers
Routing concepts
RSA (Rivest-Shamir-Adelman) encryption
     cryptanalysis of
     cryptographic challenges
     description
     Euler totient function
     Jacobi function
     key choice
     mathematical foundations
     overview 2nd
     using the algorithm
Rule-based ethics
Rule-deontology
Rules of evidence
Rules of property
Rules set, firewall
Russian nuclear weapons, tracking




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net