Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] UCC (Uniform Commercial Code) UDP (user datagram protocol) Unauthorized access Undefined opcodes Unexpected behavior Uninterruptible power supply (UPS) Unit testing 2nd [See also Testing.] United Kingdom cost of security incidents RIPA (Regulation of Investigatory Powers Act) United States California Breach Act CAN SPAM Act Census Bureau Computer Fraud and Abuse Act Economic Espionage Act Electronic Communications Privacy Act Electronic Funds Transfer Act evaluating trusted systems 2nd Freedom of Information Act GLBA (Graham-Leach-Bliley Act) government audit data overload security report card HIPAA (Health Insurance Portability and Accountability Act) laws [See Laws, U.S..] Patriot Act Privacy Act privacy principles and policies Universality of ethics Universities, as prime targets Unknown path Unknown perimeter Unshielded twisted pair (UTP) cable Upper bound UPS (uninterruptible power supply) URLs, legal issues Usage controls on cryptography Use of computer services, ethical issues Usefulness User authentication [See also Authentication.] additional authentication information biometrics 2nd challenge-response system 2nd cookies databases flaws impersonating trusted systems impersonation of login multifactor authentication one-time passwords overview password attacks password selection criteria passwords as authenticators phishing principles of trusted systems 2nd process description single sign-on two-factor authentication versus identification User datagram protocol (UDP) User interests User interface vulnerability User-group-world protection Users human fallibility case study security policies security responsibilities Utilitarianism UTP (unshielded twisted pair) cable |