V



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

UCC (Uniform Commercial Code)
UDP (user datagram protocol)
Unauthorized access
Undefined opcodes
Unexpected behavior
Uninterruptible power supply (UPS)
Unit testing 2nd [See also Testing.]
United Kingdom
     cost of security incidents
     RIPA (Regulation of Investigatory Powers Act)
United States
     California Breach Act
     CAN SPAM Act
     Census Bureau
     Computer Fraud and Abuse Act
     Economic Espionage Act
     Electronic Communications Privacy Act
     Electronic Funds Transfer Act
     evaluating trusted systems 2nd
     Freedom of Information Act
     GLBA (Graham-Leach-Bliley Act)
     government
         audit data overload
         security report card
     HIPAA (Health Insurance Portability and Accountability Act)
    laws [See Laws, U.S..]
     Patriot Act
     Privacy Act
     privacy principles and policies
Universality of ethics
Universities, as prime targets
Unknown path
Unknown perimeter
Unshielded twisted pair (UTP) cable
Upper bound
UPS (uninterruptible power supply)
URLs, legal issues
Usage controls on cryptography
Use of computer services, ethical issues
Usefulness
User authentication [See also Authentication.]
     additional authentication information
     biometrics 2nd
     challenge-response system 2nd
     cookies
     databases
     flaws
     impersonating trusted systems
     impersonation of login
     multifactor authentication
     one-time passwords
     overview
     password attacks
     password selection criteria
     passwords as authenticators
     phishing
     principles of trusted systems 2nd
     process description
     single sign-on
     two-factor authentication
     versus identification
User datagram protocol (UDP)
User interests
User interface vulnerability
User-group-world protection
Users
     human fallibility case study
     security policies
     security responsibilities
Utilitarianism
UTP (unshielded twisted pair) cable




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net