T



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

S-boxes 2nd
S/MIME (Secure MIME)
Salami attack
Salt extension
Sandbox
SAS Institute
Satellite networks
     description
     eavesdropping
     wiretapping
Satisfiability, cryptography
Scanners
     port
     virus
Schecter, Stuart
Schell, Roger
Schema, database
Schneier, Bruce
SCOMP 2nd
Scrambling data [See Cryptography; Encryption.]
Screening router 2nd
Script kiddies
Scripts
Secrecy [See Confidentiality; Privacy.]
Secret key encryption [See Symmetric encryption.]
Secure encryption algorithms
Secure Hash Algorithm (SHA)
Secure Hash Standard (SHS)
Secure MIME (S/MIME)
Secure shell (SSH)
Secure Sockets Layer (SSL)
Security
     as add-on
     associations
     audits
     availability 2nd
     confidentiality [See also Privacy.]
     definition
     features
     goals
     integrity 2nd
     kernel
     money versus information
    physical [See Physical security.]
    software [See Operating system security; Programs, security.]
     targets
    value of [See Economics of cybersecurity.]
     versus precision, databases
    weaknesses [See Vulnerabilities.]
Security models
     *-property (star property)
     BellLa Padula
     Biba integrity
     command structure
     conditions
     definition
     GrahamDenning
     HarrisonRuzzoUllman
     integrity *-property
     lattice model
     leaking access rights
     lower bound
     multilevel security
     partial ordering
     primitive operations
     protection system commands
     protection systems
     relational operators
     simple integrity property
     simple security property
     TakeGrant
     theoretical limitations of systems
     upper bound
     uses for
     write-down
Security parameter index (SPI)
Security plan [See also Risk analysis; Security policies.]
     business continuity plan
     commitment to
     constraints
     contents of
     continuing attention
     controls
     current status
     definition
     framework for
     history of
     incident response plans
     incident response teams
     OCTAVE methodology
     policy statement
     requirements
     responsibilities
     team members
     timetable
Security policies [See also Policies; Principles; Security plan.]
     access triples
     audience
     beneficiaries
     characteristics of
     Chinese Wall
     Clark-Wilson commercial
     classification
     commercial
     compartments
     constrained data items
     contents
     definition 2nd 3rd
     dominance
     durability
     economics of
     examples
         data sensitivity
         DOE (Department of Energy) policy
         government e-mail
         Internet policy
     hierarchical
     issues
     kneed-to-know
     military
     nonhierarchical
     owners
     purpose
     realism
     separation of duty
     transformation procedures
     usefulness
     users
     well-formed transactions
Segment address table
Segment address translation
Segmentation
     combined wit paging
     networks
     overview
Selective backups
Selective protection [See Tagged architecture.]
Self-healing code
Self-stabilizing code
Selling correct software
Semiweak keys
Senders
Sendmail flaw
Sensitive data
     data mining
     databases
         access acceptability
         access decisions
         authenticity
         bounds disclosure
         characteristics of
         data availability
         definition
         disclosures, types of
         exact data disclosure
         existence disclosure
         negative result disclosure
         overview
         probable value disclosure
         security versus precision
     overview
Sensitivity lock
Separation
     multilevel databases
     of duty
     of privilege
     overview
     principles of trusted systems
Serialization error
Serpent algorithm
Server-side includes
Servers, network
Service Set Identifier (SSID)
Service, denial of [See DDoS (distributed denial of service); DoS (denial of service).]
Session hijacking [See also Impersonation.]
Sessions, network
Set userid (SUID)
SHA (Secure Hash Algorithm)
Shadow fields
Shadow values
Shakespeare, authorship debate
Shannon, Claude
Shape, networks
Shared resource matrix
Sharing
     access
     enforced
     network threat
     session keys
Shell backups
Shift row
Shneiderman, Ben
Shopping online, privacy
Shredding paper data
SHS (Secure Hash Standard)
Signaling through images [See Steganography.]
Signature-based intrusion detection 2nd
Signatures, viruses
     definition
     execution patterns
     polymorphism
     scanners
     storage patterns
     transmission patterns
Signed code
Silken codes case study
Simple integrity property
Simple knapsacks 2nd
Simple remailers
Simple security property
Single point of failure, networks 2nd
Single sign-on 2nd
Size, networks
Skype
Smart cards
SMTP (simple mail transport protocol)
Smurf attack
SNMP (simple network management protocol)
Social engineering
SOE (Special Operations Executive)
Software [See also Applications; Code (program); Programs.]
     access control
     configuration management
    controls [See Controls.]
     failure, legal issues
         full disclosure
         overview
         quality demands
         quality software
         refunds
         reporting flaws
         selling correct software
         user interests
         vendor interests
         warranty of cyberworthiness
     malicious modification
    security [See Operating system security; Programs, security.]
Sony XCP (extended copy protection) rootkit
Source code, legal issues
Source quench protocol
Soviet Union codes
Spafford, Eugene
Spam 2nd
Special Operations Executive (SOE)
SPI (security parameter index)
Spikes, electrical
Spoofing [See also Impersonation.]
     cryptographic protection
     e-mail
     interface illusions
     network vulnerability
     trusted path
"Spray paint" lock
Spying 2nd
Spyware
SSH (secure shell)
SSID (Service Set Identifier)
SSL (Secure Sockets Layer)
Stack pointer
Standards [See also Policies; Principles.]
     IEEE Standard 2nd
     process
     software development 2nd
Star property (*-property)
State constraints
State-based intrusion detection
Stateful inspection firewalls
Static code analysis
Statistical analysis, intrusion detection
Statistical inference attacks
Statistics, computer crime
Status accounting
Statutes 2nd [See also Laws.]
Stealth mode intrusion detection
Steganography
Stevens, Thomas
Stoll, Cliff 2nd
Stopford, Charlie
Storage channels
Stream ciphers
Strong authentication
Subjective probability
Subschema, database
Substitution ciphers
     book ciphers
     Caesar cipher
     complexity
     cryptanalysis
     cryptographer's dilemma
     keys
     one-time pads
     permutations
     random number sequences
     Vernam cipher
     Vignère tableau 2nd
Substitution cycle, DES
Substitution, symmetric encryption
Substitutions
SUID (set userid)
Sum attacks
Summer Study on Database Security
Superincreasing knapsacks 2nd
Suppression control
Surge suppressors
Surges, electrical
Surrounding viruses
Surveys of security
     Australian Computer Crime and Security
     CSI/FBI Computer Crime and Security
     Deloitte and Touche Tohmatsu Global Security
     Ernst and Young Global Information Security
     IC3 (Internet Crime Complaint Center)
     Imation Data Protection
     sources for
Swallow, William
Symantec 2nd
Symbols, organizational
Symmetric encryption [See also AES (Advanced Encryption System); DES (Data Encryption Standard); Private key encryption.]
     algorithms
     authentication
     confusion
     cryptographic challenges
     definition
     diffusion
     flow diagram
     key distribution
     key management
     overview
     permutation
     problems with
     RC2 cipher
     RC4 cipher
     RC5 cipher
     substitution
SYN flood
SYN_RECV connections
Synchronization
System complexity
System security policy [See Security policies.]
System testing [See also Testing.]




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net