Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] V.A. (Veterans Administration) Validation Validation errors Value of data Value of security [See Economics of cybersecurity.] VAM (Vulnerability Assessment and Mitigation) 2nd Vandalism Varian, Hal Vendor interests Verifying program code [See Testing code.] Verisign 2nd 3rd Vernam cipher Vernam, Gilbert Version proliferation, databases Views, multilevel databases Vignère tableau 2nd Virtual machines Virtual memory Virtual private networks (VPNs) Virtualization Virus scanners Viruses [See also Malicious code.] appended to a program application programs attachment benign boot sector bootstrapping Brain Code Red cookies defense methods definition document e-mail attachment effects and causes gaining control homes for 2nd in read-only files infecting hardware integrated Internet worm libraries memory-resident misconceptions one-time execution platform limitations qualities of resident signatures definition execution patterns polymorphism scanners storage patterns transmission patterns source of spreading media surrounding a program surviving power off transient triggering web bugs Voice recognition authentication [See Biometrics.] VoIP (Voice over IP) Voting, electronic VPNs (virtual private networks) Vulnerabilities [See also Attacks ; specific vulnerabilities.] data definition hardware laptop computers mapping to controls network threat 2nd risk analysis software versus threats Vulnerability Assessment and Mitigation (VAM) 2nd |